Space & Science

News and insights from NASA, ESA, and the frontier of space exploration and scientific discovery.

iss067e149651

25 Years of Scientific Discovery Aboard the International Space Station

November marks 25 years of human presence aboard the International Space Station, a testament to international collaboration and human ingenuity. Since the first crew arrived on Nov. 2, 2000, NASA and its partners have conducted thousands of research investigations and technology demonstrations to advance exploration of the Moon and Mars and benefit life on Earth.Researchers have taken advantage of the unique microgravity environment to conduct experiments impossible to replicate on Earth, transforming research across disciplines. More than 4,000 experiments have pushed the boundaries of science, sparked discoveries, and driven scientific breakthroughs.
“25 years ago, Expedition 1 became the first crew to call the International Space Station home, beginning a period of continuous human presence in space that still continues to this day,” said NASA acting administrator Sean Duffy. “This historic milestone would not have been possible without NASA and its partners, as well as every astronaut and engineer who works to keep the lights on in low Earth orbit.”
To celebrate a quarter century of innovation in microgravity, NASA is highlighting 25 scientific breakthroughs that exemplify the station’s enduring impact on science, technology, and exploration.

NASA uses the space station as a proving ground to develop new systems and technologies for missions beyond low Earth orbit.

Navigation, communication, and radiation shielding technologies proven aboard the space station are being integrated into spacecraft and missions to reach the Moon and Mars.
Robotic systems, for example a robotic surgeon and autonomous assistants, will expand available medical procedures and allow astronauts to dedicate time to more crucial tasks during missions far from Earth. 
Astronauts have used recycled plastic and stainless steel to 3D print tools and parts. The ability to 3D print in space lays the groundwork for on-demand repair and fabrication during future deep space missions where resupply isn’t readily available.
From the deployment of the first wooden satellite to laser communications and self-healing quantum communications, the space station is a proving ground for cutting-edge space technologies.

Why this matters:
Humanity’s push to the Moon and Mars begins with discoveries in low Earth orbit. From demonstrating how astronauts can live, work, and repair equipment off Earth to testing life-support systems and advanced materials, every innovation aboard the station helps to advance NASA’s Artemis and other exploration initiatives and brings humanity closer to thriving beyond our planet.

As NASA prepares to return humans to the Moon through the Artemis program and push onward to Mars, sustaining life beyond Earth is more critical than ever.

Astronauts have grown more than 50 species of plants in space, including tomatoes, bok choi, romaine lettuce, and chili peppers.
Advanced life support systems are capable of recycling up to 98% of water in the U.S. segment aboard the space station, the ideal level needed for exploration missions.
Crew health data shows how space affects the brain, vision, balance and control, and  muscle and bone density, guiding strategies to maintain astronaut performance during extended missions and improve health on Earth.
Researchers have sequenced DNA in orbit and are advancing techniques to enable real-time assessment of microbial life in space, which is essential to maintaining astronaut health.

Why this matters:
By growing food, recycling water, and improving medical care in space, NASA is paving the way for future long-duration missions to the Moon and Mars while revolutionizing agriculture and medicine back home.

Research aboard the orbiting laboratory not only pushes humanity farther into the cosmos but can help address complex human health issues on the ground. By providing a platform for long-term microgravity research, the space station fosters breakthroughs that yield direct benefits to people on Earth.

Research aboard the space station provides new insights to develop treatments for diseases like cancer, Alzheimer’s, Parkinson’s, and heart disease by revealing how microgravity alters cellular functions.
New developments in medicine for cancer, muscular dystrophy, and neurodegenerative diseases have come from growing protein crystals in microgravity with larger, more organized structures.
High quality stem cells can be grown in greater quantities in space, helping to develop new regenerative therapies for neurological, cardiovascular, and immunological conditions.
Pioneering efforts in 3D bioprinting, which uses cells, proteins, and nutrients as source material, have produced human tissue structures such as a knee meniscus and heart tissue, a major step toward manufacturing organs in space for transplant patients on Earth.
Researchers are using miniaturized tissue models to observe how space affects tissues and organ systems, offering new ways to develop and test medicines to protect astronauts on future missions and improve treatments on Earth.
Photos taken by astronauts have supported emergency response to natural disasters, such as hurricanes, with targeted views from space.
Instruments mounted on the space station protect critical space infrastructure and provide data on the planet’s natural patterns by measuring Earth’s resources and space weather.

Why this matters:
Microgravity research is moving us closer to manufacturing human organs in space for transplant and revealing new ways to fight cancer, heart disease, osteoporosis, neurodegenerative disease, and other serious illnesses that affect millions of people worldwide. The station also serves as an observation platform to monitor natural disasters, weather patterns, and Earth’s resources.

The space station offers scientists an unparalleled vantage point to learn about the fundamental behavior of the universe. By studying cosmic phenomena typically blocked or absorbed by Earth’s atmosphere and observing physics at an atomic level, researchers can probe mysteries impossible to study from Earth.

Why this matters:
Research aboard the space station is helping us unravel the deepest mysteries of our universe, from the smallest quantum particles to the most powerful cosmic explosions. Observations of collapsing stars and black holes could inspire new navigation tools using cosmic signals and expand our grasp of space-time. Studies of antimatter and dark matter bring us closer to understanding the 95% of the universe invisible to the human eye. Creating the fifth state of matter in space unlocks new quantum pathways that could transform technology on Earth and in space.

Physical processes behave differently in microgravity, offering scientists a new lens for discovery.

Engineers can design more efficient fuel and life support systems for future spacecraft thanks to studies of fluid boiling, containment, and flow.
Analyzing gels and liquids mixed with tiny particles in space helps researchers fine-tune material compositions and has led to new patents for consumer products.
The discovery of cool flames in space, a phenomenon difficult to study on Earth, has opened new frontiers in combustion science and engine design.  

Why this matters:
Breakthroughs in fundamental physics aboard the space station drive innovation on Earth and advance spacecraft fuel, thermal control, plant watering, and water purification systems. Research in soft materials is improving products in medicine, household products, and renewable energy, while cool flames studies may lead to cleaner, more efficient engines.

Since 2000, the space station has opened doors for private companies, researchers, students, and astronauts around the world to participate in exploration and help propel humanity forward to the Moon and Mars.

The space station is a launchpad for the commercial space economy, enabling private astronaut missions and hosting hundreds of experiments from commercial companies, giving them the chance to strengthen their technologies through in-orbit research, manufacturing demonstrations, and innovation.
CubeSats deployed from the space station enable students and innovators around the world to test radio antennas, small telescopes, and other scientific demonstrations in space.
More than one million students have engaged with astronauts via ham radio events, inspiring the next generation to participate in science, technology, engineering, and mathematics.
More than 285 crew members from more than 25 countries have visited humanity’s longest-operating outpost in space, making it a symbol of global collaboration.

