Space & Science

News and insights from NASA, ESA, and the frontier of space exploration and scientific discovery.

solar farms sheep graze

Solar companies deploy sheep across farms in growing green energy trend

NEWYou can now listen to Fox News articles!
Forget roaring lawnmowers and fuel-guzzling tractors. Today’s solar companies are turning to flocks of sheep to trim grass and control weeds under solar panels. These eco-friendly grazers easily navigate narrow panel rows, cutting maintenance costs and carbon emissions at the same time. In fact, using sheep instead of gas-powered mowing crews can reduce upkeep expenses by up to 20 percent.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. WHY AI IS CAUSING SUMMER ELECTRICITY BILLS TO SOARWhy solar grazing with sheep cuts costs and emissionsSheep fit neatly between solar arrays, reaching into nooks that mechanical gear can’t. They chew rain or shine. And since sheep run on grass, not gas, their grazing helps reduce carbon emissions. Using these natural lawnmowers better aligns with solar’s green mission goals. Developers like SB Energy in Texas now rely on herds of around 3,000 sheep to cover thousands of acres, benefiting both their bottom line and the planet.WHY YOU SHOULD THINK TWICE BEFORE JOINING A POWER SAVER PROGRAM Sheep graze near solar panels in Haskell, Texas, Dec. 2, 2024.  (REUTERS/Annie Rice)How agrivoltaics turns sheep and solar panels into profitsThis isn’t your average landscaping story. There’s even a fancy word for it: agrivolatics, or the practice of combining solar energy production with agriculture.
Farmers who jump on board aren’t just maintaining the lawn; they’re opening up multiple revenue streams. First, ranchers can lease land to solar companies, sign grazing contracts, while still earning from traditional farm products like wool and lamb.Chad Raines is a rancher from Texas. He decided to trade in cotton farming for sheep grazing on solar land. That move has paid off. Last year, he brought in around $300,000. If he had stuck with cotton, he estimates he would’ve lost about $200,000 instead. That’s a huge swing, and it’s a real-world example of how solar grazing is helping revive a sheep industry that had been stuck in neutral for decades.How sheep improve soil health and boost biodiversity at solar farmsLetting sheep do the mowing isn’t just about saving time or money. It actually helps the land. As they move through the fields, sheep naturally break down plant material, aerate the soil and leave behind fertilizing manure. This leads to healthier dirt and better carbon capture.Companies like Lightsource BP are already seeing those benefits. They manage over 14,000 sheep across solar farms that produce more than 3 gigawatts of power. These sites aren’t just power generators, they’re also habitats. Flowers that support bees and butterflies are planted among the panels, creating ideal conditions for pollinators. Some farms have even started producing honey thanks to the thriving bee population. GOOGLE TURNS CO2 INTO BATTERY POWER FOR CLEAN ENERGY Sheep grazing cuts operations and maintenance costs for solar operators. (REUTERS/Annie Rice)Major solar farms scale up sheep grazing across thousands of acresThis isn’t just happening on a small scale. Enel North America recently signed one of the biggest solar grazing deals in the country. They’re deploying over 6,000 sheep across eight large solar farms, covering more than 10,000 acres.At some of those sites, the amount of organic matter in the soil has more than doubled. For solar operators, this approach just makes sense. It cuts operations and maintenance costs, strengthens environmental credibility and builds better relationships with nearby communities.Investors are paying attention, too. In just two years, the number of solar grazing projects has skyrocketed, especially in places backed by heavy hitters like DE Shaw and Berkshire Hathaway. Chad Raines opens the gate to a solar panel zone in Haskell, Texas, Dec. 2, 2024. This solar farm has six different solar panel zones on 1,800 acres of land.  (REUTERS/Annie Rice)What solar grazing means for youIf you care about clean energy, sustainable farming or smart land use, solar grazing is worth watching. It shows how innovation doesn’t always require high-tech gadgets; sometimes, it just takes some sheep. For farmers and ranchers, this model opens the door to new income by partnering with solar companies. If you own land or work in agriculture, grazing contracts could provide a steady stream of revenue without giving up traditional operations.For everyone else, this trend offers hope that renewable energy can coexist with rural livelihoods, boost biodiversity and fight climate change, all at once. As solar farms expand across the country, expect to see more flocks doing the work of machines, quietly transforming how we power the planet.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysSheep-powered solar farms are transforming the way we manage clean energy sites. By replacing gas-powered machines with grazing animals, solar companies are cutting costs, reducing emissions and creating new income opportunities for farmers. This approach blends sustainability with practicality. It supports healthier soil, boosts biodiversity and strengthens rural economies, all while helping solar farms operate more efficiently. With growing investment and proven results, solar grazing is emerging as a smart, scalable solution. And as the industry evolves, don’t be surprised if the quiet hum of panels comes with the occasional baaa.What other ways could we find to tie together the future of clean energy with sustainable and natural solutions like farm animals? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.

Solar companies deploy sheep across farms in growing green energy trend Read More »

1 court clerk imposters target people with fake jury duty phone scam intro

Jury duty phone scams on the rise as fraudsters impersonate local officials, threaten arrest

