Space & Science

News and insights from NASA, ESA, and the frontier of space exploration and scientific discovery.

1 washington judge rules ai camera images are public

Washington court says Flock camera images are public records

NEWYou can now listen to Fox News articles!
A Skagit County Superior Court judge ruled that images from Flock Safety automated license plate reader cameras in Stanwood and Sedro-Woolley qualify as public records under Washington’s Public Records Act.Judge Elizabeth Yost Neidzwski said the images are “not exempt from disclosure” and explained that an agency does not need to physically hold a record for it to fall under the law.The request that led to the rulingThe case began when Washington resident Jose Rodriguez asked Stanwood for one hour of Flock camera images. That request prompted Stanwood and neighboring Sedro-Woolley to ask the court to declare that vendor-stored data did not count as public records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Judge Neidzwski rejected that argument. She said the cities’ ALPR images support a government purpose and meet the definition of a public record.SEATTLE ELECTS DEMOCRATIC SOCIALIST KATIE WILSON AS MAYOR Flock Safety cameras use AI to capture license plate images in real time, tracking vehicles as they move through neighborhoods. (Flock Safety)However, Rodriguez will not receive the specific images he sought. The city had already allowed the footage to auto-delete after 30 days, and it expired before the ruling.We reached out to Flock Safety, and a spokesperson provided CyberGuy with the following statement:”The Court merely declined to exempt these records from disclosure under Washington’s extremely broad public records law. Nothing changed in the status quo in Washington as a result of this ruling — these records were covered by the law before the ruling, and remain so following the ruling. Unfortunately, some individuals in Washington have abused the breadth of the public records law to extort significant settlements from Washington communities for technical violations of the disclosure requirements, which we cannot believe is the intent of the law. We are supporting efforts to enact a legislative fix to this situation, which is costing Washington communities tens of thousands of dollars to stave off frivolous lawsuits.” The Washington court ruling marks a major step toward transparency in how police collect and store surveillance data. (Flock Safety)Why the decision matters for transparencyFlock’s automated license plate reader cameras capture multiple still images of passing vehicles along with time, location and license plate information. Cities use the system to assist law enforcement with investigations, relying on stored images to identify vehicles connected to crimes or alerts.The court’s ruling raises broader questions about how local agencies manage these images once they’re created. By finding that the images qualify as public records, the decision forces cities to examine how long they retain this data, how it is stored and who may request access under state law. Privacy advocates say the ruling highlights the need for clear policies around retention and transparency, while law enforcement groups argue that access rules must still protect ongoing investigations.AI DASHCAMS ENHANCE TRUCKER SAFETY WHILE RAISING PRIVACY CONCERNS The debate continues as communities weigh the balance between public safety, privacy and the right to know what’s being recorded. (Flock Safety)How this ruling impacts privacy and surveillanceFor years, cities and police agencies have argued that data stored by third-party vendors falls outside public records laws. They often make this claim even when the data documents activity on public roads. The Washington ruling did not settle broader questions about surveillance, but it rejected the idea that Flock camera images are exempt simply because a vendor stores them. This decision exposes a growing tension between how agencies use surveillance tools and what the public can access under state law.Beryl Lipton of the Electronic Frontier Foundation, a nonprofit dedicated to defending digital privacy, free expression and transparency in technology, told Cyberguy, “The use of third-party vendors for surveillance and data storage is widespread and growing across the country, and allowing this to undermine the public’s right to know is very dangerous. The government’s primary obligation should be to its constituents, which includes protecting their rights under public records laws, not to the private vendors that they choose to employ while conducting mass surveillance. Whether an agency stores images and information on their own devices or on the private server of a vendor should not affect the appropriate disclosure of these records under public records laws. If the use of these devices makes it too difficult for a city to comply with the law, then the response should not be to circumvent the laws they find inconvenient, but rather it should be to only use vendors that won’t get in the way of a city’s ability to fulfill its responsibilities to their citizenry. Otherwise, they should not use these tools at all.”What this means for youIf your town uses Flock or other automated license plate readers, this ruling shows how Washington courts may handle future records requests. It confirms that ALPR images can count as public records, even when a vendor stores the data.The debate over privacy and safety continues. Supporters say public access builds trust and oversight. Critics worry that releasing vehicle data could expose sensitive details without strong safeguards or redactions.CLICK HERE TO DOWNLOAD THE FOX NEWS APPTake my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysThis ruling shows how courts may handle data from automated license plate readers. It also reveals how much vehicle information cities collect. As a result, it raises new questions about who should access these records. In addition, the decision may guide future transparency debates in Washington. However, it will also spark fresh conversations about how surveillance tools fit within state records laws.Do you think public access to AI camera footage improves accountability or puts privacy at risk? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Washington court says Flock camera images are public records Read More »