Why this matters:
The space station has enabled the space economy, where commercial research, manufacturing, and technology demonstrations are shaping a new global marketplace. NASA and its international partners have established a leadership position in low Earth orbit, creating new opportunities for industry and paving the way for exploration missions to the Moon, Mars, and beyond.
Learn more about the research aboard the International Space Station at:
www.nasa.gov/iss-science
Revisit the 20th anniversary for more information.

25 Years of Scientific Discovery Aboard the International Space Station Read More »

1 fake chatgpt apps are hijacking your phone without you knowing intro

Fake ChatGPT apps are hijacking your phone without you knowing

NEWYou can now listen to Fox News articles!
App stores are supposed to be reliable and free of malware or fake apps, but that’s far from the truth. For every legitimate application that solves a real problem, there are dozens of knockoffs waiting to exploit brand recognition and user trust. We’ve seen it happen with games, productivity tools and entertainment apps. Now, artificial intelligence has become the latest battleground for digital impostors.The AI boom has created an unprecedented gold rush in mobile app development, and opportunistic actors are cashing in. AI-related mobile apps collectively account for billions of downloads, and that massive user base has attracted a new wave of clones. They pose as popular apps like ChatGPT and DALL·E, but in reality, they conceal sophisticated spyware capable of stealing data and monitoring users.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.OPENAI ACCUSES NY TIMES OF WANTING TO INVADE MILLIONS OF USERS’ PRIVACY IN PAPER’S LAWSUIT AGAINST TECH GIANT Fake AI apps pose as trusted tools like ChatGPT and DALL·E while secretly stealing user data. (Kurt “CyberGuy” Knutsson)What you need to know about the fake AI appsThe fake apps flooding app stores exist on a spectrum of harm, and understanding that range is crucial before you download any AI tools. Take the “DALL·E 3 AI Image Generator” found on Aptoide. It presents itself as an OpenAI product, complete with branding that mimics the real thing. When you open it, you see a loading screen that looks like an AI model generating an image. But nothing is actually being generated.Network analysis by Appknox showed the app connects only to advertising and analytics services. There’s no AI functionality, just an illusion designed to collect your data for monetization.Then there are apps like WhatsApp Plus, which are far more dangerous. Disguised as an upgraded version of Meta’s messenger, this app hides a complete malware framework capable of surveillance, credential theft and persistent background execution. It’s signed with a fake certificate instead of WhatsApp’s legitimate key and uses a tool often used by malware authors to encrypt malicious code.Once installed, it silently requests extensive permissions, including access to your contacts, SMS, call logs, device accounts and messages. These permissions allow it to intercept one-time passwords, scrape your address book and impersonate you in chats. Hidden libraries keep the code running even after you close the app. Network logs show it uses domain fronting to disguise its traffic behind Amazon Web Services and Google Cloud endpoints.Not every clone is malicious. Some apps identify themselves as unofficial interfaces and connect directly to real APIs. The problem is that you often can’t tell the difference between a harmless wrapper and a malicious impersonator until it’s too late. Clones hide spyware that can access messages, passwords and contacts. (Kurt “CyberGuy” Knutsson)Users and businesses are equally at riskThe impact of fake AI apps goes far beyond frustrated users. For enterprises, these clones pose a direct threat to brand reputation, compliance and data security.When a malicious app steals credentials while using your brand’s identity, customers don’t just lose data but also lose trust. Research shows customers stop buying from a brand after a major breach. The average cost of a data breach now stands at 4.45 million dollars, according to IBM’s 2025 report. In regulated sectors like finance and healthcare, such breaches can lead to violations of GDPR, HIPAA and PCI-DSS, with fines reaching up to 4 percent of global turnover. These impostors harm both users and brands, leading to costly data breaches and lost trust. (Kurt “CyberGuy” Knutsson)8 steps to protect yourself from fake AI appsWhile the threat landscape continues to evolve, there are practical measures you can take to protect yourself from malicious clones and impersonators.1) Install reputable antivirus softwareA quality mobile security solution can detect and block malicious apps before they cause damage. Modern antivirus programs scan apps for suspicious behavior, unauthorized permissions and known malware signatures. This first line of defense is especially important as fake apps become more sophisticated in hiding their true intentions.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.2) Use a password managerApps like WhatsApp Plus specifically target credentials and can intercept passwords typed directly into fake interfaces. A password manager autofills credentials only on legitimate sites and apps, making it significantly harder for impostors to capture your login information through phishing or fake app interfaces.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.3) Consider identity theft protection servicesGiven that malicious clones can steal personal information, intercept SMS verification codes and even impersonate users in chats, identity theft protection provides an additional safety net. These services monitor for unauthorized use of your personal information and can alert you if your identity is being misused across various platforms and services.Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.PROTECTING KIDS FROM AI CHATBOTS: WHAT THE GUARD ACT MEANS4) Enable two-factor authentication everywhereWhile some sophisticated malware can intercept SMS codes, 2FA still adds a critical layer of security. Use authenticator apps rather than SMS when possible, as they’re harder to compromise. Even if a fake app captures your password, 2FA makes it significantly more difficult for attackers to access your accounts.5) Keep your device and apps updatedSecurity patches often address vulnerabilities that malicious apps exploit. Regular updates to your operating system and legitimate apps ensure you have the latest protections against known threats. Enable automatic updates when possible to stay protected without having to remember manual checks.6) Download only from official app storesStick to the Apple App Store and Google Play Store rather than third-party marketplaces. While fake apps can still appear on official platforms, these stores have security review processes and are more responsive to removing malicious applications once they’re identified. Third-party app stores often have minimal or no security vetting.7) Verify the developer before downloadingCheck the developer name carefully. Official ChatGPT apps come from OpenAI, not random developers with similar names. Look at the number of downloads, read recent reviews and be suspicious of apps with few ratings or reviews that seem generic. Legitimate AI tools from major companies will have verified developer badges and millions of downloads.8) Use a data removal serviceEven if you avoid downloading fake apps, your personal information may already be circulating on data broker sites that scammers rely on. These brokers collect and sell details like your name, phone number, home address and app usage data, information that cybercriminals can use to craft convincing phishing messages or impersonate you.A trusted data removal service scans hundreds of broker databases and automatically submits removal requests on your behalf. Regularly removing your data helps reduce your digital footprint, making it harder for malicious actors and fake app networks to target you.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawayThe AI boom has driven massive innovation, but it has also opened new attack surfaces built on brand trust. As adoption grows across mobile platforms, enterprises must secure not only their own apps but also track how their brand appears across hundreds of app stores worldwide. In a market where billions of AI app downloads have happened, the clones aren’t coming. They’re already here, hiding behind familiar logos and polished interfaces.Have you ever downloaded a fake AI app without realizing it? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