NEWYou can now listen to Fox News articles!
Scammers are constantly finding new ways to trick people. While older tactics like phishing emails and impersonating government agencies to steal credentials are becoming easier to spot, bad actors are now turning to more alarming methods. One of the latest involves impersonating local authorities. People have reported receiving phone calls claiming they missed jury duty and now face a warrant for their arrest. This kind of impersonation scam is harder to spot because it’s highly personalized, but that doesn’t mean you’re defenseless. Let’s break it down.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.DON’T FALL FOR THIS BANK PHISHING SCAM TRICK Scammers impersonating local authorities are on the rise, telling victims they missed jury duty and must pay to avoid legal trouble. (Kurt “CyberGuy” Knutsson)What jury duty scam victims need to knowScammers posing as court officials are targeting individuals with false claims about missed jury duty, prompting warnings from law enforcement. The fraud typically begins with a call from a blocked or unknown number, alleging that the recipient has missed jury duty and is facing an arrest warrant. The scammers then demand payment, usually through wire transfers or gift cards.A key warning sign is being asked to pay money to avoid arrest or legal trouble. It is important never to give money or personal information to unknown callers.These scams often target older or more vulnerable individuals, although younger people have also reported close calls. In one example, a person received repeated calls from an unidentified number before answering. The caller, claiming to be from a local sheriff’s department and equipped with the individual’s full name and address, insisted they had failed to appear for jury duty and faced multiple citations.HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS Victims can spot jury duty impersonation scams by verifying suspicious calls before taking action and reducing their digital footprint. (Kurt “CyberGuy” Knutsson)How to spot jury duty impersonation scamsNo jury duty arrest warrants: Missing jury duty doesn’t lead to criminal citations or warrants.Blocked or spoofed numbers: Real law enforcement won’t hide their identity.Unusual payment methods: No government agency will ask for gift cards or crypto.Aggressive threats: Threats of arrest or contempt of court are a scare tactic.Legitimate jury summonses are delivered by mail, not through threatening phone calls.6 ways to protect yourself from jury duty scam callsIf you get a suspicious call about missed jury duty, don’t panic. Follow these steps to stay safe and protect your personal information.1) Don’t trust calls from unknown numbersThis might sound obvious, but don’t trust any unknown caller, especially if they demand money. Legitimate authorities will never ask for payment over the phone, especially not through gift cards, wire transfers, or cryptocurrency. If someone threatens you with arrest or legal action unless you pay immediately, it’s almost certainly a scam. Hang up and call your local court or police department using an official number.HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE 2) Verify suspicious calls before taking actionIf you receive a suspicious call, take a breath and fact-check. Court summonses are always delivered by mail, not over the phone. Even if the caller has personal information like your name or address, that doesn’t make them credible. Scammers often use leaked or publicly available data to appear convincing.Be extra cautious, even if the scam comes through text messages or email. Do not click on any suspicious links, as they can install malware on your device and steal your personal data.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.GET FOX BUSINESS ON THE GO BY CLICKING HERE 3) Reduce your digital footprint to stop scammersThe truth is, your data is already out there, from old social media profiles to past breaches. That’s often how scammers get enough personal details to sound legitimate. Investing in a data removal service can help reduce your digital footprint by scrubbing your information from people-search sites and data brokers.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com. Victims of jury duty phone scams can block and report suspicious numbers to local law enforcement or fraud reporting agencies. (Kurt “CyberGuy” Knutsson)4) Block and report scam numbersIf you receive a scam call, report it to local law enforcement or your country’s fraud reporting agency. After hanging up, block the number on your phone and report it to:FTC (USA): reportfraud.ftc.govLocal police or sheriff’s officeYour phone carrier’s scam call reporting optionMany carriers allow you to forward scam texts to 7726 (SPAM).5) Use call screening or spam protection appsApps like Truecaller, Hiya, and built-in features like Google Call Screen or Silence Unknown Callers on iPhones can detect and block fake calls automatically.Pro Tip: Enable your phone’s “silence unknown callers” feature for extra protection. 6) Talk to vulnerable family membersOlder adults are frequent targets. Sit down with your parents, grandparents, or neighbors to explain how these scams work and what to watch for. A simple heads-up could stop a costly mistake.What this means for youScammers are getting bolder and more convincing, but you can stay a step ahead. Knowing the signs of a jury duty phone scam, using smart tools like antivirus and call blockers and limiting your digital footprint can dramatically reduce your risk. Empower yourself and your loved ones with this knowledge.CLICK HERE TO GET THE FOX NEWS APP Kurt’s key takeawayInstead of relying on faceless phishing emails, scammers are now using hyper-personalized and emotionally charged phone calls. By impersonating local authorities and referencing civic duties like jury duty, they exploit both fear and a sense of responsibility. What makes this especially dangerous is how plausible it sounds, drawing on real processes that many people don’t fully understand.Do you think law enforcement and government agencies are doing enough to educate the public about these scams? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved. 

Jury duty phone scams on the rise as fraudsters impersonate local officials, threaten arrest Read More »

redd cockpit technology pkg.00 00 25 10.still001

Pilots test first-of-its-kind cockpit alert system that detects possible collisions on runways

NEWYou can now listen to Fox News articles!
KANSAS CITY, Mo. – Engineers are in the final testing phase of a cockpit alert system they say could prevent close calls on the runway. Honeywell Aerospace’s “Surface Alert System,” or “SURF-A,” can detect when a rogue aircraft gets in the way of another plane that has been cleared for takeoff or landing. The system gives pilots two aural alerts when an unauthorized aircraft enters the runway on a collision course with the authorized aircraft. The first alert sounds 30 seconds before a collision, and the second alert sounds 15 seconds before a collision.”It sounds like such a small amount of time, but things happen so rapidly, and 15 to 30 seconds is actually a very, very large margin when you’re moving at the speeds that we’re moving in an aircraft like this,” Honeywell Test Pilot Doug Rybczynski said. The aural call-out includes an automated voice that says, “traffic on runway.” “It’s a very good, I would say direct, call out,” Rybczynski said. TRUMP PICK FOR UN AVIATION OFFICE HAS LONG HISTORY DONATING TO DEMS, NIKKI HALEY SURF-A gives pilots two aural warnings when they are on a collision course with another plane during takeoff and landing. The first alert sounds 30 seconds out from collision, and the second alert sounds 15 seconds out.  (Honeywell Aeroscpace)The Honeywell crew flew from the Kansas City Downtown airport in Missouri to Topeka, Kansas. On Test Flight 757’s approach to Topeka, a Honeywell crew member parked a smaller Gulfstream aircraft at the end of the runway, triggering the SURF-A alert system. After hearing both alerts, the pilot performed a “go-around” maneuver. The demonstration simulated a 2023 close call at the Austin-Bergstrom International Airport in Austin, Texas. In that scenario, a FedEx B767 was cleared to land in poor conditions. As the FedEx plane got closer, the pilots noticed a Southwest Airlines B737 lined up on the runway below them. The FedEx pilots were able to perform a last-second go-around maneuver to avoid a collision, but Honeywell says the SURF-A system, which wasn’t around at the time, would have given the pilots an additional 28 seconds of notice. DUFFY’S DOT ACCUSES BIDEN, BUTTIGIEG OF INFLATING AIR TRAFFIC CONTROLLER PIPELINE: ‘JUICED THE NUMBERS’SURF-A relies on Federal Aviation Administration-mandated technology called “Smart X,” and it has been around since 2008. It lets pilots know if they are taking off on a taxiway, and if they are coming in for a landing too fast or too high. Honeywell started developing the SURF-A system in 2020 when the aviation industry noticed more close calls happening on runways. Using “ADS-B” Out technology, a GPS system that makes an airplane’s position known to other pilots, engineers were able to determine the trajectory of planes that are on a collision course.  Engineers on board Honeywell Test Flight 757 have been developing SURF-A since 2020. (Fox News)In 2024, the FAA reported 1,664 runway incursions, which is when an aircraft enters a runway without clearance. Seven of those involved two planes on a collision course.The FAA has reported 657 runway incursions so far in 2025. The Federal Aviation Administration reported 1,664 runway incursions in 2024. Seven of them involved planes on a collision course. (Fox News)”Shockingly, I think for a lot of passengers, there’s not an alert system available today to let you know that you’re about ready to run into another aircraft on the runway,” Thea Feyereisen, Honeywell Aerospace Distinguished Technical Fellow, said.FAA CANCELS NEWARK AIRPORT GROUND STOP AFTER ‘EQUIPMENT’ ISSUE AFFECTED RADIO FREQUENCIESThe FAA said the best way to eliminate runway incursions is to improve airport infrastructure by adding edge lights, pavement markers, signage, and by making taxiways less complicated. Since 2021, the FAA has given nearly $12 billion to airports across the country to improve airport infrastructure.  Honeywell engineers say pilots are ultimately the last line of defense to prevent runway incursions.  (Fox News)However, Feyereisen said pilots are ultimately the last line of defense.”Pilots have a shared destiny on the aircraft,” Feyereisen said. “The pilot can be doing everything correct, but on a path to disaster.”CLICK HERE TO GET THE FOX NEWS APPHoneywell Aerospace is pitching the prototype to major airlines, and hopes to have the system certified by September. Engineers said the system could be added to commercial flights in early 2026.