1 fake flight cancellation texts target travelers

Fake flight cancellation texts target travelers

NEWYou can now listen to Fox News articles!
When your phone buzzes with a message saying your flight is canceled, your first instinct is to panic. Scammers are counting on that. A new travel scam is spreading through fake airline texts that look convincing but connect you to fraudsters instead of customer service.These cybercriminals claim to help rebook your trip. In reality, they’re after your credit card or personal details.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.How the flight cancellation text scam worksThe scam starts with a text that looks like it’s from your airline. It may include your name, flight number and a link or phone number. The message includes urgent language that says your flight is canceled or delayed and tells you to “call this number” or “click to rebook.”PILOT WARNS ‘SHORT-HANDED, STRESSED’ AIR TRAFFIC DELAYS WILL LINGER AFTER SHUTDOWN Scammers send fake flight cancellation texts that look official, using real airline names, flight numbers and logos to trick travelers into calling them. (Kurt “CyberGuy” Knutsson)Once you do, you’re talking to a scammer pretending to be an airline agent. They’ll offer to “help” rebook your flight for a fee. They might ask for payment details or personal information like your birth date or passport number.In some cases, they’ll send confirmation emails that look official to make the lie more believable. AI-generated messages make these scams harder to spot, mimicking airline alerts so well that even frequent flyers can be fooled during busy travel seasons. (Kurt “CyberGuy” Knutsson)Why the scam feels realScammers use real airline names, logos and flight numbers to make their messages look official. Many now use AI tools to generate convincing language and fake confirmations that mimic real airline alerts. These messages often arrive during busy travel seasons or storm delays, which makes them feel even more believable.The Federal Trade Commission (FTC) warns that criminals impersonate airline customer service through fake texts and calls that say your flight is canceled. They use that panic to push you into rebooking or sharing personal details.Meanwhile, the Better Business Bureau (BBB) reports a surge in fake cancellation notices that include phony phone numbers leading straight to scammers.Because these alerts look real and use urgent language, even experienced travelers can mistake them for genuine updates. Staying calm and verifying directly with the airline is the best defense. Staying calm and verifying through official airline apps or websites is the safest way to protect your money and personal information before you take action. (Kurt “CyberGuy” Knutsson)Steps to stay safe from fake flight cancellation textsScammers use fear and urgency to trick travelers into clicking bad links or calling fake numbers. Follow these steps to keep your trip and information safe.1) Verify flight changes only through official airline sourcesAlways confirm flight updates using the airline’s official website or mobile app. Log in directly instead of clicking on links from unexpected texts or emails. Scammers design fake links that look real, but one tap can expose your personal information.PILOT GOES VIRAL FOR REVEALING REAL REASON YOU NEED TO SET YOUR PHONE TO AIRPLANE MODE BEFORE FLYING2) Call only verified airline phone numbersIf you need to call customer service, use the number listed in your booking confirmation, the airline’s app or on its verified website. Never trust a phone number sent by text or social media message. Real airlines will never change their contact information mid-trip.3) Stay calm and spot urgency trapsScammers count on panic. Messages that say “call now,” “act fast” or “your seat will be canceled” are meant to rush you. Slow down and verify before responding. Taking a minute to check the official flight status can prevent you from losing money or data.4) Protect your personal and financial informationLegitimate airline staff will not ask for gift card numbers, wire transfers or your bank login. Use a strong antivirus program to block phishing sites and malware designed to steal personal data if you accidentally click a bad link.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.5) Remove exposed data before scammers find itUse a data-removal service to help scrub your personal details from people-search websites. These sites make it easier for scammers to target travelers by name, location and phone number. Keeping your information private reduces your risk.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.com.6) Report suspicious messages immediatelyForward scam texts to 7726 (SPAM) and report fake airline messages to the Federal Trade Commission at reportfraud.ftc.gov. Sharing reports helps agencies shut down active scams and protect other travelers.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysFake flight cancellation scams are spreading fast, especially during busy travel seasons. Stay calm, verify changes through official airline sources, and never click random links or call unknown numbers. Technology makes travel easier, but awareness and caution are still your best defense.Have you ever received a fake flight alert that almost fooled you? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

Fake flight cancellation texts target travelers Read More »

1 adaptive power in ios 26 boosts iphone battery life

Adaptive Power in iOS 26 boosts iPhone battery life

NEWYou can now listen to Fox News articles!
Battery life matters more than ever as your iPhone takes on heavier workloads from streaming and gaming to AI-driven tasks. Every extra minute of charge now makes a difference in how smoothly your day runs.With iOS 26, Apple introduced Adaptive Power, an intelligent feature that quietly learns how you use your phone and adjusts performance to stretch battery life when you need it most. It is designed to keep your iPhone running stronger for longer without you having to lift a finger.What Adaptive Power doesAdaptive Power helps your iPhone battery last longer when your daily use increases. It works automatically in the background and learns your recent activity to predict when extra power will be needed. When active, it can make small adjustments, such as lowering screen brightness, limiting background activity or turning on Low Power Mode when your battery reaches 20%.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.APPLE, MICROSOFT HIT $4T MILESTONEIt uses on-device intelligence to understand your habits, then fine-tunes performance without requiring any input from you. Apple notes that Adaptive Power pauses its adjustments during tasks that demand maximum performance, like using the camera or gaming with Game Mode turned on. Adaptive Power in iOS 26 learns your daily habits to extend your iPhone’s battery life automatically. (Apple)How Adaptive Power affects real-world useThink of Adaptive Power as a smart battery assistant that adjusts only when needed. It balances performance and power consumption throughout the day, helping your phone last longer without noticeable slowdowns. It trims energy use in high-demand moments, like recording videos, editing photos or multitasking, without disrupting what you’re doing. When it activates, you might see a small notification letting you know it’s working, but otherwise, it operates quietly in the background. The Adaptive Power feature uses on-device intelligence to adjust brightness, limit background tasks and keep performance balanced throughout the day. (Apple)Make sure you have iOS 26 installedTo use Adaptive Power, your iPhone must be running iOS 26. If you’re unsure, here’s how to check and update:Open Settings on your iPhone.Tap General.Tap Software Update.If you see iOS 26 available, tap Download and Install.Keep your phone plugged in and connected to Wi-Fi during the update.Once the update finishes, restart your phone. The feature activates automatically on supported models.Which iPhones support Adaptive PowerOnly iPhones that can run Apple Intelligence will see this feature. Here’s the list:iPhone 17, 17 Pro and 17 Pro MaxiPhone AiriPhone 16, 16 Plus, 16 Pro and 16 Pro MaxiPhone 16eiPhone 15 Pro and 15 Pro MaxAdaptive Power is on by default for iPhone 17 models and iPhone Air. It’s off by default for iPhone 16, iPhone 16 Plus, iPhone 16 Pro, iPhone 16 Pro Max, iPhone 16e, iPhone 15 Pro and iPhone 15 Pro Max.While some iPad and Mac models also run Apple Intelligence, Adaptive Power is currently exclusive to iPhones.APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERSHow to turn Adaptive Power onIf you’ve got a newer model like the iPhone 17 or Air, Adaptive Power is already on. For others, it’s just a few taps away:Open Settings on your iPhoneTap BatterySelect Power ModeToggle Adaptive Power to turn it onTo be notified when it activates during the day, turn on Adaptive Power Notifications. Even if you turn off alerts, the feature will continue to extend battery life automatically. Steps to enable Adaptive Power in iOS 26 on iPhone. (Kurt “CyberGuy” Knutsson)What this means for your charging habitsYou may not see dramatic gains every day, but the effect adds up. Adaptive Power could extend the lifespan of your iPhone just by updating to iOS 26. Even though you might still need to charge overnight, the feature can buy you extra hours when you’re away from an outlet. Just remember: battery life often dips briefly after major updates while your system re-indexes data, but it levels out in a few days.Pro tip: Use strong antivirus softwareUse trusted antivirus software as an extra layer of protection for your iPhone. While Apple’s built-in defenses are strong, security threats evolve fast. Installing strong antivirus software adds real-time protection against phishing, unsafe links and rogue apps. Keep it updated and run regular scans to catch potential risks early. This extra step helps your device stay clean, fast and fully protected between iOS updates.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysAdaptive Power represents Apple’s move toward smarter, self-managing devices that adapt to you. By learning your habits and adjusting power use dynamically, it helps your battery last longer without sacrificing performance. It’s one of those invisible upgrades that can quietly make your phone feel newer for longer.Would you trust your iPhone to manage power automatically, or do you still prefer to control it yourself? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Adaptive Power in iOS 26 boosts iPhone battery life Read More »

