Normal view

Before yesterdayTechnology News Articles on Fox News

Mac users beware: AI-powered malware threats are on the rise

16 February 2025 at 09:00

Apple devices are believed to be pretty secure, and that's what the company will tell you. You might have seen the tagline "Privacy. That’s Apple." in their promotions. 

However, the tech landscape is changing, and even Apple products aren’t beyond cybercriminals’ reach. 

A new report suggests Mac users will need to be more vigilant this year because AI advancements are helping hackers breach even the most secure systems. I have consistently reported on how Mac malware is targeting users, and experts now believe this will only get worse.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

Mac malware is not what it used to be. For years, the biggest threats were annoying adware and browser hijackers, more of a nuisance than a real danger. But that is changing fast. As highlighted by Malwarebytes, a new wave of information stealers is taking over, and they are far more dangerous, going after passwords, authentication cookies, credit card details and even cryptocurrency.

This shift started in mid-2023 with the arrival of Atomic Stealer, also known as AMOS, a piece of malware that looked much more like something you would see on Windows than the typical Mac threats. AMOS was not just effective. It was easy to use and sold as a service  for $1,000 a month with a slick web-based control panel. That success led to the rise of even more dangerous variants.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

One of them, Poseidon, launched in mid-2024 and quickly became the dominant Mac stealer, responsible for 70% of infections. It can drain over 160 different cryptocurrency wallets, steal passwords from browsers and password managers and even grab VPN credentials.

At the same time, cybercriminals have doubled down on malvertising, using fake ads on Google and Bing to trick users into downloading malware instead of real software. These campaigns are highly targeted, allowing attackers to pinpoint Mac users and serve fake downloads based on their searches. With AI now being used to create and execute many of these attacks, they are likely to increase in scale.

4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

While Mac malware is evolving, the situation on Android is even more alarming. Phishing attacks on the platform have reached staggering levels, with thousands of malicious apps designed to steal credentials and bypass security measures.

So far in 2024, researchers have detected 22,800 phishing-capable apps, alongside 3,900 apps designed to read OTPs from notification bars and 5,200 apps capable of extracting OTPs from SMS messages. These numbers highlight how widespread and effective Android phishing malware has become.

Just like phishing emails, phishing apps trick users into handing over their usernames, passwords and two-factor authentication codes. Once stolen, these credentials can be sold or used for fraud, identity theft or further cyberattacks. Because phishing apps require minimal code and fewer permissions than traditional malware, they are much easier to sneak onto app stores, including Google Play.

Many phishing apps look like regular, fully functional software. Some impersonate games or utilities, while others appear as cracked versions of popular apps like TikTok, WhatsApp or Spotify. Some stay dormant for days to avoid detection before launching their attacks. Others rely on ad functionality to redirect users to phishing sites, making the malicious code harder to trace.

Google Play Protect, which is built-in malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Follow these essential tips to safeguard your devices from the latest malware threats, including the notorious info stealer malware.

1. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Be cautious with downloads and links: Only download software from reputable sources such as the Mac App Store, Google Play Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages.

3. Keep your software updated: Ensure that both macOS, Android and all installed applications are up to date. Apple and Android frequently release security patches and updates that address vulnerabilities. Enable automatic updates for macOS, Android and your apps to stay protected without having to manually check for updates. If you need more help, see my guide on keeping all your devices updated.

4. Use strong and unique passwords: To protect your Mac from malware, it’s also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. A password manager can be incredibly helpful here. It generates and stores complex passwords for you, making them difficult for hackers to crack. 

It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don’t have to remember them yourself. By reducing the number of passwords you need to recall, you’re less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed Password Managers of 2025 here.