Pilots test first-of-its-kind cockpit alert system that detects possible collisions on runways Read More »

1 leaked playlists expose secrets of powerful figures

Anonymous researcher exposes politicians’ hidden Spotify playlists, including Vance, Leavitt and Bondi

NEWYou can now listen to Fox News articles!
Vice President JD Vance is a big fan of the Backstreet Boys’ “I Want It That Way.” White House Press Secretary Karoline Leavitt gets pumped up with Beyoncé’s “Run the World (Girls).” And former Florida Attorney General Pam Bondi? She cranks Nelly’s “Hot In Herre.”That’s all, according to Panama Playlists, a website that quietly went live recently and claims to reveal the hidden music tastes of politicians, tech leaders and journalists.”I found the real Spotify accounts of celebrities, politicians and journalists. Many use their real names,” the anonymous site creator wrote. “With a little sleuthing, I could say with near-certainty: yep, this is them.”The anonymous researcher, who says they’ve been scraping accounts since summer 2024, insists they only used publicly available information. “I’ve been scraping their playlists for over a year. Some individuals even have a setting enabled that displays their last played song. I scraped this continuously, so I know what songs they played, how many times and when.” They also noted there is no affiliation with Spotify. The site itself frames the project as more playful than sinister.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA Vice President JD Vance’s playlist revealed “I Want It That Way” by the Backstreet Boys and Justin Bieber’s “One Time.” (Panama Playlists)Why leaked playlists matterAt first, this all feels like lighthearted gossip, but it points to a bigger issue: how much of our personal information is publicly available by default? A playlist can reveal mood, personality and even political leanings. When pieced together with other open-source data, these details help paint a surprisingly detailed portrait. The lesson? Privacy leaks don’t always involve hackers. Sometimes, it’s the platforms themselves leaving doors wide open. REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERSWhat the Panama Playlists revealThe playlists range from ironic to eyebrow-raising, with some choices feeling almost too on the nose. Here are some of the highlights: JD VanceThe vice president’s “Making Dinner” playlist includes “I Want It That Way” by the Backstreet Boys and Justin Bieber’s “One Time.” His “Gold On The Ceiling” playlist adds eclectic picks like “What Makes You Beautiful” by One Direction, “You are a Tourist” by Death Cab for Cutie and “San Francisco” by The Mowgli’s.Karoline LeavittThe White House press secretary’s “Baby Shower” playlist featured Beyoncé’s “Run the World (Girls)” and Cyndi Lauper’s “Girls Just Want to Have Fun.” The timing matched her actual baby shower, further confirming the account.Sam AltmanThe OpenAI CEO’s “My Shazam Tracks” suggests he’s searched for “Get Ur Freak On” by Missy Elliott, George Ezra’s “Blame It on Me,” and David Guetta and OneRepublic’s “I Don’t Wanna Wait.”Pam BondiThe U.S. Attorney General’s playlist “Pam” includes “Hot In Herre” by Nelly, “Hands to Myself” by Selena Gomez and “Cold As Ice” by Foreigner. Playlists show Karoline Leavitt listening to Beyoncé’s “Run the World (Girls),” Sam Altman to Missy Elliott’s “Get Ur Freak On” and Pam Bondi to Nelly’s “Hot In Herre.” (Panama Playlists)Ron DeSantisThe Florida governor keeps it classic. His playlist includes “Ring of Fire” by Johnny Cash, Billy Joel’s “Piano Man,”and “Life Is a Highway” by Rascal Flatts.Mike JohnsonThe House Speaker has a Pandora account with Jerry Goldsmith’s “The Parachutes,” Enya’s “May It Be,” and Bryan Adams’ “One Night Love Affair.”Adam MosseriThe Instagram CEO’s playlist, “Hang,” shows a reflective and soulful side. It features “July” by Noah Cyrus and Leon Bridges, “River” by Leon Bridges, “Strangers” by The Kinks and Leonard Cohen’s “Famous Blue Raincoat.” He rounds it out with Otis Redding’s “(Sittin’ On) The Dock of the Bay” and Bobby Vinton’s “Mr. Lonely.”  Ron DeSantis, Mike Johnson and Adam Mosseri’s playlists revealed. (Panama Playlists)9 ONLINE PRIVACY RISKS YOU PROBABLY DON’T KNOW ABOUTWhat Panama Playlists teaches usPanama Playlists demonstrate how a person’s music can clash with their public image, revealing hidden interests that shake expectations.Your tunes might be more visible than you think.Spotify’s default settings put playlists in public mode unless you switch them to private.This is less about guilty pleasures and more about digital exposure. The music you thought was just for your earbuds might already be telling a story about you to strangers. Tips to stay safe and protect your playlistIf you use Spotify, Apple Music, or YouTube Music, take a moment to review your privacy settings. Here’s how to protect yourself: 1) Make playlists privateTurn off public defaults. Only share playlists you intentionally want others to see.SpotifyDisable public visibility: Stop new playlists from being automatically public.Tap your profile picture in the upper left.Tap Settings and privacyClick Privacy and Social Toggle off Public playlists. Users can adjust their Spotify settings to make their playlists private. (Kurt “CyberGuy” Knutsson)Apple MusicOpen the Apple Music app on your iPhone or iPad.Tap your profile icon or picture in the upper right of the screen.Tap “View Profile.”On your profile page, tap “Edit.”Find the toggle for “Listening To” or “Allow Others to See What You’re Listening To” and turn it off to stop sharing your Apple Music listening activity. Steps on how to stop sharing your Apple Music listening activity. (Kurt “CyberGuy” Knutsson)YouTube MusicOpen the YouTube Music app and sign in.Tap your profile picture to go to your Library.Find the playlist you want to edit. Long-press on the playlist or open it and tap the three dots (…).Choose Edit playlist.Under Privacy, select the option you want:Private: Only you can view the playlist.Unlisted: Anyone with the link can view, but it’s not publicly searchable.Public: Anyone can find and view your playlist.Private: Only you can view the playlist.Unlisted: Anyone with the link can view, but it’s not publicly searchable.Public: Anyone can find and view your playlist.Tap Done or Save to confirm your choice.Note: There is no global setting to make all playlists private at once; you must adjust privacy for each playlist individually. The privacy setting is available when creating a new playlist or editing an existing one. For brand-new playlists, you’ll see a privacy selection box during playlist creation. 2) Review connected appsStreaming platforms often link to third-party apps. Revoke access for those you no longer use. 3) Limit what you sharePlaylist names, listening history and even likes reveal more than you think. 4) Use personal data removal servicesWhat looks like harmless fun, like a playlist name or your “last played” track, can actually become part of a bigger puzzle. A determined bad actor could stitch together your music history with other open-source data, such as your social posts, tagged photos, or even public records. Over time, those small details paint a surprisingly complete picture of your habits, locations, or private interests.That’s why reducing your overall digital footprint matters. Personal data removal services work to wipe your information from data broker sites, making it harder for anyone to cross-reference your listening habits with your identity. The less data floating around, the harder it is for someone to connect the dots in ways you never intended.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan. 5) Keep your software updatedPrivacy settings change often. Check regularly to ensure your preferences haven’t been reset and keep your software updated.  CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawaysThe playlist leak may feel like a punchline, but it serves as a real reminder. Our digital lives are stitched together from tiny details we often overlook. Even something as simple as your favorite workout jams can end up on display if you don’t take control. Privacy isn’t about hiding your personality. It’s about choosing what you share, and with whom.Would you be comfortable if your own playlists, every guilty pleasure and repeat listens were suddenly made public? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved. 

