Space & Science

News and insights from NASA, ESA, and the frontier of space exploration and scientific discovery.

amazon ceo andy jassy

Fox News AI Newsletter: Amazon to cut workforce due to new tech

Amazon CEO Andy Jassy speaks during an Amazon Devices launch event in New York City, Feb. 26, 2025.  (REUTERS/Brendan McDermid)NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Amazon CEO says AI will reduce his company’s workforce- OpenAI CEO claims Meta offering $100 million to poach employees- America’s power grid faces unprecedented challenge as AI and crypto drive demand skywardTECH TAKEOVER: Amazon CEO Andy Jassy says artificial intelligence will “change the way” work is done and expects the company’s total corporate workforce to be reduced as a result.’GIANT OFFERS’: Meta has allegedly tried to recruit employees from competitor OpenAI by offering bonuses as high as $100 million, OpenAI CEO Sam Altman claimed on a podcast that aired Tuesday.ENERGY OUTLOOK: The rise of artificial intelligence and the increasing popularity of cryptocurrency will continue to push electricity consumption to record highs in 2025 and 2026. ChatGPT on a computer. (Kurt “CyberGuy” Knutsson)POWER DRAIN CRISIS: Every time you ask ChatGPT a question, to generate an image or let artificial intelligence summarize your email, something big is happening behind the scenes. Not on your device, but in sprawling data centers filled with servers, GPUs and cooling systems that require massive amounts of electricity. GAME-CHANGING MACHINE: At ETH Zurich’s Robotic Systems Lab, engineers have created ANYmal-D, a four-legged robot that can play badminton with people. TECH POWER PLAY: OPINION: In 1823, President James Monroe drew a firm line in the sand: the Western Hemisphere would be closed to further European interference and, most importantly, America’s primary domain of industrial, political, and military control. The Monroe Doctrine, while audacious, proved effective and laid the groundwork for the Western Hemisphere as America’s stepping stone to the rest of the world. America was not yet a superpower and could not enforce it alone, however. Instead, America aligned British naval dominance with our interests to build a coalition of opportunity. America asserted its position, secured a partner through alignment against common rivals, and laid the groundwork for its emergence as a global superpower.ROBOT RUMBLE: Robot combat just got a lot more interesting in Hangzhou, China. Four Unitree G1 robots, each steered by a human operator, went head-to-head in a tournament called Unitree Iron Fist King: Awakening! Unitree Iron Fist King: Awakening! (CGTN)AI EYEWEAR: Tech giant Meta on Friday announced it is partnering with Oakley to launch new performance glasses powered by artificial intelligence.Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.FOLLOW FOX NEWS ON SOCIAL MEDIAFacebookInstagramYouTubeTwitterLinkedInSIGN UP FOR OUR OTHER NEWSLETTERSFox News FirstFox News OpinionFox News LifestyleFox News HealthDOWNLOAD OUR APPSFox NewsFox BusinessFox WeatherFox SportsTubiWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Fox News AI Newsletter: Amazon to cut workforce due to new tech Read More »

1 brain implant for epilepsy tested in 20 minute surgery

Brain implant for epilepsy tested in 20-minute surgery

NEWYou can now listen to Fox News articles!
Recently, a neurotech company called Paradromics made headlines by successfully implanting its brain-computer interface (BCI) in a human for the first time. The procedure happened at the University of Michigan during a patient’s routine epilepsy surgery. The device was both placed and removed in just about 20 minutes, a quick turnaround for such a complex technology. This achievement is a big deal for Paradromics, which has been working on this brain implant technology for nearly 10 years. It shows its system can be safely implanted in the brain and actually record neural activity. With this milestone, the company is moving from research to clinical trials, aiming to test the long-term safety and everyday use of their device in people.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide —  free when you join. Brain-computer interface  (Paradromics)How brain-computer interfaces are changing the gameA brain-computer interface is a gadget that reads brain signals and turns them into commands for computers or other devices. Paradromics’ version, Connexus, is designed to help people with severe movement problems, like those caused by paralysis, communicate by using their thoughts to control a computer. NEURALINK BRAIN IMPLANT HELPS ARIZONA MAN REGAIN CONTROL OF HIS LIFEThe device is still in the research phase and hasn’t been approved by regulators. But the recent implant is a big step forward. “We’ve already shown in animals that our device is top tier for data quality and durability,” said the company’s founder and CEO, Matt Angle. “Now, we’ve shown it works in humans, too, which really builds momentum for our upcoming clinical trial.” Brain-computer interface  (Paradromics)AI ENABLES PARALYZED MAN TO CONTROL ROBOTIC ARM WITH BRAIN SIGNALSInside the Connexus BCI: What makes it stand outThe Connexus BCI stands out because it’s engineered for durability and packed with cutting-edge features. One of its most notable innovations is the inclusion of 421 microelectrodes, each one thinner than a human hair, which allows the device to capture signals from individual brain cells with impressive precision. These electrodes are housed in a body made from titanium and platinum-iridium, materials that are widely trusted in medical implants for their safety and compatibility with the human body, ensuring the device is suitable for long-term use. Signals detected by the electrodes travel from the brain to a compact device implanted in the chest, which then wirelessly transmits the data to an external computer or gadget. Advanced AI and language models process this information, translating the user’s neural activity into speech or text, so people with severe motor impairments can communicate or control digital devices directly with their thoughts. Brain-computer interface  (Paradromics)RICE-SIZED ROBOT COULD MAKE BRAIN SURGERY SAFER AND LESS INVASIVEHow the Connexus BCI works: Step by stepThe Connexus BCI transforms brain activity into digital action through a simple yet sophisticated series of steps, each designed to make communication seamless for people with severe motor impairments.Implant the device: A surgeon places the Connexus BCI under the skin, using techniques that are already well established in medicine.Capture brain signals: The device’s tiny electrodes pick up signals from individual neurons in the motor cortex.Send data to the chest: These signals travel along a thin wire to a small device in the chest.Wireless transmission: The chest device sends the data wirelessly to a computer or smartphone.Turn thoughts into words: Advanced software figures out what the user wants to say or do and translates it into speech, text or digital commands.For people who can’t speak or move because of conditions like ALS or stroke, Paradromics’ technology could be life-changing. It could let them communicate at natural speeds and even control computers with their thoughts. Brain-computer interface  (Paradromics)TEEN GOES FROM 10 NIGHTLY SEIZURES TO ZERO WITH BRAIN IMPLANTThe team behind the breakthroughThe procedure was led by Dr. Oren Sagher, a professor of neurosurgery, and Dr. Matthew Willsey, an assistant professor of neurosurgery and biomedical engineering, both at the University of Michigan. Their team includes both doctors and engineers, making sure the implant was done safely and effectively. Dr. Willsey shared that the Paradromics device has over four times the number of sensors compared to other devices they’ve used, which means it can capture much more detailed brain activity. Brain-computer interface  (Paradromics)Paradromics vs. other neurotech companiesParadromics isn’t the only company working on brain-computer interfaces. Others, like Neuralink, Synchron and Precision Neuroscience, are also making progress. Each has a slightly different approach, but Paradromics is focusing on recording activity from individual brain cells, which could lead to more natural communication for people with paralysis. The founder compared the approach to putting microphones inside a stadium instead of outside. Inside, you hear every conversation. Outside, you just hear the noise of the crowd.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Brain-computer interface  (Paradromics)Funding, partnerships, and what’s coming nextParadromics has raised almost $100 million so far and recently teamed up with Saudi Arabia’s NEOM. The company is also part of a special FDA program that helps speed up the development of breakthrough medical devices. Later this year, Paradromics plans to start a clinical trial for people with severe movement problems from conditions like ALS, spinal cord injury or stroke. The goal is to help them communicate independently using digital devices.SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Brain-computer interface  (Paradromics)Kurt’s key takeawaysParadromics’ first human implant is a big moment for the field of neurotechnology. While the device is still in the research phase, this successful test shows that it’s possible to safely and effectively use advanced brain-computer interfaces in people. As Paradromics and other companies keep pushing forward, the future looks promising for people with severe motor impairments. The ability to communicate and interact with the world in new ways is closer than ever, and that’s something worth talking about.CLICK HERE TO GET THE FOX NEWS APPDo you think brain-computer interfaces are a breakthrough for humanity, or are we moving too fast without fully understanding the risks? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you’d like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.  