5. Use two-factor authentication (2FA): Enable 2FA for your important accounts, including your Apple ID, Google account, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

The days when Mac users could assume they were safe are long gone. Cybercriminals are evolving their tactics, with Mac malware shifting from simple adware to advanced information stealers. Android phishing apps are also becoming harder to detect and more widespread than ever. From stealing passwords and authentication cookies to intercepting OTPs and draining cryptocurrency wallets, these threats are growing in both sophistication and scale. No platform is immune, and as cybercriminals continue refining their techniques, users and organizations must stay ahead with strong security measures.

Do you trust official app stores like the App Store and Google Play, or do you think they need to do more to prevent malware? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Inflatable tiny house with space for six is blowing up

16 February 2025 at 05:00

We've reported on many tiny houses, but none quite like this before. This housing concept is called the Esch 22 Space Station, also nicknamed E22SS PIU! 

This mobile living space resembles a space station with its inflatable dome, which can inflate to triple its size. The brains behind this futuristic pad is an architectural firm called 2001, and it was developed for Esch-Alzette in Luxembourg, which is the country's second-largest city. 

Now, I'm not talking about just another cramped mobile tiny home here. This thing can not only grow in size but is transportable, and it's even eco-friendly. Let's dive in and see how this space-age dwelling actually works.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

At its core, E22SS PIU! is a 6-person mobile tiny house that can be easily transported to various locations. In its compact form, it resembles a stainless steel trailer, containing essential amenities such as a bathroom, kitchen and dining space. However, the real magic happens when it reaches its destination.

BEST PRESIDENT’S DAY DEALS

Once parked, the E22SS PIU! undergoes a remarkable transformation. Two wings unfold from the trailer, creating a circular platform with a 29.53-foot diameter. This platform is then covered with cork, providing a stable and eco-friendly base. The final step in this metamorphosis is the inflation of a double-shell pneumatic dome on top of the platform.

This inflation process, which can be completed in as little as 15 minutes, turns the compact trailer into generous sleeping quarters capable of accommodating up to six people comfortably.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

UNSTOPPABLE OFF-ROAD TINY HOUSE CONQUERS ANY TERRAIN, ANYWHERE

The E22SS PIU! incorporates several innovative features. A water recycling system ensures that wastewater from sinks and showers is repurposed for toilet flushing, promoting efficient water use. Accessibility has been carefully considered, with an elevator system ensuring the upper level is accessible to people with reduced mobility. 

The use of cork for flooring adds an eco-friendly touch to the design, further emphasizing the project's commitment to sustainability.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

BUILDING-IN-A-BOX TRANSFORMS INTO A PORTABLE TINY HOME IN MINUTES

While the E22SS PIU! may not be a practical solution for everyday tiny living, it serves a greater purpose. Created as part of Esch's Capital of Culture program, this project is designed to explore various contexts and environments within the city of Esch. It challenges our perceptions of resource usage in architecture and society, stimulating discussions about innovative housing solutions. 

Phillippe Nathan, Founder of 2001, an architecture firm developing territories, buildings, spaces and ideas, tells CyberGuy, "E22SSPIU is not a solution, nor does it seek resolution. It is a provocation — an experimental construct that redefines collective living by destabilizing conventional relationships to resources: soil, water and energy. It resists fixity, embedding itself within shifting landscapes, absorbing and reflecting their logic. Less an answer, more a system in flux."

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

What's cool is that you can now stay in this unique inflatable house situated at the Ellergronn Nature Reserve. The spacious, inflatable structure is now available to rent. So, it's your chance to explore the surrounding trails and immerse yourself in a blend of innovative design and natural beauty.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The Esch 22 Space Station is a bold experiment in mobile architecture. By combining portability with expandability and sustainable features, it pushes the boundaries of what we consider possible in temporary living spaces. While it may not be a practical solution for everyday use, the E22SS PIU! serves as an important conversation starter about the future of housing, resource management and urban development.

Would you feel comfortable staying in an inflatable tiny home like the E22SS PIU!? Why or why not? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

How cyberscams are draining Americans wallets by the billions

15 February 2025 at 09:00

Cyberscams have reached alarming levels in the U.S., with nearly 30% of Americans falling victim to fraudulent schemes in the past year alone. 