Anonymous researcher exposes politicians’ hidden Spotify playlists, including Vance, Leavitt and Bondi Read More »

ai toys kids playing

Experts warn AI stuffed animals could ‘fundamentally change’ human brain wiring in kids

NEWYou can now listen to Fox News articles!
Do AI chatbots packaged inside plush animals really help children, or do they threaten vital developmental milestones? Companies market them as “screen-free playmates” for toddlers, but pediatric experts warn these toys could trade human connection for machine conversation. Toys like Grem, Grok and Rudi are designed to bond with kids through voice and conversation. Instead of simply replacing screen time, they may replace something far more important: the role of parents and peers in emotional development.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.THIS EV HAS A FACE, AND IT TALKS BACK WITH AI AI-powered stuffed toys, such as Grem (left), could disrupt cognitive and emotional development among young children, experts say. (Curio/©Michael Cuviello/Amarillo Globe-News/USA Today Network/IMAGN)Why AI stuffed animals worry child expertsPediatricians and psychologists raise red flags about these AI toys. Young children naturally form attachments. If those attachments shift to chatbots, kids may learn to trust machines more than people. Research already shows children ages 3 to 6 sometimes trust robots more than humans, even when the robots give wrong answers. That undermines how kids build empathy, learn to question, and develop critical thinking. There are also privacy concerns. Parents may not realize that these “personalized” toys are recording conversations. Sensitive information could be stored, analyzed, or misused without families fully knowing. A-powered stuffed toy called Grok. Companies market AI-enhanced plushies as “screen-free playmates” for toddlers. (Curio)HOLLYWOOD TURNS TO AI TOOLS TO REWIRE MOVIE MAGICHow AI toys may disrupt child developmentPediatric experts in early childhood and language development warn that responsive AI could “fundamentally change the wiring of the human brain.” Unlike television or passive media, AI plushies respond in real time, adapting to a child’s questions, stories, and moods. That responsiveness can be powerful. It can encourage curiosity, vocabulary growth, and even creativity. But it can also crowd out human interactions, those subtle facial expressions, pauses, and “nos” that children need to experience to learn empathy and resilience. Another risk is that AI companions are trained to be overly charming and agreeable. Instead of challenging a child’s thinking, these “sycophantic” toys may simply tell kids what they want to hear. Over time, that could nudge children toward believing comforting lies instead of asking hard questions, a toxic pattern for developing critical thinking.  AI-powered stuffed toy called Gabbo. Pediatric experts in childhood development warn responsive AI in stuffed animals may “fundamentally” alter brain growth. (Curio)MCDONALD’S AI HIRING CHATBOT EXPOSED DATA OF JOB CANDIDATESThe benefits and risks parents should weighSome parents say these AI toys offer relief. They help answer endless questions, tell stories, and spark play. In fact, some early research shows kids learn new words faster when engaging in dialogue with AI rather than passively consuming media. But the tradeoff is significant. If AI becomes the primary companion, kids could miss out on the messy, unpredictable, and deeply human experiences that shape trust, empathy, and social awareness. AI-powered stuffed toy called Grok still in its shipping box. Experts warn that AI-powered plushies could reshape child development and trust. (Curio)Safety and security tips for parents before buying AI plush toysBefore bringing one of these toys home, experts suggest:Check the fine print: Review what data is collected, where it’s stored, and if it can be deleted.Limit use to short sessions: Treat the toy like TV, fun in moderation, not a substitute for playmates.Keep conversations public: Encourage kids to use the toy in family spaces, not behind closed doors.Turn off the cloud if possible: Some models work locally without sending every word to servers.WE HAVE TO ACT NOW TO KEEP AI FROM BECOMING A FAR-LEFT TROJAN HORSEBetter play alternatives to AI-stuffed animalsIf you’re worried about replacing human connection, consider healthier alternatives:Rotate traditional toys to keep novelty alive.Use AI plushies together with your child, treating it as a shared activity instead of a private companion.Encourage kids to retell stories to parents and siblings, not just to the toy.What this means for youParents need to think critically before bringing an AI-powered plushie into their home. Ask yourself:Do I want my toddler’s first conversations recorded by a company?Could a chatbot toy undermine the natural give-and-take of family interaction?Am I replacing screen time, or am I replacing myself?Balancing curiosity with caution is key. Occasional use may spark fun, but long-term reliance could reshape your child’s emotional growth in ways no study has yet measured.CLICK HERE TO GET THE FOX NEWS APP Kurt’s key takeawaysAI stuffed animals may look like harmless, cuddly friends, but the stakes are bigger than bedtime stories. These AI-powered plushie toys raise questions about privacy, trust, and what it means to connect as humans. Technology will always tempt us with convenience, but children learn best through love, attention, and genuine relationships.Would you let an AI-powered toy become your child’s closest companion? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved.