Brain implant for epilepsy tested in 20-minute surgery Read More »

1 what ais insatiable appetite for power means for our future

What AI’s insatiable appetite for power means for our future

NEWYou can now listen to Fox News articles!
Every time you ask ChatGPT a question, to generate an image or let artificial intelligence summarize your email, something big is happening behind the scenes. Not on your device, but in sprawling data centers filled with servers, GPUs and cooling systems that require massive amounts of electricity. The modern AI boom is pushing our power grid to its limits. ChatGPT alone processes roughly 1 billion queries per day, each requiring data center resources far beyond what’s on your device.In fact, the energy needed to support artificial intelligence is rising so quickly that it has already delayed the retirement of several coal plants in the U.S., with more delays expected. Some experts warn that the AI arms race is outpacing the infrastructure meant to support it. Others argue it could spark long-overdue clean energy innovation.AI isn’t just reshaping apps and search engines. It’s also reshaping how we build, fuel and regulate the digital world. The race to scale up AI capabilities is accelerating faster than most infrastructure can handle, and energy is becoming the next major bottleneck.TRUMP’S NUCLEAR STRATEGY TAKES SHAPE AS FORMER MANHATTAN PROJECT SITE POWERS UP FOR AI RACE AGAINST CHINAHere’s a look at how AI is changing the energy equation, and what it might mean for our climate future.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join. ChatGPT on a computer   (Kurt “CyberGuy” Knutsson)Why AI uses so much power, and what drives the demandRunning artificial intelligence at scale requires enormous computational power. Unlike traditional internet activity, which mostly involves pulling up stored information, AI tools perform intensive real-time processing. Whether training massive language models or responding to user prompts, AI systems rely on specialized hardware like GPUs (graphics processing unit) that consume far more power than legacy servers. GPUs are designed to handle many calculations in parallel, which is perfect for the matrix-heavy workloads that power generative AI and deep learning systems.To give you an idea of scale: one Nvidia H100 GPU, commonly used in AI training, consumes up to 700 watts on its own. Training a single large AI model like GPT-4 may require thousands of these GPUs running continuously for weeks. Multiply that across dozens of models and hundreds of data centers, and the numbers escalate quickly. A traditional data center rack might use around 8 kilowatts (kW) of power. An AI-optimized rack using GPUs can demand 45-55 kW or more. Multiply that across an entire building or campus of racks, and the difference is staggering.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Cooling all that hardware adds another layer of energy demand. Keeping AI servers from overheating accounts for 30-55% of a data center’s total power use. Advanced cooling methods like liquid immersion are helping, but scaling those across the industry will take time.On the upside, AI researchers are developing more efficient ways to run these systems. One promising approach is the “mixture of experts” model architecture, which activates only a portion of the full model for each task. This method can significantly reduce the amount of energy required without sacrificing performance.How much power are we talking about?In 2023, global data centers consumed about 500 terawatt-hours (TWh) of electricity. That is enough to power every home in California, Texas and Florida combined for an entire year. By 2030, the number could triple, with AI as the main driver.To put it into perspective, the average home uses about 30 kilowatt-hours per day. One terawatt-hour is a billion times larger than a kilowatt-hour. That means 1 TWh could power 33 million homes for a day.  Data center   (Kurt “CyberGuy” Knutsson)5 AI TERMS YOU KEEP HEARING AND WHAT THEY ACTUALLY MEANAI’s energy demand is outpacing the power gridThe demand for AI is growing faster than the energy grid can adapt. In the U.S., data center electricity use is expected to surpass 600 TWh by 2030, tripling current levels. Meeting that demand requires the equivalent of adding 14 large power plants to the grid. Large AI data centers can each require 100–500 megawatts (MW), and the largest facilities may soon exceed 1 gigawatt (GW), which is about as much as a nuclear power plant or a small U.S. state. One 1 GW data center could consume more power than the entire city of San Francisco. Multiply that by a few dozen campuses across the country, and you start to see how quickly this demand adds up.To keep up, utilities across the country are delaying coal plant retirements, expanding natural gas infrastructure and shelving clean energy projects. In states like Utah, Georgia and Wisconsin, energy regulators have approved new fossil fuel investments directly linked to data center growth. By 2035, data centers could account for 8.6% of all U.S. electricity demand, up from 3.5% today.Despite public pledges to support sustainability, tech companies are inadvertently driving a fossil fuel resurgence. For the average person, this shift could increase electricity costs, strain regional energy supplies and complicate state-level clean energy goals. Power grid facility    (Kurt “CyberGuy” Knutsson)Can big tech keep its green energy promises?Tech giants Microsoft, Google, Amazon and Meta all claim they are working toward a net-zero emissions future. In simple terms, this means balancing the amount of greenhouse gases they emit with the amount they remove or offset, ideally bringing their net contribution to climate change down to zero.These companies purchase large amounts of renewable energy to offset their usage and invest in next-generation energy solutions. For example, Microsoft has a contract with fusion start-up Helion to supply clean electricity by 2028.However, critics argue these clean energy purchases do not reflect the reality on the ground. Because the grid is shared, even if a tech company buys solar or wind power on paper, fossil fuels often fill the gap for everyone else.Some researchers say this model is more beneficial for company accounting than for climate progress. While the numbers might look clean on a corporate emissions report, the actual energy powering the grid still includes coal and gas. Microsoft, Google and Amazon have pledged to power their data centers with 100% renewable energy, but because the grid is shared, fossil fuels often fill the gap when renewables aren’t available.Some critics argue that voluntary pledges alone are not enough. Unlike traditional industries, there is no standardized regulatory framework requiring tech companies to disclose detailed energy usage from AI operations. This lack of transparency makes it harder to track whether green pledges are translating into meaningful action, especially as workloads shift to third-party contractors or overseas operations. A wind energy farm   (Kurt “CyberGuy” Knutsson)AI CYBERSECURITY RISKS AND DEEPFAKE SCAMS ON THE RISEThe future of clean energy for AI and its limitsTo meet soaring energy needs without worsening emissions, tech companies are investing in advanced energy projects. These include small nuclear reactors built directly next to data centers, deep geothermal systems and nuclear fusion.While promising, these technologies face enormous technical and regulatory hurdles. Fusion, for example, has never reached commercial break-even, meaning it has yet to produce more energy than it consumes. Even the most optimistic experts say we may not see scalable fusion before the 2030s.Beyond the technical barriers, many people have concerns about the safety, cost and long-term waste management of new nuclear systems. While proponents argue these designs are safer and more efficient, public skepticism remains a real hurdle. Community resistance is also a factor. In some regions, proposals for nuclear microreactors or geothermal drilling have faced delays due to concerns over safety, noise and environmental harm. Building new data centers and associated power infrastructure can take up to seven years, due to permitting, land acquisition and construction challenges.Google recently activated a geothermal project in Nevada, but it only generates enough power for a few thousand homes. The next phase may be able to power a single data center by 2028. Meanwhile, companies like Amazon and Microsoft continue building sites that consume more power than entire citie.SCAMMERS CAN EXPLOIT YOUR DATA FROM JUST ONE CHATGPT SEARCHWill AI help or harm the environment?This is the central debate. Advocates argue that AI could ultimately help accelerate climate progress by optimizing energy grids, modeling emissions patterns and inventing better clean technology. Microsoft and Google have both cited these uses in their public statements. But critics warn that the current trajectory is unsustainable. Without major breakthroughs or stricter policy frameworks, the energy cost of AI may overwhelm climate gains. A recent forecast estimated that AI could add 1.7 gigatons of carbon dioxide to global emissions between 2025 and 2030, roughly 4% more than the entire annual emissions of the U.S.Water use, rare mineral demand and land-use conflicts are also emerging concerns as AI infrastructure expands. Large data centers often require millions of gallons of water for cooling each year, which can strain local water supplies. The demand for critical minerals like lithium, cobalt and rare earth elements — used in servers, cooling systems and power electronics — creates additional pressure on supply chains and mining operations. In some areas, communities are pushing back against land being rezoned for large-scale tech development.Rapid hardware turnover is also adding to the environmental toll. As AI systems evolve quickly, older GPUs and accelerators are replaced more frequently, creating significant electronic waste. Without strong recycling programs in place, much of this equipment ends up in landfills or is exported to developing countries.The question isn’t just whether AI can become cleaner over time. It’s whether we can scale the infrastructure needed to support it without falling back on fossil fuels. Meeting that challenge will require tighter collaboration between tech companies, utilities and policymakers. Some experts warn that AI could either help fight climate change or make it worse, and the outcome depends entirely on how we choose to power the future of computing.HOW TO LOWER YOUR CAR INSURANCE COSTS IN 2025Kurt’s key takeawaysAI is revolutionizing how we work, but it is also transforming how we use energy. Data centers powering AI systems are becoming some of the world’s largest electricity consumers. Tech companies are betting big on futuristic solutions, but the reality is that many fossil fuel plants are staying online longer just to meet AI’s rising energy demand. Whether AI ends up helping or hurting the climate may depend on how quickly clean energy breakthroughs catch up and how honestly we measure progress.CLICK HERE TO GET THE FOX NEWS APPIs artificial intelligence worth the real-world cost of fossil resurgence? Let us know your thoughts by writing to us at Cyberguy.com/Contact. For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you’d like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.  