tiktok malware scam

TikTok malware scam tricks you with fake activation guides

NEWYou can now listen to Fox News articles!
Cybercriminals are again turning TikTok into a trap for unsuspecting users. This time, they’re disguising malicious downloads as free activation guides for popular software like Windows, Microsoft 365, Photoshop and even fake versions of Netflix and Spotify Premium.Security expert Xavier Mertens first spotted the campaign, confirming that the same kind of scheme was seen earlier this year. According to BleepingComputer, these fake TikTok videos show short PowerShell commands and instruct viewers to run them as administrators to “activate” or “fix” their programs.In reality, those commands connect to a malicious website and pull in malware known as Aura Stealer, which quietly siphons saved passwords, cookies, cryptocurrency wallets and authentication tokens from the victim’s computer.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.3,000+ YOUTUBE VIDEOS DELIVER MALWARE DISGUISED AS FREE SOFTWARE Cybercriminals are using fake TikTok videos to trick users into downloading malware disguised as free activation guides. (Kurt “CyberGuy” Knutsson)How the TikTok scam worksThis campaign uses what experts call a ClickFix attack. It’s a social engineering trick that makes victims feel they’re following legitimate tech instructions. The instructions seem quick and simple: run one short command and get instant access to premium software.But instead of activating anything, the PowerShell command connects to a remote domain named slmgr[.]win, which downloads harmful executables from Cloudflare-hosted pages. The main file, updater.exe, is a variant of the Aura Stealer malware. Once inside the system, it hunts for your credentials and sends them back to the attacker.Another file, source.exe, uses Microsoft’s C# compiler to launch code directly in memory, making it even harder to detect. The purpose of this extra payload isn’t fully known yet, but the pattern follows previous malware used for crypto theft and ransomware delivery.META ACCOUNT SUSPENSION SCAM HIDES FILEFIX MALWARE Those short “activation” commands secretly connect to malicious servers that install info-stealing malware like Aura Stealer. (Kurt “CyberGuy” Knutsson)How to stay safe from TikTok malware scamsEven though these scams look convincing, you can avoid becoming a victim with the right precautions.1) Avoid shortcutsNever copy or run PowerShell commands from TikTok videos or random websites. If something promises free access to premium software, it’s likely a trap.2) Use trusted sourcesAlways download or activate software directly from the official website or through legitimate app stores.3) Keep security tools updatedOutdated antivirus or browsers can’t detect the latest threats. Update your software regularly to stay protected.4) Use strong antivirus softwareInstall strong antivirus software that offers real-time scanning and protection against trojans, info-stealers and phishing attempts.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com5) Sign up for a data removal serviceIf your personal data ends up on the dark web, a data removal or monitoring service can alert you and help remove sensitive information.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.com6) Reset credentialsIf you’ve ever followed suspicious instructions or entered credentials after watching a “free activation” video, reset all your passwords immediately. 7) Reset passwordsIf you’ve ever followed suspicious instructions or entered credentials after watching a “free activation” video, reset all your passwords immediately. Start with your email, financial and social media accounts. Use unique passwords for each site. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com8) Enable multi-factor authenticationAdd an extra layer of security by turning on multi-factor authentication wherever possible. Even if your passwords are stolen, attackers won’t be able to log in without your verification.  If you’ve followed suspicious steps, change your passwords, enable two-factor authentication, and stay alert for future scams. (Getty Images)Kurt’s key takeawaysTikTok’s global reach makes it a prime target for scams like this. What looks like a helpful hack could end up costing your security, your money, and your peace of mind. Stay alert, trust only verified sources and remember that there’s no such thing as a free activation shortcut.CLICK HERE TO DOWNLOAD THE FOX NEWS APPIs TikTok doing enough to protect its users from scams like this? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