The financial toll is staggering — scams cost Americans over $159 billion annually, with average individual losses now exceeding $3,500 per victim. This epidemic is not just a financial crisis but also a human rights issue, as many scams originate from forced labor operations in Southeast Asia. 

With nearly 90% of Americans targeted by scam attempts and 40% receiving suspicious messages daily, the question remains: how can we protect ourselves and hold perpetrators accountable in an increasingly digital world?

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

One of the most pervasive scams today is the so-called "pig butchering" scheme. Originating in China and spreading across Southeast Asia, this scam involves criminals building trust with victims through social media or messaging apps. Once trust is established, victims are lured into fraudulent cryptocurrency investment schemes. These scams are meticulously crafted to appear legitimate, often involving fake trading platforms and simulated profits. Victims are encouraged to invest more until they are "slaughtered," losing their entire savings when the scammers vanish with their funds.

9 WAYS SCAMMERS CAN USE YOUR PHONE NUMBER TO TRY TO TRICK YOU

What makes these scams even more horrifying is their reliance on human trafficking. Criminal syndicates in countries like Myanmar, Cambodia and Laos force trafficked individuals to run these operations under threat of violence. These "scam centers" operate in lawless regions controlled by rebel groups or corrupt officials, making international intervention challenging. Survivors describe conditions akin to modern slavery, with physical abuse and even torture being common.

BEST PRESIDENT’S DAY DEALS

Cyberscams have taken hold in the U.S. for several reasons that make it particularly vulnerable. As an American, you’re likely connected to the digital world through social media platforms, messaging apps and other online tools. This high level of connectivity makes it easier for scammers to reach you directly, whether through a text message, email or social media chat. The sheer number of people online in the U.S. creates a vast pool of potential targets for cybercriminals.

Additionally, the growing popularity of cryptocurrency in the U.S. has made it a prime medium for fraud. Cryptocurrency transactions are fast, anonymous and difficult to trace, which makes them ideal for scammers looking to steal funds without leaving a trail. Many scams are designed to exploit this lack of transparency, leaving victims with little chance of recovering their money once it’s gone.

Another major issue is the lack of a centralized reporting system for cyberscams in the U.S. If you’ve ever been scammed or know someone who has, you might have noticed how confusing it can be to figure out where to report the crime — whether to the FBI, the Federal Trade Commission (FTC) or another agency. This fragmented system not only makes it harder for victims to seek help but also prevents authorities from gathering comprehensive data to tackle the problem effectively. These factors combined have made Americans some of the most targeted individuals in the world when it comes to cyberscams.

FBI'S NEW WARNING ABOUT AI-DRIVEN SCAMS THAT ARE AFTER YOUR CASH

Several countries have implemented innovative measures to combat cyberscams, offering valuable lessons for the U.S. Singapore, for instance, has introduced a mandatory SMS Sender ID Registry (SSIR) that requires organizations to register their alphanumeric Sender IDs. This system effectively blocks unregistered SMS senders, significantly reducing impersonation scams. In fact, cases involving scam SMSes in Singapore fell by 70% over three months after mandating the SSIR.

Britain has taken a different approach by establishing a dedicated "159" hotline, allowing residents to instantly verify suspicious calls. This simple yet effective system provides a quick way for individuals to check the legitimacy of unexpected communications, potentially preventing many scams before they occur.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Many nations have also implemented stricter authentication measures, such as biometric checks and in-app verifications, which have proven highly effective in reducing fraud. For example, Singapore has required facial verification for higher-risk transactions through Singpass since 2022, resulting in no further reports of malware-enabled scams involving unauthorized CPF withdrawals since its implementation in June 2023.

Some countries are exploring ways to slow down cryptocurrency transactions or cap transfer amounts, which could significantly hinder scammers who rely on quick, anonymous transfers. These measures, combined with a coordinated global response involving major victim nations like the U.S. and China, could prove instrumental in dismantling criminal networks more effectively. By learning from these international examples and adapting them to the American context, the U.S. could significantly strengthen its defenses against the rising tide of cyberscams.