What AI’s insatiable appetite for power means for our future Read More »

1 new android malware poses as fake contacts to steal your personal data intro

Android malware poses as fake contacts to steal your personal data

NEWYou can now listen to Fox News articles!
Hacking keeps evolving, just like any other profession. Cybercriminals are always upgrading their tools, especially malware, to find new ways to scam people and steal data or money. The old tricks no longer work as well. Basic phishing rarely fools anyone twice, so hackers constantly look for new ways to break in.They rely on whatever grabs your attention and doesn’t raise suspicion, things like social media ads, fake banking apps or updates that look completely normal. One of the fastest-growing threats in this space is Crocodilus. First detected in early 2025, this Android banking Trojan takes over your contact list to make its scams look more legitimate and harder to spot.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Android phone  (Kurt “CyberGuy” Knutsson)Crocodilus malware: What Android users must know nowThe Crocodilus malware was first documented by ThreatFabric cybersecurity researchers in late March 2025. They highlighted its extensive data theft and remote control capabilities.Crocodilus uses Facebook to infect devices. It appears in ads that look normal, but once clicked, the malware installs itself on your device. In some cases, it mimicked banking and e-commerce apps in Poland, promising users free points in exchange for downloading an app. The link led to a fake site that delivered the malware. Although the ad was only live for a few hours, it still reached thousands of users, most of whom were over 35, a group more likely to have money in the bank.Smaller but growing campaigns have also been reported in the United States, where Crocodilus disguised itself as crypto wallet tools, mining apps and financial services. These fake apps are often distributed through social media ads or phishing links, targeting Android users who are less likely to question a “legit-looking” financial app. While not yet widespread, the presence of Crocodilus in the U.S. underscores its global reach and rapidly evolving tactics.ANDROID SECURITY UPGRADES OUTSMART SCAMS AND PROTECT YOUR PRIVACYThe Trojan has also been spotted in Spain, where it disguised itself as a browser update, targeting nearly every major Spanish bank. In Turkey, it posed as an online casino app. And the threat doesn’t stop there.One of the biggest concerns with Crocodilus is its ability to add fake contacts to your phone, inserting entries like “Bank Support” into your contact list. So, if an attacker calls pretending to be from your bank, your phone may not flag it because it appears to be a trusted number, making social engineering scams much more convincing.The latest version also includes a more advanced seed phrase collector, especially dangerous for cryptocurrency users. Crocodilus monitors your screen and uses pattern matching to detect and extract sensitive data, such as private keys or recovery phrases, all before quietly sending it to the attacker. Illustration of a hacker at work  (Kurt “CyberGuy” Knutsson)MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSHow Crocodilus signals the future of mobile malware threatsCrocodilus shows us what the next wave of mobile threats might look like. It uses real ads to get into your phone. It blends into your digital life in ways that feel familiar. It does not need flashy tricks to succeed. It just needs to appear trustworthy.This kind of malware is designed for scale. It targets large groups, works across different regions and updates fast. It can pretend to be a bank, a shopping app or even something harmless like a browser update. The scary part is how normal it all looks. People are not expecting something this malicious to hide inside something that looks like a gift.The creators of Crocodilus understand how people think and act online. They are using that knowledge to build tools that work quietly and effectively. And they are not working alone. This kind of operation likely involves a network of developers, advertisers and distributors all working together.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? A woman working on her laptop with her phone nearby   (Kurt “CyberGuy” Knutsson)HR FIRM CONFIRMS 4M RECORDS EXPOSED IN MAJOR HACK7 expert tips to protect your Android from Crocodilus malware1. Avoid downloading apps from ads or unknown sources: Crocodilus often spreads through ads on social media platforms like Facebook. These ads promote apps that look like banking tools, e-commerce platforms or even crypto wallets. If you click and install one, you might be unknowingly downloading malware. Always search for apps directly on trusted platforms like the Google Play Store. Do not install anything from random links, especially those shared through ads, messages or unfamiliar websites.2. Avoid suspicious links and install strong antivirus protection: Crocodilus spreads through deceptive ads and fake app links. These can look like legitimate banking tools, crypto apps or browser updates. Clicking on them may quietly install malware that hijacks your contacts, monitors your screen or steals login credentials. To stay safe, avoid clicking on links from unknown sources, especially those that promise rewards or warn of urgent problems. Installing strong antivirus software on your Android device adds another layer of protection. It can scan downloads, block malicious behavior and warn you about phishing attempts before they become a bigger issue. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Review app permissions carefully before and after installation: Before you install an app, take a moment to look at the permissions it asks for. If a shopping app wants access to your contacts, messages or screen, that is a red flag. After installing, go to your phone settings and double-check what permissions the app actually has. Malware like Crocodilus relies on overreaching permissions to steal data and gain control. If anything seems unnecessary, revoke the access or uninstall the app entirely.4. Keep your Android device updated at all times: Security patches are released regularly to block known vulnerabilities. Crocodilus is designed to take advantage of outdated systems and bypass newer Android restrictions. By updating your phone and apps regularly, you reduce the chances of malware slipping through. Set your device to install updates automatically when possible and check manually every so often if you are not sure.5. Consider using a data removal or monitoring service: While not a direct defense against malware, data removal services can help minimize the damage if your information has already been leaked or sold. These services monitor your personal data on the dark web and offer guidance if your credentials have been compromised. In a case like Crocodilus, where malware may harvest and transmit banking info or crypto keys, knowing your data exposure early can help you act before scammers do. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web6. Turn on Google Play Protect: Google Play Protect is a built-in security feature on Android phones that scans your apps for anything suspicious. To stay protected, make sure it’s turned on. You can check this by opening the Play Store, tapping your profile icon and selecting Play Protect. From there, you can see if it’s active and run a manual scan of all your installed apps. While it may not catch everything, especially threats from outside the Play Store, it’s still an important first layer of defense against harmful apps like Crocodilus.7. Be skeptical of unfamiliar contacts or urgent messages: One of the newer tricks Crocodilus uses is modifying your contact list. It can add fake entries that look like customer service numbers or bank helplines. So, if you receive a call from “Bank Support,” it might not be real. Always verify phone numbers through official websites or documents. The same applies to messages asking for personal details or urgent logins. When in doubt, do not respond or click any links. Contact your bank or service provider directly.DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOXKurt’s key takeawayCrocodilus is one of the most advanced Android banking Trojans seen so far. It spreads through social media ads, hides inside apps that look real and collects sensitive data like banking passwords and crypto seed phrases. It can also add fake contacts to your phone to trick you during scam calls. If you use Android, avoid downloading apps from links in ads or messages. Only install apps from trusted sources like the Google Play Store. Keep your phone updated, and be careful if something looks too good to be true because it probably is. CLICK HERE TO GET THE FOX NEWS APPWho should be held accountable when malware like Crocodilus spreads through platforms like Facebook? Let us know by writing to us at Cyberguy.com/Contact. For more of my tech tips anbd security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you’d like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.  