Fake ChatGPT apps are hijacking your phone without you knowing Read More »

craigslist car scam

Craigslist car report scam targets vehicle sellers

NEWYou can now listen to Fox News articles!
Selling your car online should be simple. Lately, though, more sellers are running into fake “vehicle report” demands from so-called buyers. The pitch looks routine, yet it leads straight to a payment page on a site you don’t know. We heard from Nick K. of Washington, who spotted the pattern in real time.”In trying to sell a car, it has become apparent that there is a scam related to CarFax-type reports,” Nick wrote in an email to us. “The way it works is a guy texts or emails saying they are interested in your car, but they say they must have a car report from a specific service. At first, I thought it was just a way for a guy to sell more reports, but after thinking about it for a while, it seems like it could be a great way to harvest credit card numbers, etc. I have not been a victim of this, but in the course of selling a car recently, I had several instances of this. There are several warning signs: ‘Will you accept cash?’ Questions indicating they have not read the ad. Offering more than the ad asks for. Short nonsensical first contact. These are just the usual signs I am looking for when I am trying to decide if someone responding to a Craigslist or FB ad is legit.”Nick’s instincts are spot on. This Craigslist car report scam has been spreading across Craigslist, Facebook Marketplace and other online classifieds.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.CONNECTICUT MAN LOSES LIFE SAVINGS IN CRYPTO SCAM Scammers posing as buyers on Craigslist are asking sellers to buy fake “vehicle history reports” from fraudulent sites.  (Kurt “CyberGuy” Knutsson)How the Craigslist car report scam worksThis scam often starts with a message that looks completely normal. A supposed buyer texts asking something like, “1985 F150 Available?” and quickly follows up with friendly but vague questions such as, “OK, I’m interested in seeing it. When and where would be good for you?”Once you respond, the “buyer” develops just enough rapport to sound legitimate. Then comes the setup. The “buyer” says he is serious about purchasing but wants to see a detailed ASR report first, something most sellers have never heard of.That’s exactly what happened to Nick K. After he shared the Craigslist link and vehicle details, the fake buyer sent this reply:”Auto Smart Report, here’s the link you can get the papers from. Oh, I forgot to ask for your name? I’m Richard. Will you accept a cash payment? Let me know.”It sounds harmless, even reassuring. But the scam hinges on getting you to click that link. The site looks professional, promising a “Complete Vehicle History at Your Fingertips.” Yet once you enter your information, you’re not buying a report; you’re handing over your credit card details and personal data to criminals.When the seller, in this case, pushed back, the scammer doubled down with more pressure tactics.”If you can show me the Auto Smart Report, that would be great, as it’s the most reliable and complete report. My offer to you is $7,000. I have no issue with that.” Notice the scammer just increased the amount that he is willing to pay for the vehicle by $500.They’ll say anything to keep you engaged and make the transaction sound routine. But the moment you pay for the fake report, the buyer disappears. His only goal is to harvest your financial information, not purchase your vehicle.INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU Behind the friendly text messages, these fake buyers are after your payment info, not your vehicle. (Kurt “CyberGuy” Knutsson)Warning signs to watch forRequests for unknown report names like “ASR”Messages that ignore your ad detailsOffers above your asking pricePhrases like “will you accept cash?” or “I just need to see a report first”Demands for a specific site instead of accepting a Carfax, AutoCheck or NMVTIS reportGeneric greetings like “dear,” “brother” or “friend”If you see two or more of these at once, treat the lead as suspicious.TOP 5 OVERPAYMENT SCAMS TO AVOID These convincing messages often include phrases like “I just need to see an ASR report first” or “will you accept cash?” to appear legitimate. (Kurt “CyberGuy” Knutsson)How to stay safe from Craigslist car report scamsEven the most convincing buyer could turn out to be a scammer, but these smart moves can help you stay safe, protect your money and keep your personal data out of the wrong hands.1) Do not click buyer-sent links, and use strong antivirus softwareAvoid clicking any link sent through text, email or messaging apps. These often lead to phishing sites or hidden malware downloads. Keep your devices protected with strong antivirus software. Run regular scans and keep your software updated to block new threats.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.2) Never enter payment info on unfamiliar sitesIf a buyer insists you use a website you’ve never heard of, stop immediately. Always verify a site’s legitimacy before sharing any financial or personal details.3) Use a data removal serviceConsider a data removal service to remove your personal details from data broker sites. This limits how easily scammers can find and target you.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.4) Use trusted report servicesStick to established names like Carfax, AutoCheck or NMVTIS. These are widely recognized and accepted by real buyers.5) Share your VIN in the adIncluding your vehicle’s VIN lets genuine buyers run their own reports safely without needing your involvement.6) Block and report scammersReport suspicious messages directly to the platform and to the FTC at reportfraud.ftc.gov. Sharing details helps others stay safe.7) If you paid on a fake siteContact your bank right away, cancel the card and monitor your account for unauthorized charges. Quick action can prevent further loss.8) Meet smart and stay cautiousWhen meeting a buyer, choose a public place with security cameras. Bring a friend, keep your phone charged and document all communication.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysThis scam works because a vehicle report sounds routine. A fake buyer pushes you to a site you’ve never heard of, then applies pressure to act fast. Slow down, verify and stick to well-known services. Real buyers will accept a report you provide or will run one themselves. You can still sell safely on marketplaces by following a few simple rules. Control the process, choose the report source and avoid links sent by strangers. Thanks to readers like Nick, more sellers can spot the trap before any money or data is at risk.Have you seen buyers pushing odd report sites when you sell online? What tipped you off first?  Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Craigslist car report scam targets vehicle sellers Read More »

