Normal view

Before yesterdayMain stream

Border Patrol agents to stop wearing body cameras after social media post reveals ‘security risk’

16 February 2025 at 11:41

Agents with the U.S. Customs and Border Protection (CBP) will no longer wear body cameras during field operations after a social media post publicized how to identify individual agents.

"All U.S. Border Patrol Agents will cease the use of body-worn cameras (BWC) in all operational environments," CBP said in a statement to NewsNation, which originally reported the news.

The directive comes after a post on Reddit claimed that the mobile application BLE Radar, which uses Bluetooth to scan for low-energy devices such as phones, smartwatches and speakers, can also track CBP body cameras from a distance of 100 yards and can also trigger improvised explosive devices.

FRUSTRATED CHICAGOANS BACK ICE DEPORTATIONS, APPLAUD DOJ LAWSUIT TARGETING SANCTUARY POLICIES

CBP officials sent out a directive following the post informing agents of a "potential security risk" while immediately pulling body cameras from use in the field.

"Pending completion of investigation and risk mitigation, all Agents will stand down the use of their BWCs [body worn cameras] until further notice. Additional guidance and information will be disseminated as it is received," the directive said.

Sources told NewsNation that the cameras used by CBP agents are Avon body cams, which the social media post claims are devices BLE Radar, which was developed by F-Droid, can detect.

DAILY AVERAGE OF KNOWN GOTAWAYS AT SOUTHERN BORDER PLUMMETS, DOWN 93% FROM BIDEN ADMINISTRATION HIGHS

The directive comes as both CBP and U.S. Immigration and Customs Enforcement (ICE) agents have ramped up enforcement efforts in the weeks since President Donald Trump took office, an effort that was a cornerstone of the president's campaign to return to the White House.

Since the beginning of February, the daily average of gotaways, or illegal immigrants who successfully enter the U.S. without being apprehended, at the southern border has fallen to just 132 per day, a 93% drop from highs seen under former President Joe Biden, a senior Department of Homeland Security source told Fox News.

Data obtained by Fox News showed that during FY 2023, 670,674 known gotaways were recorded by the agency, or more than 1,800 per day.

CLICK HERE TO GET THE FOX NEWS APP

CBP did not immediately respond to a Fox News Digital request for comment.

Fox News’ Bill Melugin and Greg Wehner contributed to this report.

Mac users beware: AI-powered malware threats are on the rise

16 February 2025 at 09:00

Apple devices are believed to be pretty secure, and that's what the company will tell you. You might have seen the tagline "Privacy. That’s Apple." in their promotions. 

However, the tech landscape is changing, and even Apple products aren’t beyond cybercriminals’ reach. 

A new report suggests Mac users will need to be more vigilant this year because AI advancements are helping hackers breach even the most secure systems. I have consistently reported on how Mac malware is targeting users, and experts now believe this will only get worse.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

Mac malware is not what it used to be. For years, the biggest threats were annoying adware and browser hijackers, more of a nuisance than a real danger. But that is changing fast. As highlighted by Malwarebytes, a new wave of information stealers is taking over, and they are far more dangerous, going after passwords, authentication cookies, credit card details and even cryptocurrency.

This shift started in mid-2023 with the arrival of Atomic Stealer, also known as AMOS, a piece of malware that looked much more like something you would see on Windows than the typical Mac threats. AMOS was not just effective. It was easy to use and sold as a service  for $1,000 a month with a slick web-based control panel. That success led to the rise of even more dangerous variants.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

One of them, Poseidon, launched in mid-2024 and quickly became the dominant Mac stealer, responsible for 70% of infections. It can drain over 160 different cryptocurrency wallets, steal passwords from browsers and password managers and even grab VPN credentials.

At the same time, cybercriminals have doubled down on malvertising, using fake ads on Google and Bing to trick users into downloading malware instead of real software. These campaigns are highly targeted, allowing attackers to pinpoint Mac users and serve fake downloads based on their searches. With AI now being used to create and execute many of these attacks, they are likely to increase in scale.

4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

While Mac malware is evolving, the situation on Android is even more alarming. Phishing attacks on the platform have reached staggering levels, with thousands of malicious apps designed to steal credentials and bypass security measures.

So far in 2024, researchers have detected 22,800 phishing-capable apps, alongside 3,900 apps designed to read OTPs from notification bars and 5,200 apps capable of extracting OTPs from SMS messages. These numbers highlight how widespread and effective Android phishing malware has become.