Android malware poses as fake contacts to steal your personal data Read More »

1 new android malware poses as fake contacts to steal your personal data intro

Android malware poses as fake contacts to steal your personal data

NEWYou can now listen to Fox News articles!
Hacking keeps evolving, just like any other profession. Cybercriminals are always upgrading their tools, especially malware, to find new ways to scam people and steal data or money. The old tricks no longer work as well. Basic phishing rarely fools anyone twice, so hackers constantly look for new ways to break in.They rely on whatever grabs your attention and doesn’t raise suspicion, things like social media ads, fake banking apps or updates that look completely normal. One of the fastest-growing threats in this space is Crocodilus. First detected in early 2025, this Android banking Trojan takes over your contact list to make its scams look more legitimate and harder to spot.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Android phone  (Kurt “CyberGuy” Knutsson)Crocodilus malware: What Android users must know nowThe Crocodilus malware was first documented by ThreatFabric cybersecurity researchers in late March 2025. They highlighted its extensive data theft and remote control capabilities.Crocodilus uses Facebook to infect devices. It appears in ads that look normal, but once clicked, the malware installs itself on your device. In some cases, it mimicked banking and e-commerce apps in Poland, promising users free points in exchange for downloading an app. The link led to a fake site that delivered the malware. Although the ad was only live for a few hours, it still reached thousands of users, most of whom were over 35, a group more likely to have money in the bank.Smaller but growing campaigns have also been reported in the United States, where Crocodilus disguised itself as crypto wallet tools, mining apps and financial services. These fake apps are often distributed through social media ads or phishing links, targeting Android users who are less likely to question a “legit-looking” financial app. While not yet widespread, the presence of Crocodilus in the U.S. underscores its global reach and rapidly evolving tactics.ANDROID SECURITY UPGRADES OUTSMART SCAMS AND PROTECT YOUR PRIVACYThe Trojan has also been spotted in Spain, where it disguised itself as a browser update, targeting nearly every major Spanish bank. In Turkey, it posed as an online casino app. And the threat doesn’t stop there.One of the biggest concerns with Crocodilus is its ability to add fake contacts to your phone, inserting entries like “Bank Support” into your contact list. So, if an attacker calls pretending to be from your bank, your phone may not flag it because it appears to be a trusted number, making social engineering scams much more convincing.The latest version also includes a more advanced seed phrase collector, especially dangerous for cryptocurrency users. Crocodilus monitors your screen and uses pattern matching to detect and extract sensitive data, such as private keys or recovery phrases, all before quietly sending it to the attacker. Illustration of a hacker at work  (Kurt “CyberGuy” Knutsson)MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSHow Crocodilus signals the future of mobile malware threatsCrocodilus shows us what the next wave of mobile threats might look like. It uses real ads to get into your phone. It blends into your digital life in ways that feel familiar. It does not need flashy tricks to succeed. It just needs to appear trustworthy.This kind of malware is designed for scale. It targets large groups, works across different regions and updates fast. It can pretend to be a bank, a shopping app or even something harmless like a browser update. The scary part is how normal it all looks. People are not expecting something this malicious to hide inside something that looks like a gift.The creators of Crocodilus understand how people think and act online. They are using that knowledge to build tools that work quietly and effectively. And they are not working alone. This kind of operation likely involves a network of developers, advertisers and distributors all working together.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? A woman working on her laptop with her phone nearby   (Kurt “CyberGuy” Knutsson)HR FIRM CONFIRMS 4M RECORDS EXPOSED IN MAJOR HACK7 expert tips to protect your Android from Crocodilus malware1. Avoid downloading apps from ads or unknown sources: Crocodilus often spreads through ads on social media platforms like Facebook. These ads promote apps that look like banking tools, e-commerce platforms or even crypto wallets. If you click and install one, you might be unknowingly downloading malware. Always search for apps directly on trusted platforms like the Google Play Store. Do not install anything from random links, especially those shared through ads, messages or unfamiliar websites.2. Avoid suspicious links and install strong antivirus protection: Crocodilus spreads through deceptive ads and fake app links. These can look like legitimate banking tools, crypto apps or browser updates. Clicking on them may quietly install malware that hijacks your contacts, monitors your screen or steals login credentials. To stay safe, avoid clicking on links from unknown sources, especially those that promise rewards or warn of urgent problems. Installing strong antivirus software on your Android device adds another layer of protection. It can scan downloads, block malicious behavior and warn you about phishing attempts before they become a bigger issue. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Review app permissions carefully before and after installation: Before you install an app, take a moment to look at the permissions it asks for. If a shopping app wants access to your contacts, messages or screen, that is a red flag. After installing, go to your phone settings and double-check what permissions the app actually has. Malware like Crocodilus relies on overreaching permissions to steal data and gain control. If anything seems unnecessary, revoke the access or uninstall the app entirely.4. Keep your Android device updated at all times: Security patches are released regularly to block known vulnerabilities. Crocodilus is designed to take advantage of outdated systems and bypass newer Android restrictions. By updating your phone and apps regularly, you reduce the chances of malware slipping through. Set your device to install updates automatically when possible and check manually every so often if you are not sure.5. Consider using a data removal or monitoring service: While not a direct defense against malware, data removal services can help minimize the damage if your information has already been leaked or sold. These services monitor your personal data on the dark web and offer guidance if your credentials have been compromised. In a case like Crocodilus, where malware may harvest and transmit banking info or crypto keys, knowing your data exposure early can help you act before scammers do. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web6. Turn on Google Play Protect: Google Play Protect is a built-in security feature on Android phones that scans your apps for anything suspicious. To stay protected, make sure it’s turned on. You can check this by opening the Play Store, tapping your profile icon and selecting Play Protect. From there, you can see if it’s active and run a manual scan of all your installed apps. While it may not catch everything, especially threats from outside the Play Store, it’s still an important first layer of defense against harmful apps like Crocodilus.7. Be skeptical of unfamiliar contacts or urgent messages: One of the newer tricks Crocodilus uses is modifying your contact list. It can add fake entries that look like customer service numbers or bank helplines. So, if you receive a call from “Bank Support,” it might not be real. Always verify phone numbers through official websites or documents. The same applies to messages asking for personal details or urgent logins. When in doubt, do not respond or click any links. Contact your bank or service provider directly.DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOXKurt’s key takeawayCrocodilus is one of the most advanced Android banking Trojans seen so far. It spreads through social media ads, hides inside apps that look real and collects sensitive data like banking passwords and crypto seed phrases. It can also add fake contacts to your phone to trick you during scam calls. If you use Android, avoid downloading apps from links in ads or messages. Only install apps from trusted sources like the Google Play Store. Keep your phone updated, and be careful if something looks too good to be true because it probably is. CLICK HERE TO GET THE FOX NEWS APPWho should be held accountable when malware like Crocodilus spreads through platforms like Facebook? Let us know by writing to us at Cyberguy.com/Contact. For more of my tech tips anbd security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you’d like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.  