soyuz

NASA Sets Coverage for Crew Launch to Join Station Expedition

NASA astronaut Chris Williams will launch aboard the Roscosmos Soyuz MS-28 spacecraft to the International Space Station on Thursday, Nov. 27, accompanied by cosmonauts Sergey Kud-Sverchkov and Sergei Mikaev, where they will join the Expedition 73 crew advancing scientific research.
Williams, Kud-Sverchkov, and Mikaev will lift off at 4:27 a.m. EST (2:27 p.m. Baikonur time) from the Baikonur Cosmodrome in Kazakhstan. Live launch and docking coverage will be available on NASA+, Amazon Prime, and the agency’s YouTube channel. Learn how to watch NASA content through a variety of platforms, including social media.
After a two-orbit, three-hour trip to the orbital complex, the spacecraft will automatically dock to the station’s Rassvet module at approximately 7:38 a.m. Shortly after, hatches will open between Soyuz and the space station.
Once aboard, the trio will join NASA astronauts Mike Fincke, Zena Cardman, and Jonny Kim, JAXA (Japan Aerospace Exploration Agency) astronaut Kimiya Yui, and Roscosmos cosmonauts Sergei Ryzhikov, Alexey Zubritsky, and Oleg Platonov.
NASA’s coverage is as follows (all times Eastern and subject to change based on real-time operations):
Thursday, Nov. 27
3:30 a.m. – Launch coverage begins on NASA+, Amazon Prime, and YouTube.
4:27 a.m. – Launch
6:45 a.m. – Rendezvous and docking coverage begins on NASA+, Amazon Prime, and YouTube.
7:38 a.m. – Docking to the space station
9:50 a.m. – Hatch opening and welcome remarks coverage begins on NASA+, Amazon Prime, and YouTube.
10:10 a.m. – Hatch opening
Williams, Kud-Sverchkov, and Mikaev will spend approximately eight months aboard the space station as Expedition 73/74 crew members, before returning to Earth in summer 2026. This will be the first spaceflight for Williams and Mikaev, and the second for Kud-Sverchkov.
During his stay aboard station, Williams will conduct scientific research and technology demonstrations aimed at advancing human space exploration and benefiting life on Earth. He will help install and test a new modular workout system for long-duration missions, support experiments to improve cryogenic fuel efficiency and grow semiconductor crystals in space, and assist NASA in designing new re-entry safety protocols to protect crews during future missions.
For more than 25 years, people have lived and worked continuously aboard the International Space Station, advancing scientific knowledge and making research breakthroughs that are not possible on Earth. The station is a critical testbed for NASA to understand and overcome the challenges of long-duration spaceflight and to expand commercial opportunities in low Earth orbit. As commercial companies concentrate on providing human space transportation services and destinations as part of a robust low Earth orbit economy, NASA is focusing its resources on deep space missions to the Moon as part of the Artemis campaign in preparation for future human missions to Mars.
Learn more about International Space Station research and operations at:
https://www.nasa.gov/station
-end-
Joshua Finch / Jimi RussellHeadquarters, Washington202-358-1100joshua.a.finch@nasa.gov / james.j.russell@nasa.gov
Sandra Jones / Joseph Zakrzewski Johnson Space Center, Houston 281-483-5111 sandra.p.jones@nasa.gov / joseph.a.zakrzewski@nasa.gov 

NASA Sets Coverage for Crew Launch to Join Station Expedition Read More »

android uninstall app google play

Manage Android apps with the new ‘Uninstall’ button

NEWYou can now listen to Fox News articles!
If you use more than one Android device with the same Google account, you know how messy things can get.Tracking which apps are installed on which phone or tablet can quickly become confusing. The Google Play Store already showed how many of your devices had a particular app, but uninstalling apps across multiple devices required digging through several menus.That’s changing now, thanks to Google’s latest Play Store update.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERS A new Play Store update makes it easier to manage apps across all your Android devices. (Kurt “CyberGuy” Knutsson)The new uninstall button rolls outGoogle is rolling out version 48.8 of the Play Store, and it introduces a new ‘Uninstall’ button right on each app’s listing. You can now remove an app from any of your devices directly from your main phone. This eliminates the need to pick up each device and remove the app one by one. According to Android Authority and other reliable tech outlets, this feature appears beside each Android device listed under your account, making it faster to keep your devices organized and clutter-free.The update replaces the older process that required navigating through ‘Profile,’ then ‘Manage Apps and Devices,’ then applying a device filter before uninstalling. That long-winded method still works, but the new shortcut saves time and effort. The feature is rolling out gradually, so you might not see it right away, but it should appear soon as part of the stable update.Why this update mattersFor anyone juggling a phone, tablet or even a work device, this new feature makes a real difference. Over time, unused apps pile up, taking up storage space and slowing down performance. Being able to remove them remotely helps keep every device clean and efficient without switching between screens.The change also improves digital hygiene. Many people forget about apps on old phones that still have access to personal data or permissions. Now you can easily remove those apps before they become a privacy or security risk. The update also makes it simpler for parents managing family devices to stay in control of what’s installed on their kids’ phones.How to use the new uninstall button on Android Settings may vary depending on your Android phone’s manufacturer. Open the Play Store app on your device.Navigate to the listing of an app that you know is installed on another device signed in to your account.Under the “Installed on X devices” section, you may see a new ‘Uninstall’ button next to each listed device.Tap Uninstall next to the one you want to remove from your Android.Then click This Device.GOOGLE CHROME AUTOFILL NOW HANDLES IDS Steps to use the new uninstall button on Android. (Kurt “CyberGuy” Knutsson)How to uninstall Android apps when the new Play Store button isn’t showingWait for the update to roll out if key features aren’t showing yet. If the button isn’t present, you can still uninstall an app with these steps:Settings may vary depending on your Android phone’s manufacturer.Click Profile.Tap Manage apps & devices.Click Manage.Use the device filter to select the target device.Press the app you want to uninstall.Click uninstall.CLICK HERE TO DOWNLOAD THE FOX NEWS APP The new feature saves time and improves organization across a user’s Android devices. (Kurt “CyberGuy” Knutsson)What this means to youThis feature saves time, improves organization and helps you keep your Android devices running smoothly. By uninstalling unused apps remotely, you free up valuable storage and reduce unnecessary background activity that can drain battery life. You also make your devices more secure by removing older apps that might not be receiving updates anymore. It’s a thoughtful update that shows how Google is paying attention to everyday usability rather than adding flashy new tools. Even if it seems like a small change, the impact adds up for people who live in a multi-device world.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysThe new ‘Uninstall’ button in Play Store version 48.8 is a quiet but powerful improvement for Android users. It makes it easier to manage your apps and maintain a cleaner digital environment across all your devices. Once this update reaches your phone, it’s worth exploring which apps you no longer need and removing them in just a few seconds.Do you plan to tidy up your devices using the new Google Play Store feature, or do you prefer to manage apps directly from each phone? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Manage Android apps with the new ‘Uninstall’ button Read More »

nasa perseverance rover

Perseverance rover spots mysterious ‘visitor from outer space’ rock on Mars surface after 4 years