TikTok malware scam tricks you with fake activation guides Read More »

ai ivf treatment

How AI is making IVF more predictable

NEWYou can now listen to Fox News articles!
In-vitro fertilization (IVF) can take a serious toll on families, not only emotionally but financially, especially when every cycle comes with new bills and no clear sense of what the full journey might cost. Gaia Family aims to change that by removing the guesswork around pricing with a blend of tech and AI-driven forecasting. Instead of worrying about unpredictable costs, couples pay a fixed upfront price or monthly installments that cover their planned IVF treatment, medications, embryo transfers and built-in protections if cycles or transfers aren’t successful. It gives families a clearer path forward and support that lasts through the entire process.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.ROBOTS POWER BREAKTHROUGH IN PREGNANCY RESEARCH, BOOSTING IVF SUCCESS RATES Artificial intelligence is giving hopeful parents more clarity about their chances over multiple IVF cycles, helping them plan their journey with clearer expectations instead of guesswork. (Kurt “CyberGuy” Knutsson)How Gaia Family was bornGaia Family was founded by Nader AlSalim, a former Goldman Sachs executive who knew the IVF struggle firsthand. After spending over $50,000 across five IVF rounds in multiple countries, he and his wife finally had a son. The experience left him frustrated by how little clarity the system offered and how emotionally draining the process could be.He saw that most fertility systems were built around procedures, not people. His goal with Gaia Family was to build something different, a program that uses data to empower families instead of leaving them to navigate uncertainty and mounting debt. That personal experience became the foundation of Gaia Family’s mission to bring agency, transparency and compassion to fertility care.TRUMP ROLLS OUT PLAN TO SLASH IVF COSTS FOR AMERICAN FAMILIES THROUGH NEW PHARMA PARTNERSHIP Gaia Family gives families one fixed IVF price with built-in protection and full support every step of the way.  (Kurt “CyberGuy” Knutsson)How Gaia Family’s plan worksChoose your clinic: Gaia partners with more than 100 fertility clinics across the U.S.Get your personalized quote: Your doctor designs your treatment plan, and Gaia uses it to calculate your fixed cost upfront.Start with confidence: Pay monthly or upfront, then begin treatment knowing all your major expenses are covered.If a cycle doesn’t result in viable embryos, Gaia’s built-in protection covers another attempt, helping families try again without financial shock. Once you have viable embryos, your Gaia Plan allows you unlimited frozen embryo transfers (usually $5,000 each) at no extra cost until you have a baby. And, if none of those transfers result in a live birth, then Gaia will give you money towards another cycle. Plus, you have the option of including all of your PGT-A testing and your medication for a fixed cost, so you have even more protection throughout your journey. AlSalim, tells CyberGuy the company’s mission goes beyond technology.”At Gaia Family, we’re using AI not to replace the human element of fertility care, but to bring more confidence to it,” AlSalim said. “Fertility treatment can feel like a game of chance — our technology helps turn it into a guided, informed journey. By analyzing millions of data points, we can forecast the most effective and affordable pathway for each individual, so patients can make decisions grounded in data rather than uncertainty. Ultimately, it’s about giving hopeful parents more agency, transparency, and peace of mind in one of the most emotional experiences of their lives.”SKIN DNA BREAKTHROUGH COULD LET 60-YEAR-OLD WOMEN HAVE GENETICALLY RELATED KIDS For many couples, this combination of data and compassion is transforming uncertainty into confidence and renewed hope. (Kurt “CyberGuy” Knutsson)Why Gaia Family’s model mattersIVF in the United States can cost as much as $30,000 per cycle, and most couples need several tries. Each failed attempt adds more bills and stress. Gaia Family’s fixed-cost model gives families financial predictability while keeping them emotionally supported. It also encourages clinics to focus on outcomes rather than repeated treatments.This approach is transforming how people view fertility care. Instead of relying on luck, families can benefit from AI insights to make better decisions. While it may not lower the medical costs yet, it changes how couples experience one of life’s most emotional challenges, turning fear into informed planning and despair into hope. Gaia removes the spiraling costs, making couples’ outcomes so much more cost-efficient.What this means for youIf you are thinking about IVF or egg freezing, Gaia Family’s model could make your path more manageable. It provides upfront transparency about costs, protection against financial loss and a data-driven forecast of success. It helps you make decisions based on evidence rather than guesswork.Still, while AI can analyze data patterns, it cannot alter biology. Factors like age, health and genetics continue to shape outcomes. Even so, Gaia Family’s system gives couples a sense of control that traditional fertility care rarely provides by serving everyone, with no eligibility criteria in terms of age or health factors. Knowing that your finances are protected can ease stress and allow you to focus on what matters most: building your family. Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.comKurt’s key takeawaysGaia Family is blending AI and empathy to rewrite how fertility care works. It replaces uncertainty with insight and transforms risk into reassurance. For many, it’s not just about technology, it’s about restoring hope and fairness to one of life’s most personal journeys.CLICK HERE TO DOWNLOAD THE FOX NEWS APPWould you trust artificial intelligence to guide your path to becoming a parent? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com.  All rights reserved. 