Recognizing red flags is essential to avoid falling victim to scams. Here are some important red flags to be aware of:

Protecting yourself and your loved ones from scams requires vigilance and awareness. Here are eight effective ways to safeguard against scammers:

1. Verify before you act: Always verify the identity of the person or organization contacting you. Use official contact information to reach out directly and confirm the legitimacy of the request.

2. Limit personal information sharing: Avoid sharing personal or financial information over the phone, email or online unless you are certain of the recipient's identity and legitimacy.

3. Use strong, unique passwords for all your accounts: A robust password should include a mix of uppercase and lowercase letters, numbers and symbols. Avoid reusing passwords across multiple platforms, and consider using a reputable password manager to store and generate complex passwords securely.

4. Enable two-factor authentication (2FA) wherever possible: 2FA adds an extra layer of security by requiring a secondary verification method, such as a code sent to your phone or biometric authentication. This ensures that even if your password is compromised, unauthorized access remains highly unlikely.

5. Keep your devices and software up to date: By regularly installing the latest updates and security patches, you can ensure your devices are equipped with the latest security features and bug fixes, reducing the risk of becoming a target for cyberattacks. Many cyberattacks exploit unpatched vulnerabilities, so enabling automatic updates for your operating system, apps and antivirus software can significantly reduce your risk. 

GET FOX BUSINESS ON THE GO BY CLICKING HERE

6. Invest in personal data removal services: Consider using a service that specializes in removing your personal information from the internet to reduce your exposure to potential scammers. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

7. Monitor financial accounts: Regularly check your bank and credit card statements for any unusual or unauthorized transactions. Promptly report any suspicious activity.

8. Be skeptical of unsolicited requests: Treat unexpected requests for money or personal information with caution. Scammers often create a sense of urgency to pressure you into acting quickly.

9. Be vigilant against phishing attempts and use strong antivirus software: Avoid clicking on links or downloading attachments from unsolicited emails or messages. Ensure your devices are protected with strong antivirus software that can detect and block malicious activities. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

10. Report Suspected Scams: If you suspect you've encountered a scam, report it to your local authorities, the Federal Trade Commission (FTC), and any relevant financial institutions.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The rise of cyberscams is not just an economic issue but a moral one that demands immediate action. With billions lost annually and countless lives disrupted, we cannot afford complacency in addressing this crisis. By learning from global best practices and fostering international collaboration, we can begin to dismantle these criminal networks. Be sure to follow the steps I outlined to keep yourself safe.

What do you think should be done to tackle cyberscams more effectively? Should governments focus on stricter regulations or public education campaigns? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: Trump's Stargate ambitions

15 February 2025 at 07:30

IN TODAY’S NEWSLETTER:

BREAKING GROUND: Stargate, the massive artificial intelligence (AI) infrastructure project recently unveiled by President Donald Trump, has begun production in Texas — with data center construction in other states expected to be announced in the coming months.

ON ONE CONDITION: Elon Musk will withdraw his unsolicited bid of $97.4 billion to take over OpenAI if its board of directors stops the company’s conversion into a for-profit entity. 

EXISTENTIAL THREAT: OPINION: Our socioeconomic system is facing an existential threat from AI. In our capitalist society, most people depend on jobs to sustain themselves. The U.S. government, in turn, relies heavily on taxing the income of individual workers for revenue.

UNCHARTED TERRITORY: OpenAI CEO Sam Altman commended Vice President JD Vance's artificial intelligence (AI) speech in Paris on Tuesday while laying out his vision for how people can take advantage of the rapidly evolving technology at the same conference.

INHUMAN CARTOON: "The Simpsons" star Hank Azaria has voiced his fears over artificial intelligence in a new opinion piece.