Experts warn AI stuffed animals could ‘fundamentally change’ human brain wiring in kids Read More »

transunion building office

TransUnion becomes latest victim in major wave of Salesforce-linked cyberattacks, 4.4M Americans affected

NEWYou can now listen to Fox News articles!
You might have recently noticed a wave of cyberattacks hitting companies whose services millions of Americans rely on every day. Among the victims are Google, Farmers Insurance, Allianz Life, Workday, Pandora, Cisco, Chanel and Qantas, all reporting breaches linked to Salesforce-connected applications.Now, credit reporting firm TransUnion has confirmed its own major incident, with more than 4.4 million U.S. consumers affected. Attackers exploited weaknesses in third-party integrations, not Salesforce itself. Security researchers tie this technique to the extortion group ShinyHunters and its affiliated crews.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.SCAMMERS ARE USING DOCUSIGN EMAILS TO PUSH APPLE PAY FRAUD Hackers stole 13 million records, exposing data of 4.4 million Americans in the latest TransUnion cyberattack. (Christopher Dilts/Bloomberg)What you need to know about the TransUnion data breachTransUnion has disclosed a major data breach that impacted 4,461,511 individuals in the United States, according to a filing with the Maine Attorney General’s Office. The incident occurred on July 28, 2025, and was discovered two days later on July 30.The breach resulted from unauthorized access to a third-party application used in TransUnion’s U.S. consumer support operations. The company stressed that its core credit database and credit reports were not compromised.Although TransUnion characterized the exposed information as “limited,” the stolen data is highly sensitive. It includes names, dates of birth, Social Security numbers, billing addresses, email addresses, phone numbers, reasons for customer transactions (such as requests for a free credit report), and customer support tickets and messages.Hackers claim they stole more than 13 million records in total, with about 4.4 million tied to U.S. consumers.In response, TransUnion is providing all affected individuals with 24 months of free credit monitoring and identity theft protection services.FARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANS The breach at TransUnion follows several similar cyberattacks against tech companies, including Google and Cisco, and retail brands, such as Chanel and Adidas.  (Mike Kemp/In Pictures)Hackers target companies through Salesforce appsThe breach appears to be part of a broader wave of Salesforce-related attacks that is hitting organizations across sectors, from tech and finance to retail and aviation. Alongside Google, Farmers Insurance, Allianz Life, Workday, Pandora, Cisco, Chanel and Qantas, brands like Adidas, Louis Vuitton, Dior, Tiffany & Co., Cartier and Air France-KLM have also reported incidents tied to weaknesses in Salesforce-linked applications.In most cases, attackers exploited malicious third-party integrations or OAuth-connected apps disguised as legitimate Salesforce tools to siphon sensitive records. This technique bypassed traditional login protections and gave intruders long-lasting access to customer relationship management data. The stolen information ranges from basic contact details and business notes to highly sensitive identifiers such as Social Security numbers, dates of birth and driver’s license information.Researchers say these intrusions align with activity from the extortion group ShinyHunters, with some overlap in tactics and infrastructure linked to other threat actors like Scattered Spider. Campaigns tracked under names such as UNC6395 and UNC6040 point to a larger “extortion-as-a-service” model, where criminal crews collaborate and share stolen data across underground forums.TransUnion’s responseCyberGuy reached out to TransUnion for a comment and received the following response:”TransUnion recently experienced a cyber incident that affected a third-party application serving our U.S. consumer support operations. Upon discovery, we quickly contained the issue, which did not involve our core credit database or include credit reports.The incident involved unauthorized access to limited personal information for a very small percentage of U.S. consumers. We are working with law enforcement and have engaged third-party cybersecurity experts for an independent forensics review. Additionally, we will notify affected consumers and provide credit monitoring services.”As for the gap between when the breach occurred (July 28, 2025) and when it was officially recorded as “discovered” (July 30, 2025), a TransUnion spokesperson clarified that the company “identified and contained this event within hours” of it happening, but that it is common industry practice to designate a later “date of discovery” to reflect a more complete assessment following the initial response.MARY KAY’S ICONIC PINK CADILLAC SHIFTS TO FULLY ELECTRIC Researchers have linked the latest cybercrimes to extortion group ShinyHunters and its affiliated crews. (Kurt “CyberGuy” Knutsson)8 ways you can stay safe from the TransUnion data breachThe TransUnion breach exposed millions of people’s data, but there are steps you can take to protect yourself. Here are eight ways to stay safe.1) Delete personal data that puts you at riskGo through old online accounts, shopping profiles or cloud storage that may still hold sensitive data. Deleting what you no longer use reduces the amount of information that could be stolen in future breaches or sold on dark web forums. You can also get help from a data removal service.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan.2) Avoid phishing scams and use strong antivirus softwareData stolen in breaches often ends up fueling phishing campaigns. Attackers may use your name, email or phone number to make messages look more convincing. If you get an email or text claiming to be from TransUnion, your bank or any service asking you to “verify” details, don’t click on the link. Instead, log in through the official website or call customer service directly.The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech.3) Save passwords securelyIf your login details were exposed, reusing the same password across sites puts multiple accounts at risk. Use a password manager to create and store strong, unique passwords for every service. Even if hackers get hold of one, they won’t be able to use it elsewhere. Consider using a password manager to generate and store complex passwords.Next, see if your passwords have been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords.HACKERS FOUND A WAY TO TURN OFF WINDOWS DEFENDER REMOTELY4) Turn on two-factor authenticationTwo-factor authentication (2FA) adds a critical extra step beyond just a password. If someone tries to break into your email, banking app or social media account, they’ll also need the one-time code from your authenticator app or text message. This makes stolen credentials much less useful.5) Keep your devices updatedHackers often rely on outdated software to spread malware or steal information. Installing the latest updates for your phone, computer and apps ensures security patches are in place, blocking known vulnerabilities that attackers might exploit.6) Freeze your credit right awayOne of the biggest risks after a breach is criminals opening new loans or credit cards in your name. A credit freeze with all three major bureaus, TransUnion, Equifax and Experian, prevents anyone from accessing your credit file without your approval. It’s free and can be temporarily lifted if you need to apply for credit.7) Monitor your accounts regularlyWatch your bank and credit card statements for unfamiliar charges, no matter how small. Set up transaction alerts where available. You should also pull your free annual credit report to check for unauthorized accounts or inquiries, which could be signs of fraud.8) Consider identity theft protection servicesIf your Social Security number, driver’s license or other sensitive identifiers were exposed, you may want to sign up for an identity theft protection service. These services monitor credit reports, dark web forums and financial activity for signs of misuse. Some also include insurance or recovery assistance if your identity is stolen, giving you added peace of mind beyond basic credit monitoring. If you’re one of the affected TransUnion users, make use of the 24 months of free credit monitoring and identity theft protection services. If not, you might get one yourself for the future.See my tips and best picks on how to protect yourself from identity theft at  Cyberguy.com/IdentityTheft.CLICK HERE TO GET THE FOX NEWS APP Kurt’s key takeawayThe reality is that the TransUnion breach isn’t just about stolen names and numbers. It’s about how exposed ordinary people are when a single company holds the keys to their financial identity. For years, consumers have had little choice but to trust credit bureaus they never opted into.Should companies like TransUnion be held legally accountable when millions of people are exposed to fraud? Let us know by writing to us at Cyberguy.com/Contact.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.Copyright 2025 CyberGuy.com. All rights reserved.  