How AI is making IVF more predictable Read More »

pennsylvania capitol

Pennsylvania bill seeks to legalize flying cars

NEWYou can now listen to Fox News articles!
Pennsylvania may soon join the few states ready to welcome flying cars. State Sen. Marty Flynn from the 22nd District has reintroduced Senate Bill 1077, also known as the Jetsons Act, during the 2025-2026 Regular Session.The proposal amends Title 75 of the Pennsylvania Consolidated Statutes, creating a new legal category for roadable aircraft. These vehicles would have the unique ability to operate both on public roads as motor vehicles and in the air as aircraft.The legislation was referred to the Senate Transportation Committee on Nov. 5, 2025. Although a similar version failed to pass last session, Flynn remains committed to positioning Pennsylvania as a leader in advanced transportation technology. He believes that laying the groundwork now will allow the state to adapt quickly when these vehicles become commercially viable.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.THE WORLD’S FIRST FLYING CAR IS READY FOR TAKEOFF Lawmakers hope clear rules today will make tomorrow’s skyways as safe as the highways below. (Rachel Wisniewski/Bloomberg via Getty Images)Why this bill mattersTechnology is advancing faster than most laws can keep up. The rise of advanced air mobility is blurring the line between cars and aircraft.Several companies, including Alef Aeronautics, Samson Sky and CycloTech, are developing vehicles that can take off vertically or transform from cars to small aircraft within minutes.Some states are already laying the groundwork for this new era. Minnesota and New Hampshire have passed legislation formally recognizing “roadable aircraft,” making them the first states to treat flying cars as both vehicles and aircraft under state law. Pennsylvania now hopes to follow their lead with its own version through Senator Marty Flynn’s Jetsons Act.At the same time, the Federal Aviation Administration (FAA) has begun approving real-world tests. In 2023, the FAA granted a Special Airworthiness Certificate to SpaceX-backed Alef Aeronautics for its Model A prototype, allowing it to operate on roads and in the air for research and development. That approval marked the first time a flying car received official clearance for combined ground and flight testing in the United States.Senator Flynn wants Pennsylvania to be part of this growing national conversation. In his co-sponsorship memo, he explained that proactive legislation will help the state prepare for the next wave of innovation.WOULD YOU BUY THE WORLD’S FIRST PERSONAL ROBOCAR? The Alef flying car is made of ultra light material, allowing it to fly and drive on roads. (Alef Aeronautics)How the Jetsons Act would workUnder Senate Bill 1077, Pennsylvania would officially define a “roadable aircraft” as a hybrid vehicle capable of both driving and flying. These vehicles would need to register with the state, display a unique registration plate and meet standard inspection requirements. When operated on highways or city streets, they would be subject to the same rules as other vehicles. When used in flight, they would remain under federal aviation oversight.The bill also clarifies how drivers and pilots must transition between ground and air operations safely. It allows take-offs and landings only in approved areas, except during emergencies. Flynn emphasizes that clear definitions and consistent oversight will prevent confusion for both motorists and law enforcement. He hopes this clarity will also encourage manufacturers to consider Pennsylvania a test site for future flying car technologies.CHINESE AUTO GIANT WANTS TO MAKE FLYING CARS YOUR NEXT COMMUTE OPTION Pennsylvania’s Jetsons Act aims to prepare the state for the future of flying cars before they take off. (CycloTech)What this means for youIf you live in Pennsylvania, this bill could one day change how you think about personal transportation. While flying cars remain in development, legislation like this sets the stage for their eventual arrival. Drivers may one day register, inspect and insure a flying car just like a regular vehicle. Pilots could use the same roadways to reach take-off zones before switching to flight mode.Even for residents who never plan to own a flying car, the ripple effects could be significant. New rules may influence local zoning, airspace management and infrastructure planning. Communities might see new vertiports or designated landing pads as part of urban development. Insurance companies and safety regulators will need to rethink how they handle this new class of hybrid travel.The bill also signals a broader change in how states approach innovation. Rather than waiting for federal action, Pennsylvania wants to establish a framework that welcomes new technologies while protecting public safety.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysSenator Flynn’s Jetsons Act might sound futuristic, but it reflects a growing reality in transportation. As autonomous vehicles, drones and hybrid aircraft evolve, state governments must adapt to keep up. This legislation shows Pennsylvania’s willingness to lead rather than follow. While it may take years before you see a flying car parked in your driveway, the groundwork is already being laid. Lawmakers are thinking ahead about licensing, safety and how to integrate flying cars into existing traffic systems. That forward-thinking approach could one day make Pennsylvania one of the first states to see cars take to the sky.Do you think flying cars will ever be for everyday folks, or will they stay a luxury reserved for the wealthy? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com. All rights reserved.

Pennsylvania bill seeks to legalize flying cars Read More »