Just like phishing emails, phishing apps trick users into handing over their usernames, passwords and two-factor authentication codes. Once stolen, these credentials can be sold or used for fraud, identity theft or further cyberattacks. Because phishing apps require minimal code and fewer permissions than traditional malware, they are much easier to sneak onto app stores, including Google Play.

Many phishing apps look like regular, fully functional software. Some impersonate games or utilities, while others appear as cracked versions of popular apps like TikTok, WhatsApp or Spotify. Some stay dormant for days to avoid detection before launching their attacks. Others rely on ad functionality to redirect users to phishing sites, making the malicious code harder to trace.

Google Play Protect, which is built-in malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Follow these essential tips to safeguard your devices from the latest malware threats, including the notorious info stealer malware.

1. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Be cautious with downloads and links: Only download software from reputable sources such as the Mac App Store, Google Play Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages.

3. Keep your software updated: Ensure that both macOS, Android and all installed applications are up to date. Apple and Android frequently release security patches and updates that address vulnerabilities. Enable automatic updates for macOS, Android and your apps to stay protected without having to manually check for updates. If you need more help, see my guide on keeping all your devices updated.

4. Use strong and unique passwords: To protect your Mac from malware, it’s also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. A password manager can be incredibly helpful here. It generates and stores complex passwords for you, making them difficult for hackers to crack. 

It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don’t have to remember them yourself. By reducing the number of passwords you need to recall, you’re less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed Password Managers of 2025 here.

5. Use two-factor authentication (2FA): Enable 2FA for your important accounts, including your Apple ID, Google account, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

The days when Mac users could assume they were safe are long gone. Cybercriminals are evolving their tactics, with Mac malware shifting from simple adware to advanced information stealers. Android phishing apps are also becoming harder to detect and more widespread than ever. From stealing passwords and authentication cookies to intercepting OTPs and draining cryptocurrency wallets, these threats are growing in both sophistication and scale. No platform is immune, and as cybercriminals continue refining their techniques, users and organizations must stay ahead with strong security measures.

Do you trust official app stores like the App Store and Google Play, or do you think they need to do more to prevent malware? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Mac users beware: AI-powered malware threats are on the rise

16 February 2025 at 09:00

Apple devices are believed to be pretty secure, and that's what the company will tell you. You might have seen the tagline "Privacy. That’s Apple." in their promotions. 

However, the tech landscape is changing, and even Apple products aren’t beyond cybercriminals’ reach. 

A new report suggests Mac users will need to be more vigilant this year because AI advancements are helping hackers breach even the most secure systems. I have consistently reported on how Mac malware is targeting users, and experts now believe this will only get worse.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

Mac malware is not what it used to be. For years, the biggest threats were annoying adware and browser hijackers, more of a nuisance than a real danger. But that is changing fast. As highlighted by Malwarebytes, a new wave of information stealers is taking over, and they are far more dangerous, going after passwords, authentication cookies, credit card details and even cryptocurrency.

This shift started in mid-2023 with the arrival of Atomic Stealer, also known as AMOS, a piece of malware that looked much more like something you would see on Windows than the typical Mac threats. AMOS was not just effective. It was easy to use and sold as a service  for $1,000 a month with a slick web-based control panel. That success led to the rise of even more dangerous variants.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

One of them, Poseidon, launched in mid-2024 and quickly became the dominant Mac stealer, responsible for 70% of infections. It can drain over 160 different cryptocurrency wallets, steal passwords from browsers and password managers and even grab VPN credentials.

At the same time, cybercriminals have doubled down on malvertising, using fake ads on Google and Bing to trick users into downloading malware instead of real software. These campaigns are highly targeted, allowing attackers to pinpoint Mac users and serve fake downloads based on their searches. With AI now being used to create and execute many of these attacks, they are likely to increase in scale.

4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

While Mac malware is evolving, the situation on Android is even more alarming. Phishing attacks on the platform have reached staggering levels, with thousands of malicious apps designed to steal credentials and bypass security measures.

So far in 2024, researchers have detected 22,800 phishing-capable apps, alongside 3,900 apps designed to read OTPs from notification bars and 5,200 apps capable of extracting OTPs from SMS messages. These numbers highlight how widespread and effective Android phishing malware has become.

Just like phishing emails, phishing apps trick users into handing over their usernames, passwords and two-factor authentication codes. Once stolen, these credentials can be sold or used for fraud, identity theft or further cyberattacks. Because phishing apps require minimal code and fewer permissions than traditional malware, they are much easier to sneak onto app stores, including Google Play.