TransUnion becomes latest victim in major wave of Salesforce-linked cyberattacks, 4.4M Americans affected Read More »

docusign apple fraud photo 1

Scammers are using DocuSign emails to push Apple Pay fraud

NEWYou can now listen to Fox News articles!
Phishing scams are getting smarter, and one of the latest tricks involves fake DocuSign emails that appear to show charges from major companies like Apple. At first glance, these fraud messages look convincing, often including a receipt, order ID and even a support number. But instead of connecting you to Apple or another legitimate service, that number links you directly to scammers.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.DON’T FALL FOR THIS BANK PHISHING SCAM TRICKAll about the DocuSign & Apple Pay fraudThese phishing emails pretend to be billing receipts for recent Apple Pay purchases. They typically claim that a subscription has been charged to your account and prompt you to call a phone number if you do not recognize the charge. Scammers spoof Apple, Netflix, and other brands to push fake subscription charges posing as DocuSign. (Kurt “CyberGuy” Knutsson)The emails often use well-known brands such as Apple, Netflix, Expedia, or even lawn service companies to make them seem credible. Some also include a “DocuSign” link with a security code, creating the illusion that you need to access a file to confirm the transaction.In reality, neither Apple nor these other companies sends billing receipts through DocuSign. That detail alone is a red flag. Another telltale sign is the sender’s address. It may contain odd characters, such as a Cyrillic “B” replacing the “B” in “Billing,” which helps scammers bypass spam filters.AMAZON ALERTS CUSTOMERS ABOUT IMPERSONATION SCAMSHow the DocuSign scam worksThe scam aims to catch you off guard and pressure you into acting fast. The email claims your Apple Pay account has been charged for a subscription or purchase. It includes an order ID, a charge amount, and a DocuSign link that supposedly holds a receipt or confirmation file. To make it look even more convincing, some versions add a security code to “unlock” the document.The message also lists a phone number and urges you to call if the charge was not authorized. That number is the core of the scam. Instead of reaching Apple, Netflix or whichever company the email pretends to represent, you end up speaking with a scammer posing as a support agent.Once you’re on the call, the scammer tries to convince you that your account has been compromised or that the payment must be reversed right away. From there, the tactics vary. They might ask for your Apple ID, banking details, or card numbers. They may pressure you to download remote access software so they can “fix” the issue on your device. In some cases, they demand payment for fake account protection or reversal fees. DocuSign scam uses fake receipts and urgent language to steal personal information from users. (Kurt “Cyberguy” Knutsson)The end goal is always the same: gain enough access to lock you out of your accounts, steal sensitive data, or initiate fraudulent transactions. What makes these scams dangerous is how they combine multiple red flags in one message: a realistic-looking receipt, official logos, a DocuSign link, urgent language, and a phone number that appears to be the quickest way to resolve the issue.HOW TO TELL IF A LOGIN ALERT IS REAL OR A SCAM5 ways to stay safe from the DocuSign scamScammers rely on people reacting quickly without questioning the details. The good news is that there are simple steps you can take to protect yourself. Here are five practical ways to stay safe.1) Inspect the sender address carefullyScammers often use email addresses that look close to official ones but contain subtle differences, such as extra letters or swapped characters. If the email does not come from an official domain like @apple.com, it is not legitimate. Fraudulent billing emails claim Apple Pay charges and link victims to fake support lines using DocuSign. (Kurt “CyberGuy” Knutsson) 2) Know how companies send receiptsApple, Netflix, and other major services do not send billing statements through DocuSign. If a receipt shows up in this format, you can safely assume it is a scam. Real receipts always come directly from the service provider itself.3) Watch out for phishing links and use strong antivirus softwareBe cautious with any links in suspicious emails. Scammers often mask harmful links behind text that looks legitimate, such as “View Document” or “Review Payment.” Hover over the link without clicking to see the real web address. If it does not match the official company domain, do not click.The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.4) Double-check your transaction historyInstead of trusting the email, confirm whether a charge actually exists. Apple users can review purchases directly from the Settings app under their Apple ID. If nothing shows up, the receipt is fake. Other services have similar ways to check history.5) Delete personal data from the internetThe less information scammers can find about you online, the harder it is for them to craft convincing attacks. Consider removing old accounts you no longer use, limit the personal details you share publicly on social media, and use data removal services when possible. This reduces the risk of your name, email, or phone number being targeted in scams like this.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayPhishing scams are constantly evolving, and the DocuSign Apple Pay ruse is just one of many. The best defense is a healthy dose of skepticism. If something feels off, stop, double-check, and confirm directly through official channels. Scammers rely on panic and quick reactions. By slowing down and verifying details, you can protect yourself from falling into their trap.Should email providers step up their filters so fewer of these messages slip through? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM.Copyright 2025 CyberGuy.com.  All rights reserved. 