NEWYou can now listen to Fox News articles!
NASA’s Perseverance rover may have stumbled on a visitor from outer space – a strange, shiny rock on Mars that scientists think could be a meteorite forged in the heart of an ancient asteroid.According to a new blog post on the rover’s mission page, the rock – nicknamed “Phippsaksla” – stood out from the flat, broken terrain around it, prompting NASA scientists to take a closer look.Tests revealed high levels of iron and nickel, the same elements found in meteorites that have crashed onto both Mars and Earth.While this isn’t the first time a rover has spotted a metallic rock on Mars, it could be the first for Perseverance. Earlier missions – including Curiosity, Opportunity, and Spirit – discovered iron-nickel meteorites scattered across the Martian surface, making it all the more surprising that Perseverance hadn’t seen one until now, NASA said.MASSIVE ASTEROID BIGGER THAN A SKYSCRAPER HEADING TOWARD EARTH AT 24,000 MPH NASA’s Perseverance rover discovered a shiny metallic rock that scientists believe could be a meteorite forged in the heart of an ancient asteroid. (NASA via Getty Images)Now, just beyond the crater’s rim, the rover may have finally found one – a metallic rock perched on ancient impact-formed bedrock. If confirmed, the discovery would place Perseverance alongside the other Mars rovers that have examined fragments of cosmic visitors to the red planet.To learn more about the rock, the team aimed Perseverance’s SuperCam – an instrument that fires a laser to analyze a target’s chemical makeup – at Phippsaksla. The readings showed unusually high levels of iron and nickel, a combination NASA said strongly suggests a meteorite origin.Mounted atop the rover’s mast, SuperCam uses its laser to vaporize tiny bits of material, so sensors can detect the elements inside from several meters away.SCIENTISTS SPOT SKYSCRAPER-SIZED ASTEROID RACING THROUGH SOLAR SYSTEM The shiny rock nicknamed “Phippsaksla,” discovered by NASA’s Perseverance rover, showed high levels of iron and nickel consistent with meteorites found on Mars and Earth. (NASA)The finding is significant, NASA noted, because iron and nickel are typically found together only in meteorites formed deep within ancient asteroids – not in native Martian rocks.If confirmed, Phippsaksla would join a long list of meteorites identified by earlier missions, including Curiosity’s “Lebanon” and “Cacao” finds, as well as metallic fragments spotted by Opportunity and Spirit. NASA said each discovery has helped scientists better understand how meteorites interact with the Martian surface over time.Because Phippsaksla sits atop impact-formed bedrock outside Jezero crater, NASA scientists said its location could offer clues about how the rock formed and how it ended up there.MASSIVE COMET ZOOMING THROUGH SOLAR SYSTEM COULD BE ALIEN TECHNOLOGY, HARVARD ASTROPHYSICIST SAYS NASA scientists say the metallic rock spotted by Perseverance may be a meteorite formed deep within an ancient asteroid before crashing onto Mars. (NASA)For now, the agency said its team is continuing to study Phippsaksla’s unusual makeup to confirm whether it truly came from beyond Mars.If proven to be a meteorite, the find would mark a long-awaited milestone for Perseverance – and another reminder that even on a planet 140 million miles away, there are still surprises waiting in the dust.Perseverance, NASA’s most advanced robot to date, traveled 293 million miles to reach Mars after launching on a United Launch Alliance Atlas V rocket from Cape Canaveral Space Station in Florida on July 30, 2020. It touched down in Jezero crater on Feb. 18, 2021, where it has spent nearly four years searching for signs of ancient microbial life and exploring the planet’s surface.CLICK HERE TO DOWNLOAD THE FOX NEWS APPBuilt at NASA’s Jet Propulsion Laboratory in Pasadena, California, the $2.7 billion rover is about 10 feet long, 9 feet wide, and 7 feet tall – roughly 278 pounds heavier than its predecessor, Curiosity. Powered by a plutonium generator, Perseverance carries seven scientific instruments, a seven-foot robotic arm, and a rock drill that allows it to collect samples that could one day return to Earth. The mission will also help NASA prepare for future human exploration of Mars in the 2030s.

Perseverance rover spots mysterious ‘visitor from outer space’ rock on Mars surface after 4 years Read More »

iss073e0420732large

Celebrating 25 Years of Humanity in Space 

In 2025, NASA and its international partners celebrate 25 years of continuous human presence aboard the International Space Station. Since November 2, 2000, more than 290 people from 26 countries have lived and worked aboard the orbiting laboratory, conducting thousands of experiments that have advanced science and technology on Earth and paved the way for Artemis missions to the Moon and future journeys to Mars. 
Beyond its role as a science platform, the station has been a bridge—connecting cultures, sparking creativity, and inspiring generations. The memories of Johnson Space Center employees reflect how the orbiting laboratory is not only an engineering marvel but also a deeply human endeavor.  
Christopher Brown – Advancing Life Support Systems for Future Exploration 

As a space station Environmental Control and Life Support System (ECLSS) integrator, Christopher Brown’s role has been ensuring astronauts have clean air and water. ECLSS removes carbon dioxide from the air, supplies oxygen for breathing, and recycles wastewater—turning yesterday’s coffee into tomorrow’s coffee. Today, these systems can recover nearly 98% of the water brought to the station.  
His proudest memory was commissioning regenerative life support systems and raising a symbolic toast with the crew while on console in mission control. He also helped activate the Water Storage System, saving crew time and improving operations on station. For Brown, these milestones were vital steps toward future long-duration missions beyond Earth. 
Stephanie Sipila – The Heart of Microgravity Research  

Stephanie Sipila, now integration manager for NASA’s Extravehicular Activity and Human Surface Mobility Program, began her career as a mechanical and robotic systems instructor for the orbital outpost. Her favorite experiment, Engineered Heart Tissues, studies microgravity’s effect on the human heart to help develop new treatments for cardiovascular disease. She recalls NASA astronaut Sunita Williams running the Boston Marathon on a treadmill aboard station, becoming the first person to complete the race in space and showing how astronauts stay connected to Earth while living on orbit.  
Sipila also highlights the Spacesuit Art Project, an initiative that turned artwork from children with cancer into spacesuits flown to and worn aboard the orbital outpost during live downlinks, connecting science, art, and hope — and raising awareness of cancer research conducted aboard the orbital outpost.  
Liz Warren – Where Exploration Meets Humanity 

Space station Associate Chief Scientist Liz Warren has seen firsthand how the Spacesuit Art Project uplifted children on Earth. During Expedition 52, she watched astronaut Jack Fischer wear a suit covered in artwork created by young cancer patients, including his own daughter, a survivor. “It was incredibly touching to note the power of art and inspiration. Human spaceflight requires fortitude, resilience, and teamwork—so does fighting childhood cancer,” Warren said. 
Her memories also extend to her time as an operations lead for NASA’s Human Research Program, which uses research to develop methods to protect the health and performance of astronauts in space to prepare for long-duration missions. While out for a weekend run, Warren received a call from the Payload Operations and Integration Center in Huntsville, Alabama. An astronaut on station, following a prescribed diet for a research study, wanted to swap out a food item. Warren coordinated with her support team and relayed the decision back to orbit—all while continuing her run. The moment, she recalls, underscored the constant, real-time connection between astronauts in space and teams on the ground. 
Adam Baker – Checkmate: Space Debris Cleanup 

As an aerospace engineer, Adam Baker helped track experiments and spacecraft operations from mission control. Baker remembers when mission control played a live chess match with astronaut Greg Chamitoff during Expedition 17, a moment that showed the unique ways the station connects crews in orbit with people on Earth. His favorite technical project, though, was the RemoveDebris small satellite, deployed from the station in 2018 to test technologies for cleaning up space junk. “Knowing these experiments could one day help keep the orbital environment safe made it even more meaningful,” he said.   
Michael McFarlane – Training for Success 

As chief of the Simulation and Graphics Branch, Michael McFarlane prepared astronauts for space station assembly missions using high-fidelity simulators. “My greatest memory is seeing the station grow as we successfully executed assembly missions that looked very much like what we analyzed and trained for in our ground-based simulations,” he said. 
A Legacy of Ingenuity and Community 

In the Mission Evaluation Room, engineers not only troubleshoot in real time but also celebrate milestones with traditions like “MERloween,” where controllers dress in space-themed costumes to honor the year’s lessons learned. 