settlement scam messages

Geek Squad scam email: How to spot and stop it

NEWYou can now listen to Fox News articles!
You open your inbox and see a message titled “Payment order settled” with an official-looking invoice from Geek Squad. At first glance, it looks legitimate. It includes your email address and even a phone number for help. That is exactly what happened when I received one of these messages this week.This new Geek Squad scam email is designed to make you panic, call the fake number and share sensitive information before realizing it is a trap. Before you know it, your curiosity could turn into a costly mistake, so let’s look at the red flags to watch for and how you can protect yourself.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.THE #1 GOOGLE SEARCH SCAM EVERYONE FALLS FOR Fake Geek Squad invoice emails are flooding inboxes, seeking to trick recipients into handing over private financial information. (pixelfit/Getty Images)Red flags that give the scam awayWhen I looked closer, several warning signs stood out:The email said “Dear User” instead of using my name.It also says TO: KAREN HILL, which is obviously not me.The sender’s address was from a Gmail account, not Geek Squad.It listed a phone number urging me to call customer support to cancel the renewal or my account will be debited.The invoice said $580.57 would be charged for a two-year Geek Squad subscription, even though I never signed up for one.These details are meant to create urgency and push you to react before thinking.BEWARE FAKE CREDIT CARD ACCOUNT RESTRICTION SCAMS This fake Geek Squad invoice looks professional, but small red flags, like a generic greeting, expose the scam. (Kurt “CyberGuy” Knutsson)How the scam worksThe scam depends on fear and confusion. Once you call the number, the person on the line sounds polite and professional. They might say they need to verify your payment or reverse a charge. In reality, they are trying to get your credit card number or convince you to install software that gives them access to your computer.In some cases, they claim to refund too much money by accident and ask you to send part of it back. That is how victims lose hundreds or even thousands of dollars.SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS Scammers want you to panic and call their number. Remember, real companies never ask for sensitive details over the phone or email. (Kurt “CyberGuy” Knutsson)Why these scam emails look so realScammers have refined their tactics. In this Geek Squad scam email I received, they copied the official logo, used clean layouts and included my actual email address to make it look legitimate. They often get this information from data leaks or security breaches found online.Artificial Intelligence (AI) now makes these scams even harder to spot. It helps scammers write natural messages, design fake invoices and create support scripts that sound real. With these tools, they can make almost anyone believe the email is genuine.Always pause before reacting. Read carefully, check the sender and question anything that feels suspicious. If you want to stay one step ahead, here are some other things that can help keep you safe.How to stay safe from scam emailsScam emails like the fake Geek Squad invoice are becoming more common and more convincing. They use fear and urgency to make you click or call before you think. Protecting yourself means slowing down, verifying every detail and strengthening your digital defenses. Here is how you can stay safe.1) Do not call or click anything in the email, and use strong antivirus softwareThe phone number or link in the message connects you directly to scammers, so don’t click or call.  Once you engage, they can pressure you into sharing personal details or even install harmful software on your device. The moment I saw that “Payment order settled” email, I realized something was off because I don’t even have a Geek Squad account. That alone was a major red flag. If you ever get a message about a service you never signed up for, delete it right away. Instead of calling the number in the message, go to the official Best Buy or Geek Squad website to confirm if there is a real issue with your account. Also, sign up for strong antivirus software. Antivirus software acts as your digital guard. It scans downloads, detects malicious links and warns you before dangerous sites load. Choose a trusted program that updates automatically and includes email protection features. This extra layer of defense can prevent malware from taking hold if you accidentally click something suspicious.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.2) Check the sender’s email address carefullyScammers often use email addresses that look real but have slight differences, such as extra numbers, misspelled words, or unusual domains. A genuine Geek Squad or Best Buy email will come from @bestbuy.com. Always hover over the sender’s name to see the actual address before responding.3) Never share personal or payment details with unexpected callersIf someone contacts you claiming to be from Geek Squad or Best Buy, stay calm and skeptical. Real companies do not ask for banking details, gift card payments, or remote access to your computer over the phone. Hang up and contact the company directly through its verified website or customer service number.4) Use a data removal serviceMany scams start with stolen or leaked personal data. A data removal service can help delete your information from data broker sites that sell contact lists to marketers and scammers. Reducing your digital footprint makes it harder for criminals to target you with fake invoices or phishing emails.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.5) Watch your bank and credit card statementsEven with precautions, it is smart to monitor your accounts. Check your bank and credit card activity weekly for any charges you do not recognize. If you see something suspicious, contact your financial institution right away to report and dispute the charge.6) Enable Two-Factor Authentication (2FA)Two-factor authentication adds another barrier between you and scammers. Even if someone steals your password, they cannot log in without the secondary code sent to your phone or authentication app. Turn on 2FA for your email, online shopping and banking accounts.7) Use strong, unique passwordsWeak or repeated passwords make you an easy target. Create long, unique passwords for each account. A password manager can securely store them and generate complex combinations that are hard to guess or crack.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.8) Update your software regularlyOld software is one of the easiest ways for hackers to slip in. Keep your operating system, browser and security programs updated. Turn on automatic updates so you do not have to think about it. These patches often close known security holes that scammers exploit.9) Check official accounts before panickingBefore reacting to any invoice or payment alert, go straight to the official account or service mentioned, such as Geek Squad, PayPal, Amazon or your bank. Log in directly through their website or app to verify the details. If nothing shows up there, the email is a scam. This quick step can save you from a costly mistake.10) Report the email as phishingReporting suspicious emails helps stop scammers from targeting others. Most email services, including Gmail, Outlook and Yahoo, allow you to mark messages as phishing. You can also forward the email to reportphishing@apwg.org, which goes to the Anti-Phishing Working Group (APWG), or to abuse@bestbuy.com to alert the proper teams.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysReceiving one of these fake invoices can be stressful, but remember that many people get the same message every day. The goal is to recognize the signs, refuse to respond and report them to protect others.Have you ever received a convincing scam email like this? How did you handle it? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Geek Squad scam email: How to spot and stop it Read More »