AI ROMANCE SCAMS: "Love is blind" takes on a more sinister meaning when so-called artificial intelligence (AI) becomes a tool for exploiting our deepest human emotions.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Hop in, no driver needed for this future ride-hailing robotaxi

15 February 2025 at 05:00

Autonomous driving technology company Waymo has partnered with automaker Zeekr to develop the next generation of vehicles for ride-hailing services.

Zeekr provides the base electric vehicle platform, called the Zeekr RT, which is purpose-built for autonomous applications. Waymo then integrates its proprietary sixth-generation Waymo Driver technology, including hardware and software, to create the final autonomous vehicle.

This collaboration follows Waymo's established process, which is similar to their work with Jaguar I-PACE vehicles.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

The Waymo Driver, integrated into the Zeekr RT, is equipped with an impressive array of 13 cameras, four lidar units, six radar sensors, and external audio receivers, ensuring a 360-degree view of its surroundings.

To maintain optimal performance in various weather conditions, the Zeekr RT features a specially designed system to keep its sensors clean. This custom-designed sensor-cleaning system includes tiny wipers and spray nozzles for windshield wiper fluid, specifically created by Waymo, to ensure clear visibility for the cameras and lidar sensors. The robotaxi's advanced sensor suite provides overlapping fields of view all around the vehicle, functioning effectively both day and night.

The Zeekr RT serves as the base vehicle for Waymo's autonomous driving technology. The Waymo Driver, which provides the autonomous capabilities, is integrated into the Zeekr RT. This integration includes Waymo's own suite of sensors and a powerful onboard computer. This powerful AI platform is capable of up to 2,500 teraflops of performance, unifying various intelligent functions such as automated driving, parking, occupant monitoring and infotainment into a single architecture.

BEST PRESIDENT’S DAY DEALS

Inside, passengers will find a spacious cabin with a fully configurable interior, which can be tailored to meet the specific requirements of Waymo's ride-hailing service. The Zeekr RT is built on Zeekr's Sustainable Experience Architecture (SEA) platform and features an 800V ultra-fast charging e-powertrain, showcasing the latest advancements in electric vehicle technology.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

ROBOTS TAKE THE WHEEL AS SAN FRANCISCO OPENS STREETS TO DRIVERLESS TAXIS

The journey from concept to production has been swift and impressive. The Zeekr RT was designed and developed at Zeekr's R&D facility, CEVT (China Europe Vehicle Technology Centre) in Gothenburg, Sweden. Waymo has been testing prototype versions of the Zeekr RT on public roads in San Francisco and Phoenix, with human safety drivers at the helm. Mass production of the Zeekr RT is set to begin later this year, with initial deliveries to Waymo for further testing and validation.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

ELECTRIC AIR TAXI AS QUIET AS A DISHWASHER POISED TO CHANGE AIR TRAVEL

As Waymo prepares to integrate the Zeekr RT into its commercial fleet, the future of autonomous ride-hailing services looks promising. Waymo plans to deploy these vehicles in its Waymo One service, which currently operates in select cities like Phoenix and San Francisco. After thorough testing, Waymo aims to operate these vehicles in fully driverless mode, marking a significant milestone in autonomous transportation. The introduction of a cost-effective and passenger-friendly vehicle could give Waymo a competitive edge in the growing robotaxi market.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The Zeekr RT is a pretty big deal in the world of self-driving cars. It's cool to see car companies and tech firms teaming up like this. As these robotaxis hit the streets for testing, we're getting a sneak peek at what city travel might look like in the near future. Sure, there are still some bumps in the road ahead, but the Zeekr RT is definitely pushing us closer to a world where calling a self-driving cab is as normal as ordering a pizza.

Would you feel comfortable taking a ride in a driverless robotaxi? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

China launches center to train 100-plus humanoid robots simultaneously

14 February 2025 at 05:00

Shanghai has officially unveiled its first heterogeneous humanoid robot training center, marking a significant accomplishment in China's robotics development. 