For social media consultant Mark Garcia, sharing the station story with the public has been the highlight of his career. His favorite moment was watching NASA’s SpaceX Crew-9 splash down in 2025, greeted by dolphins in the Gulf of America. “I love writing about the science aboard the station that benefits people on Earth,” he said. 
For 25 years, the International Space Station has shown what humanity can accomplish together. The lessons learned aboard will guide Artemis missions to the Moon and future journeys to Mars—ensuring the next 25 years are built on innovation, resilience, and the human spirit. 

Celebrating 25 Years of Humanity in Space  Read More »

holiday shopping

Protect your data before holiday shopping scams strike

NEWYou can now listen to Fox News articles!
The holiday season is the happiest and riskiest time of year to be online. As millions of us gear up for Black Friday and Cyber Monday deals, scammers do the same.Every year, they target holiday shoppers with fake websites, “too-good-to-be-true” deals and scam emails that look identical to legitimate retailers. But here’s the part most people miss: scammers don’t just rely on luck. They already have your personal data before you even click “add to cart.”From leaked email addresses to exposed phone numbers and home addresses, your personal information is being bought and sold by data brokers, companies that collect and resell detailed profiles about you. Those profiles are exactly what scammers use to send realistic “order confirmations,” fake delivery alerts and “urgent payment” texts during this holiday period and beyond.Let’s unpack how this works and what you can do now to stay safe before the holiday chaos begins.RETIREES LOSE MILLIONS TO FAKE HOLIDAY CHARITIES AS SCAMMERS EXPLOIT SEASONAL GENEROSITYSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. Scammers ramp up fake websites and emails during the holiday shopping rush. (iStock)Why scammers love the holiday seasonNovember through December is a goldmine for cybercriminals. According to the CISA, reports of online shopping scams spike during this time of year and vary in their approaches. The reason? We let our guard down when we’re rushed, distracted or excited by a deal. Staying alert during the holiday season can help you avoid data exposure and financial losses. Here are some of the most common scams you should be aware of. Phantom storesThe surge of promotions during the holiday season is the perfect time for “phantom stores” to thrive. It’s a fraudulent store that mimics the interface and products of a well-known brand. Once you purchase from such a website, you’ll never receive your order as the store doesn’t actually exist.Real-world example: Fake IKEA websites appeared with URLs spelled “ikeaa-sale.com” and “ikea-blackfriday.shop,” mimicking the official ikea.com interface with copied product images, logos and discount banners.They lured shoppers with huge discounts and clearance offers to steal credit card data. Eventually, they were reported and taken down, but the damage has been done.What to do? Always check the URL of the store you shop at and only click links from the store’s official website or social media.Delivery scamsAccording to recent research, some of the most popular shopping apps like Temu are selling your location data to third parties. It’s no surprise that you might receive fake delivery texts. Your leaked data fuels realistic “order” and “delivery” scams online. (iStock)MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACHReal-world example: Temu is a popular app for scammers to mimic. They can easily find your contact information and order details to text “Your order couldn’t be delivered.” Each text contains a phishing link that can install malware on your device or steal your personal information. That’s why Temu warns its users about the couriers they partner with.What to do? Make sure the texts you receive come from a legit courier service and double-check it on the store’s website.Fake order emailsSome scammers use sophisticated phishing tactics to lure victims. They engineer emails from well-known brands, use an urgent tone, place malicious links and urge you to click on your order status. In reality, there is no order status – they’re stealing your data.Real-world example: Amazon is one of the biggest online retailers worldwide, and that makes the brand easy to mimic. Scammers send emails on behalf of Amazon to try to steal customers’ personal data because it’s highly likely that their victims have used Amazon, making it less suspicious. However, phishing emails have some telltale signs you can look out for.What to do? Never click on any suspicious links and always check the sender’s contact information.Unwanted data exposureWhen you shop online, you should be aware of the data you share, including your contact information, shopping habits, credit card details and more. All stores collect some type of data about you. However, some companies collect more than you think.Real-world example: The infamous Target controversy in 2012 revealed how big retailers use data analysis to predict your shopping behavior. The company collected shopping data and managed to produce a predictive model for soon-to-be mothers.They sent out brochures with baby clothes, vouchers for baby formula and more before the customers even knew they were pregnant. Thankfully, modern shopping looks a bit different. You can opt out of certain data collection and exercise your right to remove personal information from websites that collect it.What to do? Check what data the stores collect about you and request the removal of any private information you don’t want them to have.THE TRUTH BEHIND THOSE MYSTERIOUS SHIPMENT EMAILS IN YOUR INBOXHow scammers find youImagine you’re browsing for gifts online. Within minutes, your activity generates data points – device info, IP address, browsing habits that feed into online databases. At the same time, data brokers already have your full profile: age, income, address history, family members and even shopping behavior. These profiles are sold to marketers and often leak into criminal databases.That’s why scam calls, texts and emails often feel so “real.” They use your name, the right retailer, even your city. They’re not guessing. They’ve bought your digital footprint.The “holiday cleanup” your data needsMost people clear their browser cookies or delete old emails to “stay private.” But that’s like locking your front door while leaving all your personal documents on the lawn.If you want to stop scammers from targeting you this holiday season, you need to remove your personal data from the source, the data broker databases that feed these scams.That’s where a data removal service comes in. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.Practical steps before you shopTo make sure your online shopping season stays stress-free and scam-free, here’s what CyberGuy recommends doing this week:INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU1) Run a privacy scan with a data removal serviceBefore the holiday rush, remove your exposed data from data brokers. You’ll reduce the number of scam calls, emails and texts you get this season and protect your financial info before it’s too late. Take control by removing personal data from broker databases before you shop. (iStock)2) Secure your emailUse strong, unique passwords for each online store or service. Consider a password manager to simplify this.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.3) Check for fake storesBefore clicking a social media ad or email, hover over the link. Legit retailers use secure “https://” URLs and their exact brand name – no extra words or letters.4) Avoid public Wi-FiDon’t shop or enter payment info over public Wi-Fi in an airport, café or mall, for example. Scammers can easily intercept unencrypted traffic.5) Use credit cards or PayPal – not debit cardsHACKERS TARGET ONLINE STORES WITH NEW ATTACKCredit cards have stronger fraud protection and make it easier to dispute unauthorized charges.6) Enable two-factor authentication (2FA)Turn on 2FA for your email, bank and shopping accounts. Even if scammers get your password, they can’t log in without your second verification step.7) Keep your software and apps updatedCybercriminals often exploit outdated browsers or apps. Update your phone, computer and shopping apps before the holiday rush to close those security holes.8) Monitor your bank and credit statementsCheck your accounts daily during the shopping season. The faster you spot a suspicious charge, the easier it is to reverse and protect your funds.Kurt’s key takeawaysBlack Friday through Cyber Monday is the peak time for data harvesting. Every purchase, coupon code and sign-up adds to the profile that marketers and data brokers hold on you. That information can linger online for years, long after the sales end. The good news? It’s easier than ever to reclaim your privacy. By taking just a few minutes today, you can enjoy the holidays knowing your personal data is no longer on the open market.CLICK HERE TO DOWNLOAD THE FOX NEWS APPHow confident are you that your personal data isn’t already fueling a scam this holiday season? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.  