Android malware poses as fake contacts to steal your personal data Read More »

1 quadruped robot plays badminton with you using ai

Quadruped robot plays badminton with you using AI

NEWYou can now listen to Fox News articles!
At ETH Zurich’s Robotic Systems Lab, engineers have created ANYmal-D, a four-legged robot that can play badminton with people. This project brings together robotics, artificial intelligence and sports, showing how advanced robots can take on dynamic, fast-paced games. ANYmal-D’s design and abilities are opening up new possibilities for human-robot collaboration in sports and beyond.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. ANYmal-D, a four-legged robot that can play badminton with people  (ETH Zurich)How does ANYmal-D play badminton with humans?Badminton is a game that requires quick footwork, fast reactions, and precise hand-eye coordination. To give a robot a chance on the court, the ETH Zurich team equipped ANYmal-D with four legs for stability and agility, a dynamic arm to swing the racket, and a stereo camera to track the shuttlecock. The robot uses a reinforcement learning-based controller, which allows it to predict and react to the shuttlecock’s movement in real-time. ANYmal-D can move around the court, adjust its posture, and time its swings, keeping rallies going with human players for up to 10 shots.NO TENNIS PARTNER? NO WORRIES WITH THIS AI ROBOTThe technology behind ANYmal-D’s badminton skillsANYmal-D’s stereo camera serves as its eyes, constantly monitoring the shuttlecock. The robot uses a “perception noise model” to compare what it sees with data from its training, helping it track the shuttlecock even when it moves unpredictably. The robot can pitch its body to keep the shuttlecock in view, mimicking how a human player might lean in for a tricky shot. ANYmal-D, a four-legged robot that can play badminton with people  (ETH Zurich)HUMANPLUS ROBOT CAN GO FROM PLAYING THE PIANO TO PING-PONG TO BOXINGUnified reinforcement learning for whole-body controlCoordinating legs and an arm is tough for any robot. The ETH Zurich team developed a unified control policy using reinforcement learning, allowing ANYmal-D to move and swing as a coordinated whole. This system was trained in simulation, so the robot learned how to handle a wide range of shots and situations before stepping onto a real court. Diagram of the ANYmal-D, a four-legged robot that can play badminton with people  (ETH Zurich)AI HUMANOID ROBOT LEARNS TO MIMIC HUMAN EMOTIONS AND BEHAVIORHardware integration: What’s inside the robot?ANYmal-D combines a sturdy quadrupedal base with the DynaArm, and its racket is set at a 45-degree angle for effective striking. The robot’s state estimation runs at 400 Hz, the control policy updates at 100 Hz, and the perception system operates at 60 Hz. All of this runs on a Jetson AGX Orin module, making the robot responsive and ready for action.GET A FREE SCAN TO FIND OUT IF YOUR PERSONAL INFORMATION IS ALREADY OUT ON THE WEB ANYmal-D, a four-legged robot that can play badminton with people   (ETH Zurich)Challenges of playing badminton with a robotGetting the robot’s legs and arm to work together smoothly is a major challenge. Most robots handle these tasks separately, but this limits agility. By combining locomotion and arm control into a single system, ANYmal-D can adjust its posture and gait based on the shuttlecock’s path, moving more like a human player.AI TENNIS ROBOT COACH BRINGS PROFESSIONAL TRAINING TO PLAYERS ANYmal-D, a four-legged robot that can play badminton with people  (ETH Zurich)Active perception: How ANYmal-D sees the gameRobots don’t have human eyes, so their cameras can struggle with frame rates and field of view. ANYmal-D’s perception-aware controller keeps its camera moving smoothly, always tracking the shuttlecock. The perception noise model helps bridge the gap between simulation and real matches, making the robot more reliable during games.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? ANYmal-D, a four-legged robot that can play badminton with people  (ETH Zurich)Real-world deployment: Bringing the robot to the courtBringing ANYmal-D from the lab to the badminton court meant dealing with practical issues like power limits and communication delays. Despite these challenges, the robot managed to keep up with human players, responding to different shot speeds and landing positions, and maintaining rallies that showcased its adaptability and skill. ANYmal-D, a four-legged robot that can play badminton with people  (ETH Zurich)ANYmal-D’s badminton performance: What did the tests show?In collaborative games with amateur players, ANYmal-D tracked, intercepted, and returned shuttlecocks with impressive consistency. On average, it took about 0.357 seconds to process the shuttlecock’s trajectory after a human hit, leaving just over half a second to get into position and make the shot. While it didn’t return every shot, the robot’s ability to maintain rallies and adjust to the pace of the game highlights how far robotics has come in dynamic sports scenarios.SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES ANYmal-D, a four-legged robot that can play badminton with people  (ETH Zurich)Kurt’s key takeawaysANYmal-D really shows how far robotics has come, especially when it comes to working alongside people in fast-paced activities like badminton. It’s interesting to see a robot not just keeping up on the court, but actually rallying with human players and adapting to the game as it unfolds. As these technologies keep improving, it’s easy to picture more robots joining us in all sorts of sports and activities, making play and teamwork even more fun for everyone.CLICK HERE TO GET THE FOX NEWS APPWould you be curious to play a match against a robot like ANYmal-D, or do you think nothing can replace the experience of playing badminton with another human? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.  

Quadruped robot plays badminton with you using AI Read More »

mcclain and ayers on iss june downlinks

NASA Astronauts to Answer Questions from Students in New York, Utah

Students from New York and Utah will hear from NASA astronauts aboard the International Space Station as they answer prerecorded questions in two separate events.
At 11:30 a.m. EDT on Monday, June 23, NASA astronauts Nichole Ayers and Anne McClain will answer questions submitted by students from P.S. 71 Forest Elementary School in Ridgewood, New York. Media interested in covering the event must RSVP by 5 p.m. Friday, June 20, to Regina Beshay at: rbeshay2@school.nyc.gov or 347-740-6165.
At 11:05 a.m. on Friday, June 27, Ayers and McClain will answer questions submitted by students from Douglas Space and Science Foundation, Inc., in Layton, Utah. Media interested in covering the event must RSVP by 5 p.m. Wednesday, June 25, to Sarah Merrill at: sarahmonique@gmail.com or 805-743-3341.
Watch the 20-minute Earth-to-space calls on NASA STEM YouTube Channel.
P.S. 71 Forest Elementary School will host kindergarten through fifth grade students. Douglas Space and Science Foundation will host participants from the Science, Technology, Achievement Research camp. Both events aim to inspire students to imagine a future in science, technology, engineering, and mathematics careers through ongoing collaborations, mentorship, and hands-on learning experiences.
For nearly 25 years, astronauts have continuously lived and worked aboard the space station, testing technologies, performing science, and developing skills needed to explore farther from Earth. Astronauts aboard the orbiting laboratory communicate with NASA’s Mission Control Center in Houston 24 hours a day through SCaN’s (Space Communications and Navigation) Near Space Network.
Important research and technology investigations taking place aboard the space station benefit people on Earth and lays the groundwork for other agency missions. As part of NASA’s Artemis campaign, the agency will send astronauts to the Moon to prepare for future human exploration of Mars; inspiring explorers and ensuring the United States continues to lead in space exploration and discovery.
See videos of astronauts aboard the space station at:
https://www.nasa.gov/stemonstation
-end-
Gerelle DodsonHeadquarters, Washington202-358-1600gerelle.q.dodson@nasa.gov
Sandra JonesJohnson Space Center, Houston281-483-5111sandra.p.jones@nasa.gov