The Humanoid Robot Kylin Training Ground represents an important step in the country's technological advancement, showcasing China's commitment to becoming a global leader in robotics and artificial intelligence.

The National and Local Co-Built Humanoid Robotics Innovation Center has launched a groundbreaking training facility that is revolutionizing the field of robotics. This cutting-edge complex, spanning over 53,800 square feet, is currently capable of training more than 100 humanoid robots at once. The facility features an impressive array of over a dozen specialized training scenarios, including welding, manufacturing and automotive testing.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

These advanced robots have showcased exceptional proficiency, with an average success rate exceeding 90% in various tasks. Their capabilities range from organizing desks and sorting items to operating complex equipment, demonstrating the potential for widespread application across multiple industries. This remarkable achievement underscores the rapid progress being made in the field of humanoid robotics and highlights China's growing prominence in artificial intelligence and automation technologies.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

WAREHOUSE ROBOT USES AI TO PLAY REAL-LIFE TETRIS TO HANDLE MORE THAN EVER BEFORE 

The training facility aligns with China's broader strategy to address multiple challenges, including global tech competition and the complexities of an aging society. By 2027, the center aims to train 1,000 general-purpose robots simultaneously, with plans to collect 10 million high-quality physical data entries through collaborations with local robot manufacturers.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

WILLING TO PAY $175,000 FOR A LIFE-SIZE ROBOT FRIEND THAT REMEMBERS EVERYTHING ABOUT YOU?

The center is preparing to introduce the 2.0 version of its humanoid robot, "Deep Snake," which will showcase advanced technologies like linear joint actuators. This means the robot will have smoother, more precise movements. Linear joint actuators are like advanced motors that allow the robot's joints to move in a straight line, giving it more fluid and controlled motions. It's a big step forward in making robots that can perform a wider range of tasks with greater accuracy and efficiency. These innovations are expected to enhance the versatility and performance of humanoid robots, further solidifying China's leadership in the robotics industry.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

ROBOTIC DOG HELPS THOSE FACING MENTAL HEALTH AND COGNITIVE CHALLENGES

The Chinese humanoid robot market is experiencing explosive growth, showcasing the country's rapid advancement in this cutting-edge technology sector. In 2024, the market was valued at $379 million, demonstrating significant initial traction. Looking ahead, projections indicate a remarkable expansion to approximately $2.3 billion by 2025, based on current exchange rates. Even more impressive is the anticipated growth to about $11.8 billion by 2030, highlighting the immense potential of this industry. The development extends beyond industrial applications, with plans for the first World Humanoid Robot Sports Games and even a marathon-running robot named "Tiangong" set to compete in April.

BEST PRESIDENT’S DAY DEALS

China's investment in the Humanoid Robot Kylin Training Ground is a strategic move to reshape industrial capabilities, address societal challenges and position the country at the forefront of global innovation. As the technology continues to evolve, the world will be watching closely to see how these advanced robots will transform various sectors and potentially redefine human-machine interaction.

Do you think humanoid robots are the solution to tomorrow's workforce challenges or the beginning of a technological transformation where humans are replaced? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: VP calls for ideology-free AI

12 February 2025 at 10:47

IN TODAY’S NEWSLETTER:

- Vance tells world leaders AI must be 'free from ideological bias,' American tech won't be censorship tool

- Altman says Musk 'trying to slow us down,' OpenAI not for sale

- Top translation apps for travelers

FREE FROM BIAS: Vice President JD Vance told world leaders in Paris on Tuesday that the United States intends to remain the dominant force in artificial intelligence and warned that the European Union's far tougher regulatory approach to the technology could cripple it.

'TRYING TO SLOW US DOWN': OpenAI CEO Sam Altman said Elon Musk is "probably just trying to slow us down" with his bid to purchase the company, insisting on Tuesday that it is not for sale. 