Many phishing apps look like regular, fully functional software. Some impersonate games or utilities, while others appear as cracked versions of popular apps like TikTok, WhatsApp or Spotify. Some stay dormant for days to avoid detection before launching their attacks. Others rely on ad functionality to redirect users to phishing sites, making the malicious code harder to trace.

Google Play Protect, which is built-in malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Follow these essential tips to safeguard your devices from the latest malware threats, including the notorious info stealer malware.

1. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Be cautious with downloads and links: Only download software from reputable sources such as the Mac App Store, Google Play Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages.

3. Keep your software updated: Ensure that both macOS, Android and all installed applications are up to date. Apple and Android frequently release security patches and updates that address vulnerabilities. Enable automatic updates for macOS, Android and your apps to stay protected without having to manually check for updates. If you need more help, see my guide on keeping all your devices updated.

4. Use strong and unique passwords: To protect your Mac from malware, it’s also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. A password manager can be incredibly helpful here. It generates and stores complex passwords for you, making them difficult for hackers to crack. 

It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don’t have to remember them yourself. By reducing the number of passwords you need to recall, you’re less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed Password Managers of 2025 here.

5. Use two-factor authentication (2FA): Enable 2FA for your important accounts, including your Apple ID, Google account, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

The days when Mac users could assume they were safe are long gone. Cybercriminals are evolving their tactics, with Mac malware shifting from simple adware to advanced information stealers. Android phishing apps are also becoming harder to detect and more widespread than ever. From stealing passwords and authentication cookies to intercepting OTPs and draining cryptocurrency wallets, these threats are growing in both sophistication and scale. No platform is immune, and as cybercriminals continue refining their techniques, users and organizations must stay ahead with strong security measures.

Do you trust official app stores like the App Store and Google Play, or do you think they need to do more to prevent malware? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Inflatable tiny house with space for six is blowing up

16 February 2025 at 05:00

We've reported on many tiny houses, but none quite like this before. This housing concept is called the Esch 22 Space Station, also nicknamed E22SS PIU! 

This mobile living space resembles a space station with its inflatable dome, which can inflate to triple its size. The brains behind this futuristic pad is an architectural firm called 2001, and it was developed for Esch-Alzette in Luxembourg, which is the country's second-largest city. 

Now, I'm not talking about just another cramped mobile tiny home here. This thing can not only grow in size but is transportable, and it's even eco-friendly. Let's dive in and see how this space-age dwelling actually works.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

At its core, E22SS PIU! is a 6-person mobile tiny house that can be easily transported to various locations. In its compact form, it resembles a stainless steel trailer, containing essential amenities such as a bathroom, kitchen and dining space. However, the real magic happens when it reaches its destination.

BEST PRESIDENT’S DAY DEALS

Once parked, the E22SS PIU! undergoes a remarkable transformation. Two wings unfold from the trailer, creating a circular platform with a 29.53-foot diameter. This platform is then covered with cork, providing a stable and eco-friendly base. The final step in this metamorphosis is the inflation of a double-shell pneumatic dome on top of the platform.

This inflation process, which can be completed in as little as 15 minutes, turns the compact trailer into generous sleeping quarters capable of accommodating up to six people comfortably.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

UNSTOPPABLE OFF-ROAD TINY HOUSE CONQUERS ANY TERRAIN, ANYWHERE

The E22SS PIU! incorporates several innovative features. A water recycling system ensures that wastewater from sinks and showers is repurposed for toilet flushing, promoting efficient water use. Accessibility has been carefully considered, with an elevator system ensuring the upper level is accessible to people with reduced mobility. 

The use of cork for flooring adds an eco-friendly touch to the design, further emphasizing the project's commitment to sustainability.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

BUILDING-IN-A-BOX TRANSFORMS INTO A PORTABLE TINY HOME IN MINUTES

While the E22SS PIU! may not be a practical solution for everyday tiny living, it serves a greater purpose. Created as part of Esch's Capital of Culture program, this project is designed to explore various contexts and environments within the city of Esch. It challenges our perceptions of resource usage in architecture and society, stimulating discussions about innovative housing solutions. 

Phillippe Nathan, Founder of 2001, an architecture firm developing territories, buildings, spaces and ideas, tells CyberGuy, "E22SSPIU is not a solution, nor does it seek resolution. It is a provocation — an experimental construct that redefines collective living by destabilizing conventional relationships to resources: soil, water and energy. It resists fixity, embedding itself within shifting landscapes, absorbing and reflecting their logic. Less an answer, more a system in flux."