Scammers are using DocuSign emails to push Apple Pay fraud Read More »

raft 2

Fox News AI Newsletter: Fighter pilots take directions from AI

NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Fighter pilots take directions from AI in Pentagon’s groundbreaking test- Google Pixel 10 event brings new phones, smartwatch, earbuds and AI- Elon Musk’s xAI sues Apple, OpenAI over AI competition and App Store rankings Image of Starsage’s battle manager system  (Raft AI )MACHINE WINGMAN: For the first time, U.S. fighter pilots took direction from an AI “air battle manager” in a Pentagon test that could change how wars are fought in the skies.STAR-POWERED TECH: Google kicked off its Made by Google event last week with blockbuster energy. Jimmy Fallon played host, bringing humor and star presence. Steph Curry highlighted how the Pixel 10 empowers creators and athletes to capture and share their stories. Lando Norris, fresh from the F1 circuit, showed off how Pixel’s speed and AI enhancements fit into fast-paced lives. And the Jonas Brothers premiered a music video filmed entirely on the new Pixel 10 Pro, proving the phone’s camera is ready for professional-grade production.TECH THROWDOWN: Billionaire entrepreneur Elon Musk’s artificial intelligence startup xAI sued Apple and ChatGPT maker OpenAI in U.S. federal court in Texas on Monday, accusing them of illegally conspiring to thwart competition for artificial intelligence. Visitors walk in front of the Meta (Facebook) sign at its headquarters in Menlo Park, California, United States on December 29, 2022.  ((Photo by Tayfun Coskun/Anadolu Agency via Getty Images))BIG MONEY MOVE: Meta Platforms, Inc., the parent company of Facebook and Instagram, is launching a new political action committee to back candidates in California who support pro-artificial intelligence policies and oppose strict regulation.RISING CONCERNS: Artificial intelligence is developing rapidly. While some are embracing it, others are warning of the potential threats. But both sides agree the technology is changing how the world operates.TECH SPOTTER: A missing hiker’s dead body was finally found in July in Italy’s rugged Piedmont region after 10 months. The recovery team credited the breakthrough to an AI-powered drone that spotted a critical clue within hours. The same process would have taken weeks or even months if done by the human eye. Will Smith performs onstage during a concert at Cardiff Castle on Aug. 25, 2025, in Cardiff, Wales. (Maxine Howell)FAKE CROWD FRENZY: Will Smith is facing accusations of using artificial intelligence to create a crowd in a video shared online.TECH DEAL: Nvidia CEO Jensen Huang told FOX Business on Thursday that he is in talks with the Trump administration about selling its powerful Blackwell chip to China, saying how the global adoption of American tech could help the U.S. win the AI race.EVOLVING ROLES: Right now, many people are worried that artificial intelligence is coming for their jobs. If you’re one of them, then the recent study by Microsoft will shed some light on how AI’s generative capabilities will impact your field of work. In short, some occupations are more susceptible to its influence than others.Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Fighter pilots take directions from AI Read More »