'MASS SURVEILLANCE': OpenAI CEO Sam Altman predicts that artificial general intelligence will lead to lower costs for many goods, but has also warned that AI could be leveraged by authoritarian governments aiming to control people.

TRANSLATED TRUTH: Whether you have an iPhone or an Android, these apps have got you covered with features like live speech translation, text input and even AI-powered sign and menu translation.

CONDOLEEZZA RICE, AMY ZEGART: DeepSeek’s new AI model is causing deep consternation from Silicon Valley to Washington. Few would have predicted that a little-known Chinese startup with a couple of hundred homegrown engineers would be able to release a frontier AI model rivaling the capabilities of America’s best and biggest tech companies – reportedly at a fraction of the cost and computational power.

SPEEDY ROBOT DOG: A Chinese team has unveiled a groundbreaking quadruped robot that is pushing the boundaries of robotics and speed.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Reset what you see on social media

11 February 2025 at 13:55

You went down a rabbit hole and now gardening (or hot rod or political) posts are all you see online. Algorithms are smart, but they don’t know when you’re ready to get back to your regularly scheduled programming. 

It’s time to reset your feed and take control of what you see.

Win an iPhone 16 Pro with Apple Intelligence ($999 value). 

No purchase necessary. Enter to win now!

5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER

Start with Facebook

Goodbye, annoying ads. It only takes a minute to kick out the things you no longer want to see.

The fix: Filter your advertising topics by going to Settings & Privacy > Settings > Account Center > Ad Preferences > Customize ads.

Random Facebook requests can end badly. This one lost a widow $40K.

Now, on to YouTube

Say your family is staying with you for the holidays and your niece is watching cartoons on your YouTube account all day long. Now that’s all YouTube recommends. Delete your search history to get things back to normal. 

The fix: On the YouTube app, tap You to bring up your History. Tap the cog icon > Settings > Manage All History. At the bottom, you’ll see DELETE with a blue down arrow. Tap from the dropdown menu to delete videos from today, a custom range or all time. Click X to remove items individually, if you prefer.

10 TECH UPGRADES TO SAVE YOUR TIME, PRIVACY AND MONEY THIS YEAR

Going forward, turn off your viewing history any time you don’t want those vids in your algorithm. You can set your video and search histories to autodelete, too. Now your YouTube is back to how you like it, with my video podcast at the very top. You’ll love it!

TikTok tracks your habits 

TikTok’s algorithm is built to keep you on the app. Every time you like, follow or comment on something, it tells the algorithm you’re interested in a video, and more videos like it will pop up on your For You page. Disliking a video or writing a nasty comment doesn’t matter, by the way; you still kept watching.

The fix: Reset your feed. Open your Profile in the bottom right corner then press the three lines at the top right > Settings and Privacy > Content Preferences > Refresh Your For You Feed > Continue. 

Fine-tune Instagram 

Watch Instagram Reels instead? There’s no way to reset them, but you can nudge the algorithm in the right direction.

The fix: Tap the three dots in the upper right corner. From here, you can adjust:

I’M A TECH EXPERT: 10 AI PROMPTS YOU’LL USE ALL THE TIME

Here’s the giveaway that an email from Instagram about your security is fake.

Most apps have this option

On just about every social platform, you can hide or see less of certain things. The more you take this action, the more you steer the algorithm.

The fix: Next to a post, video or anything else, look for the three-dot or three-line menu that opens more options. On YouTube, for example, tap the three dots next to a video and choose Don’t recommend channel or Not interested.

Feeling inspired to clean more of your digital traces? Wipe your browser history while you’re at it. Here’s how.

Final piece of advice

Your social media feed is carefully curated based on who you follow, who follows you and, most importantly, what you do online. Sure, you can reset your algorithm, but don’t be fooled. Every post you linger on, like, comment on or share gets tracked and used to shape what you see next. Even just scrolling tells the platform what grabs your attention. 

Before your next deep dive, remember: Big Tech is always watching, and your every move fine-tunes what pops up next.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

❌
❌