Protect your data before holiday shopping scams strike Read More »

Popular TP-Link routers could be banned after risks exposed

NEWYou can now listen to Fox News articles!
A major national security debate is unfolding, and it affects more than government networks. It touches your home, your devices, and the Wi-Fi your family uses every day. The Commerce Department has proposed blocking new sales of TP-Link products after a months-long review into the company’s ties to China, citing a growing TP-Link security risk.Multiple agencies, including Homeland Security and Defense, supported that proposal. They believe the company’s connections could expose American networks to foreign influence.Security experts warn that foreign-backed hackers have targeted home and office routers for years. These devices often act as silent stepping stones that help attackers move deeper into sensitive systems. When compromised, they can expose everything connected to them, including computers, smart home gear, military devices used on base and more.This potential ban would be one of the biggest consumer tech actions in U.S. history. It comes as lawmakers raise fresh alarms about Chinese-made cameras, routers and connected home products sold on military exchanges and in homes across the country.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.CHINESE HACKERS BREACH US NUCLEAR SECURITY AGENCY IN CYBERATTACK OPERATION, OFFICIALS SAY The proposed TP-Link ban stems from growing concerns that foreign-linked routers and cameras could expose American homes and networks to outside influence. (Kurt “CyberGuy” Knutsson)Why military families are even more vulnerableLawmakers from both parties say military households face extra risk. Sen. Joni Ernst (R-Iowa), who leads a bipartisan group of 23 lawmakers, warns that TP-Link cameras and networking devices sold on Army, Navy and Air Force exchange sites could expose sensitive footage from base housing and dorms. Rep. Ashley Hinson (R-Iowa) echoed that concern, saying these devices could act as a backdoor for Chinese intelligence to collect information on service members and their families. Even when products appear out of stock, officials worry they remain popular in military communities.These lawmakers say Chinese laws could force companies to share data or push hidden software changes that weaken U.S. networks. They argue that this creates a real risk for households on or near military installations. While TP-Link disputes every allegation and states that it stores U.S. data inside America, lawmakers want a deeper investigation.”China will use any way to infiltrate us, and we must ensure they cannot access our homeland or military bases,” said Ernst. “High-tech security cameras sending video and audio directly back to Beijing must be treated like the grave threat that they are. We have seen this playbook from China before, with Huawei Technologies, and need the Trump administration to investigate and determine if TP-Link is a trojan horse compromising our national security.”10M AMERICANS HIT IN GOVERNMENT CONTRACTOR DATA BREACHHow Congress is responding to TP-Link security risksSen. Ernst is pressing the Commerce Department to finish its investigation by November 30. Sen. Tom Cotton (R-Arkansas), who chairs the Senate Intelligence Committee, says TP-Link could give the Chinese government access to American networks and wants faster action. Their concerns reflect past decisions involving Huawei and Kaspersky, which lost access to the U.S. market due to national security risks.Congressional leaders say foreign-made smart home devices sold on military bases should face strict scrutiny. They see routers, cameras and other connected home gear as critical targets in a time when cyberthreats continue to grow.We reached out to TP-Link Systems Inc., and a spokesperson provided CyberGuy with the following statement:”TP-Link Systems Inc. (TP-Link), an American company based in California, refutes the claims in this letter. This letter repeats false and misleading media reports and attacks that have been thoroughly debunked.””TP-Link emphatically objects to any allegation it is tied to the Communist Party of China, dependent on the Chinese government, or otherwise subject to interference under Chinese national security laws,” the TP-Link spokesperson said. “The company is not controlled by any government, foreign or domestic. TP-Link has split from and has no affiliation with the China-based TP-LINK Technologies Co. Ltd., which is separately owned and operated. Lawmakers warn that TP-Link devices sold on military bases may put service members and their families at greater risk, especially inside base housing. (John Moore/Getty Images)This letter has nothing to do with security and everything to do with a competitor trying to remove TP-Link Systems’ products from the marketplace. The “open source information” the members reference is actually a manufactured echo chamber of false and misleading attacks that the media has parroted over the past year. Instead of directly engaging with TP-Link Systems, these members essentially pressed “copy and paste” on unsubstantiated claims about our American company.TP-Link has not been contacted by policymakers to discuss the alleged concerns, but if we were to meet with them, they would learn that TP-Link has located its core security functions and data infrastructure in the United States. U.S. user data is securely stored on Amazon Web Services infrastructure in Virginia, under the full control of the company’s U.S. operations.TP-Link Systems currently holds a very small share of the U.S. security camera market, representing approximately 3% of the consumer market segment according to Circana checkout data. The company has virtually no business presence in the enterprise segment. Additionally, TP-Link Systems’ router market share in the U.S. has been inaccurately reported as being much higher than it actually is. Recent market research from Dell’Oro Group, Inc., found that TP-Link Systems’ market share of residential Wi-Fi router sales in North America is under 10%.TP-Link does not enable foreign surveillance of U.S. networks or users. The company’s operations are built to prevent potential attempts to subvert its business by outside influence. TP-Link’s substantial security investments cover its entire product portfolio, including security cameras and routers.TP-Link continually monitors its products and services and takes timely and appropriate action to address vulnerabilities it becomes aware of. TP-Link has not identified any reliable information regarding new vulnerabilities in its products in connection with this letter.”FBI WARNS OF HACKERS EXPLOITING OUTDATED ROUTERS. CHECK YOURS NOWSteps to protect yourself from this growing threatEven as the debate continues, you can take simple steps to secure your home. These easy moves help defend against threats tied to any router brand.1) Check your router and update itLook at the brand on your router. Then update the firmware through the official app or web dashboard. If your device is several years old or no longer supported, replace it. Check out our article on the top routers for the best security at Cyberguy.com.2) Change your Wi-Fi and admin passwordsDefault passwords are dangerous. Create strong, unique passwords for both your Wi-Fi and the router’s admin panel. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 atCyberguy.com Congress is pressing for a fast investigation amid fears that foreign-made smart home gear could become a gateway for cyberthreats across the country. (Cyberguy.com)3) Use strong antivirus protection on every deviceThreats like this continue to grow. Install strong, real-time antivirus protection on every computer, phone, and tablet in your home. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.4) Turn off any of these features you do not needDisable remote access, WPS and extra features you never use. These settings can open doors for attackers.5) Put smart home devices on a guest networkKeep laptops and phones on your main network. Put cameras, plugs, TVs and IoT devices on a separate guest network so they cannot reach your sensitive devices.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysThe debate around TP-Link shows how something as routine as a home router can become part of a broader security conversation. Whether or not the government issues a ban, this moment is a clear reminder that cybersecurity starts at home. Small steps make a meaningful difference in how well your devices stand up against foreign-backed hacking groups.Should the government ban router brands linked to foreign influence or should consumers decide for themselves? Let us know by writing to us at Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.