NASA Astronauts to Answer Questions from Students in New York, Utah Read More »

1 10 signs your personal data is being sold online

10 signs your personal data is being sold online

NEWYou can now listen to Fox News articles!
Your personal data is probably being sold right now. Scam calls, junk emails, and weird login alerts aren’t random. They’re warning signs that your information is being circulated through data brokers, often without your knowledge or consent. Major breaches, like the recent Adidas hack, have exposed millions of names, emails, phone numbers, and home addresses. Once this data is leaked, it’s fed into a vast marketplace of data brokers who package, sell, and resell your information to advertisers, spammers, scammers and even cybercriminals. Think it hasn’t happened to you? Here are 10 red flags that your data is already out there and the steps you can take to stop it from spreading further.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join. Illustration of a woman’s personal data being exposed (Kurt “CyberGuy” Knutsson)Be proactive about your privacyIf your personal information appears on people-finder sites or in sketchy online databases, it stays there until you remove it. This means your full name, home address, email, and phone number are available to anyone, including scammers and stalkers. You can manually opt out of each site, but that takes time and patience. Instead, consider an automated privacy service that scans data broker sites and sends removal requests on your behalf. The less data floating around, the less likely it is to be misused.11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025 Illustration of personal data available online (Kurt “CyberGuy” Knutsson)OVER 8M PATIENT RECORDS LEAKED IN HEALTHCARE DATA BREACH10 signs your data is being bought and soldIf any of these are happening to you, your data is likely already floating around the broker and scammer economy. Here’s what to watch for: 1. You’re suddenly flooded with spam emailsIf your inbox is overflowing with shady product offers, sketchy promotions, or strange marketing emails you never signed up for, it’s a good bet your email address has been sold. This kind of spam typically results from your address being added to mass marketing lists purchased in bulk.2. You’re getting nonstop scam callsMore calls than usual from unknown numbers? Telemarketers, fake IRS agents, and car warranty scammers often use brokered phone lists. If you’re getting several calls a day, it likely means your number is being recycled by different call centers and fraud operations.3. You receive password-reset emails you didn’t requestUnfamiliar password-reset prompts are a sign someone is attempting to access your account. They may have found your email address and other leaked credentials and are now probing for weak points. It’s a key signal that your digital footprint is being exploited.4. You notice strange charges on your bank accountTiny charges can be a test by cybercriminals to see if stolen card info works. If even one unrecognized charge shows up, it’s critical to act fast. These small transactions often lead to bigger, more damaging fraud if ignored.5. You’re locked out of your own accountsLosing access to your email, bank, or social media accounts may mean hackers have already reset your passwords. With enough personal data, criminals can bypass security questions and fully take over your identity online.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?6. Friends say they got weird messages from youIf your contacts report strange DMs, fake money requests, or odd links coming from your accounts, that’s a strong sign someone else has gained access. Cybercriminals use this tactic to trick your friends into clicking dangerous links or handing over money.7. Sketchy social media accounts start following youA wave of fake profiles suddenly following or messaging you is more than annoying; it could be a coordinated attempt to gather more information about you or impersonate you later. These accounts may also be bots programmed to phish for details or direct you to scam pages.8. Personal info is already filled in on new websitesIf your name, email, or phone number shows up on a form before you even touch the keyboard, that website may have purchased your information. Some sites share consumer data with partners, and this pre-fill behavior can indicate that your data is being sold and shared.9. You find your profile on people-search websitesSites like Spokeo or Whitepages can display your full name, home address, phone number, family members, and more often scraped from public records or sold by data brokers. This makes you a target for identity theft, scams, and unwanted contact. 10. You’re denied credit or insurance for unclear reasonsRejections for loans, insurance, or rental applications can stem from inaccurate or outdated data in broker databases. If your reputation or credit score is being shaped by information you didn’t even know existed, that’s a clear signal that your data is out of your hands. A woman working on her laptop (Kurt “CyberGuy” Knutsson)CUSTOM DATA REMOVAL: WHY IT MATTERS FOR PERSONAL INFO ONLINEHow to stay safe: Steps to protect your data nowNoticing just a few of these signs means it’s time to take action. The more proactive you are, the better you can limit future damage and prevent your data from spreading further.1. Invest in a personal data removal service: Personal data removal services can request that your information be taken down from hundreds of data broker sites. It’s an effective way to remove your name from public listings and stop new profiles from popping up. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Strengthen your passwords: Use long, unique passwords that are different for every account. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.3. Turn on two-factor authentication: Adding a second step to your login process, like a text code or app confirmation, can stop hackers even if they know your password. Turn this on for email, banking, and any service that stores your sensitive info.4. Monitor your financial accounts regularly: Check your bank and credit card statements every few days. Set up alerts for any activity, and if you’re not actively applying for credit, consider freezing your credit reports with all three bureaus.5. Use alias email addresses: Create separate email addresses for things like online shopping, sign-ups, and banking. This helps keep your primary inbox private and makes it easier to trace which services may be leaking or selling your information. If one alias starts receiving junk mail or suspicious messages, you can simply delete it without affecting your main account. It’s one of the simplest ways to reduce spam and protect your digital identity. See my review of the best secure and private email services here.6. Don’t click suspicious links or attachments, and use strong antivirus software: Phishing attempts often look convincing, especially if scammers already know your name or other details. If something feels off, delete the message and go directly to the website instead of clicking the link. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.7. Be cautious about what you post publicly: Avoid sharing your birthday, hometown, full name, or photos of your home or license plates. Social media platforms are heavily scraped by bots and bad actors looking to compile detailed profiles.8. Block robocalls and filter scam numbers: A surge in robocalls is a strong sign your phone number is being sold or shared by data brokers. These calls often come from spoofed or international numbers and may include fake IRS agents, tech support scams, or phony insurance offers. To fight back, enable your phone carrier’s spam call protection (AT&T ActiveArmor, Verizon Call Filter, or T-Mobile Scam Shield). You can also use third-party apps like RoboKiller, Hiya, or Truecaller to screen calls, block known scam numbers, and report suspicious callers. Be sure to avoid answering unknown calls, even pressing a button to “opt out” can confirm your number is active and lead to more spam. Check out how to get rid of robocalls with apps and data removal services.WHAT HACKERS CAN LEARN ABOUT YOU FROM A DATA BROKER FILEKurt’s key takeaways Your personal data is valuable, and once it’s out there, it’s difficult, sometimes impossible, to claw it back. But you’re not powerless. The more proactive you are, the safer you’ll be. Start by cleaning up your digital footprint and removing your information from people finder and data broker sites. Whether you go manual or use a trusted service, acting now can help you avoid bigger problems later. Protect your privacy, defend your accounts, and stay one step ahead of the scammers.CLICK HERE TO GET THE FOX NEWS APPShould data brokers be required to get your permission before collecting and selling your personal information? Let us know by writing to us at Cyberguy.com/Contact. For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

10 signs your personal data is being sold online Read More »