russian ai robot falling face first in debut

Fox News AI Newsletter: Russian robot faceplants in humiliating debut

The humanoid robot AIdol fell down during its Wednesday, Nov. 12, 2025, debut in Moscow. (Moscow News Agency via AP)NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Russia’s first AI robot faceplants on stage in humiliating Moscow debut- Actor George Clooney claims the rise of AI technology is dangerous, says ‘genie is out of the bottle’- OpenAI accuses NY Times of wanting to invade millions of users’ privacy in paper’s lawsuit against tech giantTECH TRIP: Russia’s first humanoid robot was showcased to the world Wednesday with the unveiling dramatically cut short after it tripped within moments of stepping onto a Moscow stage.FAKE STAR PANIC: Actor George Clooney said Tuesday he is alarmed by the rise of artificial intelligence. In an interview with Variety’s Marc Malkin, the “Ocean’s Eleven” star said the Hollywood community is disturbed by how realistic AI depictions have become, particularly those created with the latest audio and video generation models.  During a recent interview with Variety, actor George Clooney said that artificial intelligence-generated videos are getting “dangerous” with how realistic they look.  (Anadolu/Getty)PRIVACY UNDER SIEGE?: OpenAI released a blistering statement accusing The New York Times of wanting to invade the privacy of its users as the paper proceeds with its lawsuit against the tech giant.AI RACE: Advanced Micro Devices chair and CEO Dr. Lisa Su joined “The Claman Countdown,” where she thanked the Trump administration for its support of artificial intelligence development and underscored the importance of maintaining American leadership in the global AI race.KIDS AT RISK: Kids are spending more time online than ever, and that early exposure is opening the door to a new kind of danger. Artificial intelligence has supercharged online scams, creating personalized and convincing traps that even adults can fall for. The latest Bitwarden “Cybersecurity Awareness Month 2025” poll shows that while parents know these risks exist, most still haven’t had a serious talk with their children about them. A new Bitwarden poll released for Cybersecurity Awareness Month 2025 finds parents are aware of AI-driven online scams but few have discussed them with their children. (iStock)VETS GET AI BOOST: For more than three decades, I had the honor of serving our country in uniform. I led soldiers at home and abroad. I commanded U.S. Cyber Command and the National Security Agency through some of the most complex technological shifts in our history. But the transition that came after my time in uniform came to an end was its own kind of mission. The structure, tempo and identity that comes with military service doesn’t simply disappear when you step out of it. The day you enter civilian life, you begin a new chapter – and you’re expected to write it while you’re living it.ROCKETS TO RUINS: Elon Musk is putting money toward a digital renaissance of archaeology aimed at reimagining life in ancient Rome — with the potential to rewrite history books.’IMMINENT’ THREAT: A new report from a conservative think tank says that artificial intelligence is the new “cold war” between the U.S. and China.EMPOWERED BY AI: Artificial intelligence giant OpenAI on Monday announced a new initiative that aims to make it easier for service members and veterans to use AI tools when they’re transitioning from military service to the workforce. Sam Altman, chief executive officer of OpenAI Inc., during a media tour of the Stargate AI data center in Abilene, Texas, US, on Tuesday, Sept. 23, 2025. (Kyle Grillot/Bloomberg via Getty Images)FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Russian robot faceplants in humiliating debut Read More »

10M Americans hit in government contractor data breach

NEWYou can now listen to Fox News articles!
Data breaches hit every kind of business, from hospitals to tech firms to major retailers. Now a leading government contractor has joined that list.Conduent, which manages critical public services across the United States, says hackers infiltrated its systems for nearly three months. The cyberattack exposed personal information linked to more than 10 million people.All about the Conduent breach and its scaleConduent discovered the intrusion in January 2025 and said hackers had infiltrated its network as early as Oct. 21, 2024. During this period, attackers reportedly stole large amounts of data linked to state-level programs such as Medicaid, child support, food assistance and toll systems. Conduent claims that its investigation found no ongoing malicious activity and said operations were safely restored after the breach was contained.Conduent manages technology and payment systems for dozens of U.S. state governments, processing roughly $85 billion in annual disbursements and handling over 2 billion customer service interactions every year. According to its own estimates, it supports around 100 million residents through various government health and welfare programs.MAJOR DATA BROKER HACK IMPACTS 364,000 INDIVIDUALS’ DATA Hackers accessed Conduent’s network for nearly three months, exposing sensitive data from major state programs like Medicaid and child support. (Felix Zahn/Photothek via Getty Images)The company reported that at least 400,000 people in Texas were affected, with compromised data including Social Security numbers, medical records and health insurance details. Other affected states include Washington, South Carolina, New Hampshire, Maine, Oregon, Massachusetts and California. Notifications are being sent to all impacted individuals, and a dedicated call center has been established to answer questions about the breach.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.How the Conduent breach unfoldedIn January, Conduent described the event as an “operational disruption caused by a third-party compromise.” The breach led to several days of downtime, disrupting vital services in multiple states. In Wisconsin, for instance, parents and beneficiaries were unable to process payments due to system outages, leaving many struggling to meet obligations related to child support and welfare programs.The SafePay ransomware group later claimed responsibility for the attack, alleging it had stolen 8.5 terabytes of data. Conduent confirmed in a Securities and Exchange Commission (SEC) filing that hackers had indeed exfiltrated files belonging to a limited number of clients. The company says it hired cybersecurity experts to analyze the stolen data and recently confirmed that it contained significant amounts of personal information from end-users across multiple programs.Despite the massive theft, Conduent said there is currently no evidence that the stolen data has been published online or on dark web marketplaces.HACKERS TARGET ONLINE STORES WITH NEW ATTACKWe reached out to Conduent for a comment, and a rep for the company provided CyberGuy with the following statement:”As previously disclosed in its April 2025 Form 8-K filing with the SEC, in January 2025, Conduent discovered that it was the victim of a cybersecurity incident.  With respect to that incident, Conduent has agreed to send notification letters, on behalf of its customers, to individuals whose personal information may have been affected by this incident.  In addition, a dedicated call center has been set up to address consumer inquiries. At this time, Conduent has no evidence of any attempted or actual misuse of any information potentially affected by this incident.Upon discovery of the incident, Conduent acted quickly to secure its networks, restore its systems and operations, notify law enforcement and conduct an investigation with the assistance of third-party forensics experts. In addition, given the nature and complexity of the data involved, Conduent has been working diligently with a dedicated review team, including internal and external experts, to conduct a detailed analysis of the affected files to identify the personal information contained therein, which was a time-intensive process. Conduent takes this matter seriously and regrets any inconvenience this incident may have caused.”6 steps you can take to protect yourself from Conduent data breachIf your information may have been exposed in the Conduent breach or any similar data leak, you’re not without defenses. There are several steps you can take right now to reduce the risks. The cyberattack disrupted critical public services across multiple states, with some families temporarily unable to process benefits or payments. (Kurt “CyberGuy” Knutsson)1) Consider a personal data removal serviceData brokers collect and sell personal information such as your name, home address, phone number and relatives’ names. This data can be used for scams or social engineering attacks. Personal data removal services find these records across dozens of sites and submit takedown requests on your behalf.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.HACKERS STEAL MEDICAL RECORDS AND FINANCIAL DATA FROM 1.2M PATIENTS IN MASSIVE HEALTHCARE BREACH2) Monitor your accounts regularlyAfter a major data breach, one of the most effective ways to protect yourself is to stay alert. Check your bank and credit card statements every few days for unusual transactions, even small ones. Watch your benefit accounts or tax filings for irregular activity. Early detection gives you time to freeze accounts or stop fraudulent charges before they escalate.3) Install a reputable antivirus programAntivirus software is your first line of defense against cyber threats that often follow large breaches. Stolen data can be used to launch targeted phishing attacks or spread malware through fake links and emails. A reliable antivirus solution actively scans for malicious activity, blocks suspicious downloads and keeps your devices safe from newer online threats through automatic updates.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.OVER 8M PATIENT RECORDS LEAKED IN HEALTHCARE DATA BREACH4) Enable two-factor authentication (2FA)Even if your login credentials are compromised, two-factor authentication (2FA) can stop attackers from getting in. It requires an additional code sent to your phone, email, or authentication app, making unauthorized access nearly impossible. Enable 2FA on your banking, email and government-related accounts, as these often hold the most sensitive information.5) Use a password managerMany breaches happen because people reuse the same password across multiple websites. A password manager eliminates that risk by creating and storing strong, unique passwords for every account.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com Conduent says the stolen files contained significant amounts of personal information,, but has found no signs the data has surfaced online or on dark web marketplaces. (Kurt Knutsson)6) Consider an identity theft protection serviceIdentity theft protection services monitor your personal data across multiple sources, including the dark web and public records. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.Kurt’s key takeawayEven though Conduent claims the stolen data hasn’t surfaced online, that doesn’t mean it’s safe. Data exfiltration on this scale has long-term implications, from identity theft to potential fraud within public benefit systems. The real test will be how both Conduent and its government partners adapt their cybersecurity oversight to prevent similar breaches. Because at this point, the question isn’t whether these systems will be targeted again, but whether they’ll be any better prepared when it happens.CLICK HERE TO DOWNLOAD THE FOX NEWS APPDo you think government contractors handling sensitive information should face stricter cybersecurity regulations? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.  