Popular TP-Link routers could be banned after risks exposed Read More »

1 hyundai autoever america breached know the risks to you

Hyundai AutoEver America breached: Know the risks to you

NEWYou can now listen to Fox News articles!
Hyundai AutoEver America discovered on March 1, 2025, that hackers had compromised its systems. Investigators found the intrusion began on February 22 and continued until March 2. Hyundai AutoEver America (HAEA) provides IT services for Hyundai Motor America, including systems that support employee operations and certain connected-vehicle technologies. While the company works across Hyundai’s broader ecosystem, this incident did not involve customer or driver data.According to the statement provided to CyberGuy, the breach was limited to employment-related information tied to Hyundai AutoEver America and Hyundai Motor America. The company confirmed that about 2,000 current and former employees were notified of the incident in late October. HAEA said it immediately alerted law enforcement and hired outside cybersecurity experts to assess the damage.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. Cybercriminals targeted Hyundai AutoEver America’s systems, exposing sensitive data. (Kurt “CyberGuy” Knutsson)Why this Hyundai AutoEver America breach mattersThe exposed data reportedly includes names, Social Security numbers and driver’s license numbers, making this breach far more serious than one involving passwords alone. Experts warn that these details can be used for long-term identity theft and financial fraud. Because Social Security numbers cannot easily be changed, criminals have more time to create fake identities, open fraudulent accounts and launch targeted phishing attacks long after the initial breach. Experts warn that stolen Social Security and driver’s license information could be used for identity theft and fraud. (Kurt “CyberGuy” Knutsson)Who was affected in the Hyundai AutoEver America data incidentAEA manages select IT systems tied to Hyundai Motor America’s employee operations, along with broader technology functions for Hyundai and Genesis across North America. Its role includes supporting connected-vehicle infrastructure and dealership systems.According to the company, this incident was limited to employment-related data and primarily affected approximately 2,000 current and former employees of Hyundai AutoEver America and Hyundai Motor America. No customer information or Bluelink driver details were exposed. While some filings reference sensitive data types such as Social Security numbers or driver’s license information, the incident did not involve Hyundai customers or the millions of connected vehicles HAEA supports.Earlier reports suggested that 2.7 million individuals were affected, but Hyundai says that figure is unrelated to the breach. Instead, 2.7 million is the estimated number of connected vehicles that Hyundai AutoEver America helps support across North America. None of that consumer or vehicle data was accessed.GENESIS PREVIEWS G70 SPORTS SEDAN WITH NEW YORK CONCEPTHyundai also clarified that the United States has about 850 Hyundai dealerships and emphasized that the scope of this incident was narrow and contained.We reached out to HAEA for a comment, and a representative for the company provided CyberGuy with this statement:”Hyundai AutoEver America, an IT vendor that manages certain Hyundai Motor America employee data systems, experienced an incident to that area of business that impacted employment-related data and primarily affected current and former employees of Hyundai AutoEver America and Hyundai Motor America. Approximately 2,000 primarily current and former employees were notified of the incident. The 2.7 million figure that is cited in many media articles has no relation to the actual security incident. The 2.7 million figure represents the alleged total number of connected vehicles that may be supported by Hyundai AutoEver America across North America. No Hyundai consumer data was exposed, and no Hyundai Motor America customer information or Bluelink driver data was compromised.” Scammers may now pose as company representatives, contacting people to steal more personal details. (Kurt “CyberGuy” Knutsson)What you should do right nowMonitor your bank, credit card and vehicle-related accounts for suspicious activity.Check for a notification letter from Hyundai AutoEver America or your car brand.Enroll in the two years of complimentary credit monitoring offered by HAEA if you qualify.Enable multi-factor authentication (MFA) on all important accounts, including those tied to your vehicle.Be cautious of emails, texts or calls claiming to be from Hyundai, Kia or Genesis. Always verify through official websites.Smart ways to stay safe after the Hyundai AutoEver America breachWhether you were directly affected or just want to stay alert, this breach is a reminder of how important it is to protect your personal information. Follow these practical steps to keep your data secure and reduce the risk of identity theft or scams.HYUNDAI TO RECALL GENESIS CARS TO FIX BRAKES1) Freeze or alert your creditContact major credit bureaus — Experian, TransUnion and Equifax — to set a fraud alert or freeze. This helps block new accounts from being opened in your name.2) Protect your vehicle appsIf you use apps tied to your vehicle, update passwords and enable multi-factor authentication. Avoid saving login details in unsecured places. Also, consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com3) Watch for fake support messagesScammers may use news of the Hyundai AutoEver America breach as a way to contact Hyundai, Kia or Genesis owners, pretending to be from customer support or the dealership. They might claim to help verify your account, update your information or fix a security issue. Do not share personal details or click any links. Type the brand’s web address directly into your browser instead of clicking links in messages or emails. Always confirm through the official brand website or by calling the verified customer service number.4) Use strong antivirus protectionUsing strong antivirus software helps block phishing links, malware downloads and fake websites that might appear after a data breach. It can also scan your devices for hidden threats that may try to steal login data or personal files.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.5) Use a data removal serviceData removal tools automatically find and delete your personal information from people-search and data-broker sites. These services reduce the chances that criminals will use leaked data to target you with phishing or social-engineering scams.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.6) Monitor your digital footprintConsider using identity monitoring services to track your personal information and detect possible misuse early.Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.7) Keep your devices updatedRegularly install security updates on your phone, laptop and smart car systems to reduce the risk of further attacks.8) Report suspicious activity the right wayIf you notice unusual account activity, fraudulent charges, or suspicious messages that appear tied to this breach, report it immediately. Start by contacting your bank or credit card provider to freeze or dispute any unauthorized transactions. Then, file a report with the Federal Trade Commission (FTC) at IdentityTheft.gov, where you can create an official recovery plan. If you suspect a scam message or call, forward phishing emails to reportphishing@apwg.org and report fake texts to 7726 (SPAM).CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysThis incident highlights how much personal data is connected to modern cars and how vulnerable those systems can be. When your vehicle is linked to your identity, protecting your data becomes just as important as maintaining the car itself. Stay alert, use the tools available to safeguard your accounts and report any suspicious activity right away.Should companies like Hyundai AutoEver be doing more to keep customer data secure? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Hyundai AutoEver America breached: Know the risks to you Read More »