1 android security upgrades outsmart scams and protect your privacy

Android security upgrades outsmart scams and protect your privacy

NEWYou can now listen to Fox News articles!
With the increasing sophistication of digital threats, safeguarding your phone and personal data has never been more crucial. Android is responding with a suite of new security features designed to protect you from scams, fraud, and device theft. These enhancements are primarily rolling out to devices running Android 16. Some protections, such as enhanced theft protection and AI-powered scam detection, are also becoming available on select devices running Android 10 and later via Google Play Services updates. The most advanced features, including Identity Check and device-level Advanced Protection, are initially launching on Google Pixel and Samsung devices with One UI 7, with plans to expand to other manufacturers as they update to Android 16. Let’s take a look at how these innovations are making Android security smarter and more comprehensive.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join. Android phone (Kurt “CyberGuy” Knutsson)1. Smarter protections against phone call scamsPhone scammers are becoming increasingly creative, often attempting to trick people into changing device security settings or granting risky permissions during calls. Android’s new in-call protections add a layer of defense by blocking certain actions during calls with non-contacts. For example, you won’t be able to disable Google Play Protect, sideload an app for the first time, or grant accessibility permissions while on a call with someone not in your contacts. If you’re screen-sharing during a call, Android will prompt you to stop sharing when the call ends.ANDROID SCAM LETS HACKERS USE YOUR CREDIT CARD REMOTELY In-call protections (Google)BEST ANTIVIRUS FOR ANDROIDS – CYBERGUY PICKS 20252. Smarter scam detection in Google MessagesAndroid’s AI-powered Scam Detection in Google Messages and Phone by Google is now even more intelligent. It can identify suspicious conversation patterns in real-time and warn you before you fall victim to a scam. This protection covers a wide range of scams, including toll road and billing fee scams, cryptocurrency scams, financial impersonation scams, gift card and prize scams, tech support scams, and more. All message analysis happens on your device, so your conversations stay private.Availability can vary depending on your device, region, and carrier. If you don’t see these features yet, make sure your app is updated and keep an eye out as Google continues to expand support to more users worldwide. Scam Detection (Google)3. Fighting fraud and impersonation with Key VerifierTo help protect you from scammers who try to impersonate someone you know, Android is rolling out Key Verifier in Google Messages. This feature lets you and your contact verify each other’s identity using public encryption keys, either by scanning a QR code or comparing numbers. If a contact’s verification status changes, like after a SIM swap, you’ll see a warning, giving you extra confidence that you’re talking to the right person. Key Verifier (Google)4. Find Hub: Locating what matters most, from luggage to loved onesIf you’ve ever used Android’s Find My Device to track down a lost phone or set of keys, you know how helpful it can be. Now, Find My Device is evolving into Find Hub, making it easier to keep track of your devices, family, and friends all in one place, with more partner brands joining the network.Find Hub is also becoming more personalized. Whether you want built-in luggage tracking from July and Mokobara, ski protection with Peak integration, or Disney-themed Bluetooth tags from Pixbee, there are options to suit different needs. Soon, tags that are enabled with ultra-wideband, starting with moto tag, will provide improved nearby location tracking.Later this year, Find Hub will include satellite connectivity, allowing you to stay connected with friends and family even when cellular service is unavailable. For travelers, new partnerships with airlines such as Aer Lingus, British Airways, Cathay Pacific, Iberia, and Singapore Airlines will let you share your Bluetooth tag’s location directly with these airlines. This should make recovering lost luggage easier and less stressful. Find Hub (Google)7 NEW GOOGLE AI TOOLS FROM I/O 2025 YOU SHOULD KNOW ABOUT5. Comprehensive mobile theft protection and advanced securityAndroid continues to strengthen its theft protection features. The new Identity Check adds an extra layer of security if your PIN or password is compromised, and it’s rolling out to more devices with Android 16. Factory Reset Protection is getting tougher, restricting all functionalities on devices reset without the owner’s authorization. Remote Lock now includes a security challenge question to prevent unauthorized use, and one-time passwords will be hidden on the lock screen in higher-risk scenarios. Identity check, factory reset protection and remote lock (Google)GOOGLE’S NEW AI TECH MAY KNOW WHEN YOUR HOUSE WILL BURN DOWN6. Advanced Protection: Google’s strongest mobile security made simpleFor those who want even stronger security, Advanced Protection is now available as a device-level setting in Android 16. This combines Google’s most robust security tools, like intrusion logging and scam call detection, into one setting that can’t be turned off without unenrolling.Whether you’re a journalist, a public figure, or just want extra peace of mind, Android 16 makes it easy to activate Advanced Protection. This suite of features brings together Google’s top security tools, like Intrusion Logging, USB protection, and scam detection for calls, into one powerful setting. Once enabled, these protections can’t be turned off, shielding you against even the most sophisticated attacks. And new features are on the way, including tighter controls over app permissions and network connections.To turn on Google’s Advanced Protection, follow these steps:Settings may vary depending on your Android phone’s manufacturer. Open SettingsScroll down and tap on Security or Privacy & Security, depending on your device model.Look for the Advanced Protection section. This may be listed under More Security Settings or a similar submenu.Tap Advanced Protection and select Get Started or Enroll.The setup process will guide you through enabling features like Intrusion Logging, USB protection, and scam call detection.You may be prompted to verify your identity (such as entering your password or using biometric authentication). Once you’ve completed the steps, you’ll see a confirmation that Advanced Protection is active.Note: After activation, these protections cannot be turned off without unenrolling from Advanced Protection. Advanced Protection (Google)Optional: Review additional settingsYou can review and adjust related security settings within the Advanced Protection menu, such as app permissions and network controls, as new features become available. If you don’t see the option, make sure your device is updated to Android 16 and check for any additional requirements, such as a Google account or specific device compatibility. Some features may require additional verification steps, like using a security key or two-factor authentication, especially if you’re enrolling for the first time or on a new device.DON’T BE SO QUICK TO CLICK THAT GOOGLE CALENDAR INVITE. IT COULD BE A HACKER’S TRAPAdditional steps to keep your Android and data safeWhile Android is doing a lot to protect you, there are a few extra steps you can take to boost your security:Install strong antivirus software: This adds another layer of defense against malware and suspicious apps. Google Play Protect, which is built-in malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices. So, you may want to choose a strong antivirus app and keep it updated for maximum protection. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.Keep your device updated: Always install the latest Android updates to patch any security vulnerabilities. Updates often include important security fixes that protect against new threats. To do this, go to Settings, tap System or About phone, select Software update or System update, then tap Download and Install if an update is available.Use strong, unique passwords: Avoid reusing passwords across different accounts to reduce the risk if one is compromised. Consider a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.Be cautious with app permissions: Only grant apps the permissions they truly need. Review permissions regularly and revoke any that seem unnecessary or intrusive.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Enable two-factor authentication: This adds an extra step to your logins, making it more difficult for others to access your accounts. Most major apps and services offer this feature in their security settings.Download apps only from the Google Play Store: Avoid third-party stores, which are more likely to host unsafe apps. The Play Store has security checks that help reduce the risk of downloading malicious software.Regularly review your privacy settings: Make sure you’re comfortable with what you’re sharing. Adjust settings to limit data sharing and enhance your privacy whenever possible.Consider a personal data removal service: Scammers often start by gathering information about you from public records and data broker sites. Using a personal data removal service can help scrub your personal details from these sites, making it much harder for scammers to target you. If you’re concerned about your privacy or just want to take your security to the next level, this is a smart step to consider.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeaways Keeping your phone and personal data secure is more important than ever, but Android is making it easier to stay protected with smarter scam detection, new ways to keep track of your devices and loved ones, and the strongest security features yet. By taking a few extra steps, like using strong passwords, keeping your device updated, and considering a personal data removal service, you’re adding even more layers of protection against evolving threats. Security is always changing, but with these tools and habits, you can use your Android device with greater confidence and peace of mind.CLICK HERE TO GET THE FOX NEWS APPWho do you think should bear the greatest responsibility for keeping your data safe: tech companies, the government, or you as an individual? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

Android security upgrades outsmart scams and protect your privacy Read More »

1 heartless scammers use venmo to steal donations from cancer nonprofit supporters intro