10M Americans hit in government contractor data breach Read More »

3d solar power towers

Texas startup raises $5.5M for revolutionary solar towers that produce 50% more energy

NEWYou can now listen to Fox News articles!
Texas startup Janta Power has secured $5.5 million in seed funding to expand its next-generation solar power towers, a vertical alternative to flat solar farms. The funding round was led by MaC Venture Capital with support from Collab Capital. The investment shows strong confidence in 3D solar systems that can reshape renewable energy worldwide.Why flat solar panels are no longer enoughTraditional solar panels cover large flat areas on rooftops or open fields. This approach uses a lot of land and misses much of the day’s available sunlight. The sun moves across the sky, but flat panels capture energy best only when it is directly overhead.Janta Power takes a different approach. The company’s pivoting solar towers stack panels vertically to create a compact three-dimensional structure that captures more sunlight throughout the day. Think of it as the solar version of a skyscraper: more power from less ground space. Janta Power’s 3D solar towers capture more sunlight throughout the day while using just a third of the land. (Janta Power)NEVER NEED AN EV CHARGING STATION AGAIN WITH THESE ROOFTOP SOLAR POWER PANELSHow Janta’s solar towers workEach tower uses smart tracking software that follows the sun’s path from sunrise to sunset. By adjusting its position throughout the day, the system collects more sunlight than traditional fixed panels. This design allows the towers to produce about 50% more energy while using only one-third of the land required by flat-panel systems.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Because of their vertical orientation, the towers can capture sunlight during early morning and late afternoon when flat arrays are least efficient. The result is a steadier flow of electricity across the entire day, reducing stress on power grids and lowering the need for short-term backup plants.Stronger, smarter and more efficientJanta’s towers are also built for strength. Each structure can withstand winds up to 170 miles per hour. The towers feature durable steel frames and modular foundations that simplify installation in a wide range of environments.Pilot programs are already operating at Munich International Airport, Dallas-Fort Worth International Airport and facilities managed by Aena, which oversees more than 70 airports worldwide. A game-changer for energy economicsThe company’s 3D geometry gives each site a capacity factor of around 32%, compared to roughly 22% for flat panels. This greater efficiency lowers the Levelized Cost of Energy (LCOE) to about $0.05 per kilowatt-hour, well below the global average of $0.15.That advantage can make renewable power more accessible for industries such as data centers, universities and telecom operations that need reliable and consistent energy. Built to endure 170 mph winds, Janta’s modular towers are already powering airports in Munich, Dallas–Fort Worth, and across Aena’s global network. (Shelby Tauber/Bloomberg via Getty Images)CHINESE-MADE SOLAR PANELS USED ON AMERICAN FARMS PUTS US POWER GRID AT RISK: FORMER NSA OFFICIALWhat this means for youFor businesses and communities, Janta Power’s technology could mean smaller solar installations that deliver more energy for less money. Because the towers need less land, they can fit into urban areas, airports or industrial zones that could not host traditional solar farms.For everyday consumers, these innovations can bring cleaner, more stable and more affordable power to local grids while supporting a greener energy future.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.comKurt’s key takeawaysJanta Power’s vertical tower design and intelligent tracking system show what happens when creativity meets clean energy. The company’s technology makes it possible to generate more power from less space, setting a new standard for solar innovation. Smart tracking software automatically pivots each tower from sunrise to sunset, boosting efficiency by up to 50% compared to traditional flat panels. (REUTERS/Dane Rhys)If we can rethink the shape of solar energy, what other parts of our world could we redesign for a smarter, more sustainable future? Let us know by writing to us at Cyberguy.comCLICK HERE TO DOWNLOAD THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com.  All rights reserved.  

Texas startup raises $5.5M for revolutionary solar towers that produce 50% more energy Read More »