american man at computer

Farmers Insurance data breach exposes 1.1M Americans

NEWYou can now listen to Fox News articles!
Data breaches are no longer just a problem for the tech industry. They’ve become a constant across every sector, from airlines to banks to fashion brands, exposing personal data and leaving customers worried about where their information might end up. Insurance companies, sitting on mountains of sensitive details, are no exception. The latest to join the list is Farmers Insurance. The U.S. insurer confirmed that more than 1.1 million customers were affected in a breach linked to the Salesforce attacks that have swept through major organizations this year, stealing customer databases and fueling a growing wave of extortion attempts.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATIONWhat you need to know about the Farmers Insurance breachFarmers Insurance has confirmed a data breach impacting more than 1.1 million customers. The incident is tied to the ongoing wave of Salesforce-related cyberattacks that have hit major companies this year.In a notice published on its website, the U.S. insurance giant said the breach occurred on May 29, 2025, through one of its third-party vendors. Farmers serves over 10 million households nationwide. It offers auto, home, life, and business insurance through a vast network of agents and subsidiaries.”On May 30, 2025, one of Farmers’ third-party vendors alerted Farmers to suspicious activity involving an unauthorized actor accessing one of the vendor’s databases containing Farmers’ customer information,” the company wrote in its advisory. Farmers Insurance confirmed that more than 1.1 million customers were affected in a breach linked to the Salesforce attacks that have swept through major organizations this year. (Kindamorphic/Getty Images)According to the company, the vendor’s monitoring tools detected the intrusion quickly, allowing containment measures to be taken. Farmers said it immediately launched an investigation, notified law enforcement, and worked to determine the scope of the breach.The investigation revealed that the stolen data included customer names, addresses, dates of birth, and driver’s license numbers. In some cases, the last four digits of Social Security numbers. Farmers began notifying affected individuals on Aug. 22, with a filing to the Maine Attorney General’s Office confirming that 1,111,386 customers were impacted.While Farmers did not publicly name the vendor involved, reports indicate that the breach is part of the larger Salesforce data theft campaign carried out by threat actors this year.ALLIANZ LIFE INSURANCE DATA BREACH EXPOSES 1.4 MILLION AMERICANSThe Salesforce data theft campaignThe Salesforce attacks have been ongoing since early 2025. Researchers attributed them to a threat actor cluster tracked as UNC6040/UNC6240. The intrusions typically begin with voice phishing (vishing) calls, where employees are tricked into approving a malicious OAuth application linked to their company’s Salesforce instance.Once connected, attackers siphon customer relationship management (CRM) databases and use the stolen data in extortion attempts. The cybercrime group ShinyHunters has claimed responsibility, according to BleepingComputer. The group claims that the attacks involve overlapping threat groups, including members of the notorious Scattered Spider gang. Hackers exploited a third-party vendor tied to Salesforce systems to steal 1.1 million Farmers Insurance customer data. (Kurt “CyberGuy” Knutsson)”Like we have said repeatedly already, ShinyHunters and Scattered Spider are one and the same,” a representative told the publication. “They provide us with initial access, and we conduct the dump and exfiltration of the Salesforce CRM instances. Just like we did with Snowflake.”The Salesforce campaign has affected a growing list of high-profile companies, including Google, Cisco, Workday, Adidas, Qantas, Allianz Life and luxury brands under LVMH such as Louis Vuitton, Dior, and Tiffany & Co.GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUPFarmers Insurance responseIn response to CyberGuy’s inquiry, a Farmers Insurance spokesperson shared the following statement:”At Farmers, protecting our customers’ information is our top priority. We recently discovered that an unauthorized third party briefly accessed a vendor’s system that contained some Farmers’ customer information. The incident involved only limited information from certain customers. An investigation-conducted with both internal and external security experts-found no evidence that the exposed data has been misused, nor any indication that Farmers’ own systems were compromised. We are contacting affected individuals directly and are providing support resources, including complimentary credit monitoring.”8 ways you can stay safe after a data breachIf your personal information has been exposed in the Farmers data breach, take the steps below immediately to limit the damage, protect your identity, and prevent future fraud. Farmers Insurance said it began notifying more than 1 million affected policyholders after detecting unauthorized access to customer records in a data breach. (Kurt “CyberGuy” Knutsson)1) Invest in a data removal serviceYou can’t undo the damage once hackers have accessed your data. However, you can limit the fallout by investing in a data removal service. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.2) Use identity theft protection servicesYour Social Security number or other sensitive data may have been exposed in the data breach. Identity Theft companies can monitor personal information, such as your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.3) Enable two-factor authentication (2FA)Turn on 2FA for your email, banking, and insurance logins. Even if a hacker has your password, 2FA requires a second verification step, like a code sent to your phone, making unauthorized access much harder.4) Be wary of phishing and follow-up scamsAfter a data breach, attackers often follow up with phishing emails or phone calls. They pretend to be from your insurance company or a support service. Don’t click on links in unsolicited messages, and verify any claims through official channels before responding. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.5) Freeze your credit right awayPut a credit freeze on your files with Equifax, Experian and TransUnion. This stops criminals from opening new accounts in your name. It’s free, easy to set up, and you can lift the freeze temporarily when needed.6) Update your passwords nowChange your passwords for all important accounts. Start with email, financial, and health-related logins. Use strong, unique passwords for each account. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.7) Check your accounts for strange activityLook for any signs of identity misuse, like:Unknown chargesLogins from unfamiliar devicesNew accounts or lines of credit you didn’t openEarly detection makes a big difference.8) Report identity theft fastIf someone is misusing your identity, go to IdentityTheft.gov. This government site provides step-by-step help and generates the letters and reports you’ll need to stop the fraud.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayData breaches keep hitting companies we trust, and Farmers Insurance is the latest reminder. Even when the stolen data hasn’t been misused yet, the risk lingers long after the headlines fade. That’s why it’s so important to stay alert, protect your identity, and take simple steps now. By acting today, you put yourself in control, not the hackers.Do incidents like this make you reconsider which companies you do business with? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

Farmers Insurance data breach exposes 1.1M Americans Read More »

1 mary kays iconic pink cadillac shifts to full electric

Mary Kay’s iconic pink Cadillac shifts to fully electric

NEWYou can now listen to Fox News articles!
Nearly 60 years ago, Mary Kay Ash was turned away by a car salesman who refused to sell her a car without a man’s signature. That moment became the catalyst for a legacy, one powered by determination, lipstick, and eventually, horsepower. Now, the iconic Mary Kay pink Cadillac is entering a bold new chapter: electric mobility. Mary Kay is offering its top-performing sales reps a fully electric Cadillac Optiq wrapped in a custom “pink pearl” finish. It’s the first time the company’s legendary incentive vehicle is going fully electric, and it’s turning heads while staying true to its roots.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. A fully electric Cadillac Optiq wrapped in a custom “pink pearl” finish is parked in front of Mary Kay. (Mary Kay)A statement in pink (and green)In a press release, CEO Ryan Rogers, grandson of founder Mary Kay Ash, called the move a tribute to the company’s past and a leap into the future:”With the introduction of the all-electric OPTIQ, we’re honoring that iconic legacy while driving into a transformative future-one grounded in our commitment to sustainability and dedication to inspiring and celebrating the achievements of our independent sales force for generations to come.”THIS EV HAS A FACE, AND IT TALKS BACK WITH AIIt’s not just a change in drivetrain. It’s a shift in mindset and a signal that luxury, reward, and eco-consciousness can coexist without compromise. The Cadillac Optiq grille and logo are seen up close. (Mary Kay)Why the pink Cadillac still mattersMary Kay pink Cadillacs are more than just a flashy ride. They represent achievement, empowerment, and recognition. Only the top 1% of the company’s sales force qualify. Even then, it’s not handed out lightly; recipients can choose a $900 monthly bonus instead. But 90% take the car. What makes these cars even more exclusive is that they’re leased for just two years. When the lease ends, they’re returned and repainted to the original factory color. That makes a true pink Cadillac a rare sight outside of Mary Kay circles. And yes, they’re beautiful. That pink pearl paint is exclusive, and few people outside the company ever get to drive one.VOLKSWAGEN’S ICONIC CUTE VAN DRIVES ITSELF WITH 360-DEGREE VISION The fully electric Cadillac Optiq wrapped in a custom “pink pearl” finish drives down a road. (Mary Kay)What this means for youWhether or not you’re building an empire through lipstick sales, this shift tells a bigger story. The auto industry is changing. EVs are no longer just for tech-savvy early adopters or Silicon Valley commuters. Now, they’re reaching industries built on tradition and glamour. The Mary Kay electric Cadillac shows how companies can preserve their legacy while embracing innovation. If you’re considering switching to an electric vehicle, this proves that style and sustainability don’t have to be at odds.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysThis move isn’t just a flex. It’s a smart pivot that aligns Mary Kay with modern values while still honoring its founder’s bold spirit. And frankly, it’s refreshing to see a legacy brand walk the talk when it comes to sustainability and do it in such an eye-catching shade of pink.How do you see the integration of electric vehicles by legacy brands like Mary Kay impacting attitudes towards sustainability in industries rooted in tradition? Let us know by writing to us at Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Mary Kay’s iconic pink Cadillac shifts to fully electric Read More »