Fake Venmo accounts are stealing donations from real charities

NEWYou can now listen to Fox News articles!
Apps like Venmo, Zelle, Cash App, and PayPal have changed how we move money. They are fast and convenient, but with that ease comes exposure. If you send funds to the wrong person, they are likely gone for good. There is often no real path to recovery, especially when the recipient disappears behind a fake username and an unresponsive support system.This vulnerability becomes even more dangerous in moments of crisis. During natural disasters, high-profile social movements, or health emergencies, people are moved to give. Scammers know this and exploit the impulse. One such scam involved a fake Venmo account pretending to collect donations for a Minnesota nonprofit after the death of George Floyd. The account looked legitimate, but the funds never reached the organization.A similar scam is targeting Miles Perret Cancer Services, a nonprofit based in Louisiana. Scammers have created a fraudulent Venmo account that closely mimics the legitimate Venmo handle of the cancer nonprofit organization. They are using this fake account to trick well-meaning donors into sending money, believing they are supporting the real charity.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join. Zelle and Venmo apps (Kurt “CyberGuy” Knutsson)Fake Venmo account mimics real charity: How 1 character can fool youMiles Perret Cancer Services (MPCS) provides support to families facing cancer diagnoses. They recently discovered that a fraudulent Venmo account is impersonating their official one. Their real handle is @milesperretcs. The scammer’s account uses @milesperretcs_, a nearly indistinguishable copy.To the average person, the difference is invisible. That is precisely what makes it dangerous.”We reported this account through the app more than 24 hours ago,” Timothy Rinaldi, executive director of MPCS, told Cyberguy. “There has been no follow-up from Venmo. We tried the live chat option, but it was abruptly closed with no resolution.”Instead of helping, Venmo routed Rinaldi through generic FAQs and legal disclaimers. Even after he was connected with a live support agent, the responses were standard scripts. He was told that the issue had been escalated, but no one could provide a timeline beyond a vague window of three to five business days. Real and fake Venmo accounts (Kurt “CyberGuy” Knutsson)FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICECharity scams on Venmo: How scammers trick donors using fake accountsFake Venmo accounts have been used in recent years to exploit donation drives for hurricane relief, animal shelters, medical funds, and other causes. The formula is simple. Take a known nonprofit, tweak the username slightly, and ride the momentum of goodwill. By the time anyone catches on, the money is gone and the damage is done.The incident involving MPCS is not an isolated case. In December 2024, Final Victory Animal Rescue, a nonprofit based in South Carolina, discovered a Venmo account impersonating the organization and collecting donations intended for the real charity. The group’s general manager, Michael Sniezek, confirmed the account had been receiving funds from unsuspecting donors before the issue was flagged. In another case, Alone No More Dog Rescue, a Phoenix-based nonprofit, posted on Facebook that fraudulent Venmo accounts had been targeting its past donors, sending them payment requests and soliciting additional funds under false pretenses.MPCS has filed a report with the Federal Trade Commission, but there is no guarantee of quick resolution. The fraudulent account remains active as of press time. It is unclear how much has already been lost or whether Venmo will recover and return any of it. A hacker at work (Kurt “CyberGuy” Knutsson)THIS IS WHAT YOU ARE DOING WRONG WHEN SCAMMERS CALLVenmo confirms fake accounts were removed and shares how to stay safeVenmo confirmed that the imposter accounts were removed promptly after being reported. They recommend reporting suspicious activity directly within the Venmo app and contacting customer support for further assistance.To help users avoid future scams, Venmo encourages everyone to review its official security tips on how to recognize impersonation attempts and learn how to spot and avoid charity-related scams.They also shared the following tips to help users verify real Venmo profiles and stay safe when sending money:Double-check the Venmo username (handle): Look closely for misspellings, extra characters or attempts at impersonation. Use Venmo QR codes: Scan QR codes directly from the Venmo app to ensure you’re sending money to the right person. Donate only to verified Venmo charity accounts: These are vetted and marked with verification badges. You can find them here.Heed Venmo’s automatic warnings: If Venmo flags a payment as suspicious, pause and verify before sending money. These alerts are designed to protect you from scams.How to avoid Venmo scams: 11 expert tips to protect your moneyScammers aren’t just targeting charities. They’re after anyone and everyone. Here are a few ways to protect yourself and keep your hard-earned money safe.1) Always access the payment app from the official app or website, and not from any third-party platforms or services.2) Look at the security settings that the payment app offers and make sure they’re all set to the highest and most protective settings.3) Consider using a personal data removal service to protect your privacy and reduce your risk of scams. Scammers who target payment apps like Venmo, Zelle, Cash App, and PayPal often rely on information found on data broker and people-search sites to craft convincing impersonations or phishing attempts. These sites can list your name, address, phone number, and even connections to organizations you support, making it easier for fraudsters to trick you or others into sending money to fake accounts.Personal data removal services work by automatically removing your information from hundreds of data broker sites, making it much harder for scammers to find and misuse your details. By scrubbing your data from these sources, you lower your risk of being targeted in payment app scams and reduce the likelihood that someone could impersonate you or a nonprofit you care about. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web 4) Create a strong, unique and complex password for each of your mobile payment apps and change it often. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.5) Enable two-factor authentication, which means that you need to enter a code or use your fingerprint or face to unlock your account to prevent unauthorized access. This way, even if someone knows your password, they can’t log in without your device or confirmation.6) Lock your device and log out of your apps. You should always lock your phone with a password, PIN, pattern, fingerprint, or face. Never share your password, PIN, or security code with anyone. You should also log out of your mobile payment apps after each use and turn off the auto-login feature. This way, even if someone takes or borrows your device, they can’t access your mobile payment apps without your approval.7) Verify the identity and legitimacy of the sender or receiver. You should always check the name, photo, username, and contact information of the person or organization you are sending money to or receiving money from before accepting or sending any payment requests. You should also confirm the reason and amount of the transaction before you agree to it. If you are not sure or have any doubts, you should contact the person or organization directly through another way, such as a phone call, text message, or email, but only if you know for sure that those forms of communication are legitimate. You should never send money or give your account details to anyone you don’t know or trust, or anyone who asks you to do so out of the blue.8) Link your Venmo to a credit card as opposed to a debit card, so you can dispute a charge from scammers more easily. However, keep in mind, linking a credit card to your payment app can provide additional protection in the event of fraud, but this can come with extra costs in terms of transaction fees.9) Try not to keep a balance in your money-transferring apps. You have a much better chance of being helped by your bank or credit card company when it comes to fraud than you do from a money-transferring app.10) Use strong antivirus software and never click on links from unknown sources, especially when an email or text appears to have come from the payment App. Protect yourself from accidentally clicking on malicious links by running antivirus software on your device.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.11) Monitor your account activity and report any suspicious or unauthorized transactions. You should set up notifications from your payment app and your bank via text or email, and check your account activity regularly. Look for any signs of fraud, such as payments you didn’t make or receive, or changes to your account settings or information.Kurt’s key takeawayUnlike traditional banks, which are bound by federal consumer protection laws and fraud resolution timelines, peer-to-peer payment apps operate in a much looser regulatory environment. Services like Venmo often state in their user agreements that they are not responsible for mistaken or unauthorized payments unless there is clear evidence of account compromise or technical malfunction. Venmo’s only suggestion here was to respond to a support ticket and wait. There was no emergency fraud hotline, no dedicated contact for nonprofits, and no indication that urgent action would be taken. Payment apps that allow donations to flow as quickly as a text message must also bear the responsibility of keeping those transactions safe. When a nonprofit has to beg for support just to protect its own identity, something is broken.Should payment platforms be held responsible for losses caused by impersonation scams? Let us know by writing to us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you’d like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.

Fake Venmo accounts are stealing donations from real charities Read More »