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

What's cool is that you can now stay in this unique inflatable house situated at the Ellergronn Nature Reserve. The spacious, inflatable structure is now available to rent. So, it's your chance to explore the surrounding trails and immerse yourself in a blend of innovative design and natural beauty.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The Esch 22 Space Station is a bold experiment in mobile architecture. By combining portability with expandability and sustainable features, it pushes the boundaries of what we consider possible in temporary living spaces. While it may not be a practical solution for everyday use, the E22SS PIU! serves as an important conversation starter about the future of housing, resource management and urban development.

Would you feel comfortable staying in an inflatable tiny home like the E22SS PIU!? Why or why not? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

How cyberscams are draining Americans wallets by the billions

15 February 2025 at 09:00

Cyberscams have reached alarming levels in the U.S., with nearly 30% of Americans falling victim to fraudulent schemes in the past year alone. 

The financial toll is staggering — scams cost Americans over $159 billion annually, with average individual losses now exceeding $3,500 per victim. This epidemic is not just a financial crisis but also a human rights issue, as many scams originate from forced labor operations in Southeast Asia. 

With nearly 90% of Americans targeted by scam attempts and 40% receiving suspicious messages daily, the question remains: how can we protect ourselves and hold perpetrators accountable in an increasingly digital world?

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

One of the most pervasive scams today is the so-called "pig butchering" scheme. Originating in China and spreading across Southeast Asia, this scam involves criminals building trust with victims through social media or messaging apps. Once trust is established, victims are lured into fraudulent cryptocurrency investment schemes. These scams are meticulously crafted to appear legitimate, often involving fake trading platforms and simulated profits. Victims are encouraged to invest more until they are "slaughtered," losing their entire savings when the scammers vanish with their funds.

9 WAYS SCAMMERS CAN USE YOUR PHONE NUMBER TO TRY TO TRICK YOU

What makes these scams even more horrifying is their reliance on human trafficking. Criminal syndicates in countries like Myanmar, Cambodia and Laos force trafficked individuals to run these operations under threat of violence. These "scam centers" operate in lawless regions controlled by rebel groups or corrupt officials, making international intervention challenging. Survivors describe conditions akin to modern slavery, with physical abuse and even torture being common.

BEST PRESIDENT’S DAY DEALS

Cyberscams have taken hold in the U.S. for several reasons that make it particularly vulnerable. As an American, you’re likely connected to the digital world through social media platforms, messaging apps and other online tools. This high level of connectivity makes it easier for scammers to reach you directly, whether through a text message, email or social media chat. The sheer number of people online in the U.S. creates a vast pool of potential targets for cybercriminals.

Additionally, the growing popularity of cryptocurrency in the U.S. has made it a prime medium for fraud. Cryptocurrency transactions are fast, anonymous and difficult to trace, which makes them ideal for scammers looking to steal funds without leaving a trail. Many scams are designed to exploit this lack of transparency, leaving victims with little chance of recovering their money once it’s gone.

Another major issue is the lack of a centralized reporting system for cyberscams in the U.S. If you’ve ever been scammed or know someone who has, you might have noticed how confusing it can be to figure out where to report the crime — whether to the FBI, the Federal Trade Commission (FTC) or another agency. This fragmented system not only makes it harder for victims to seek help but also prevents authorities from gathering comprehensive data to tackle the problem effectively. These factors combined have made Americans some of the most targeted individuals in the world when it comes to cyberscams.

FBI'S NEW WARNING ABOUT AI-DRIVEN SCAMS THAT ARE AFTER YOUR CASH

Several countries have implemented innovative measures to combat cyberscams, offering valuable lessons for the U.S. Singapore, for instance, has introduced a mandatory SMS Sender ID Registry (SSIR) that requires organizations to register their alphanumeric Sender IDs. This system effectively blocks unregistered SMS senders, significantly reducing impersonation scams. In fact, cases involving scam SMSes in Singapore fell by 70% over three months after mandating the SSIR.

Britain has taken a different approach by establishing a dedicated "159" hotline, allowing residents to instantly verify suspicious calls. This simple yet effective system provides a quick way for individuals to check the legitimacy of unexpected communications, potentially preventing many scams before they occur.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Many nations have also implemented stricter authentication measures, such as biometric checks and in-app verifications, which have proven highly effective in reducing fraud. For example, Singapore has required facial verification for higher-risk transactions through Singpass since 2022, resulting in no further reports of malware-enabled scams involving unauthorized CPF withdrawals since its implementation in June 2023.

Some countries are exploring ways to slow down cryptocurrency transactions or cap transfer amounts, which could significantly hinder scammers who rely on quick, anonymous transfers. These measures, combined with a coordinated global response involving major victim nations like the U.S. and China, could prove instrumental in dismantling criminal networks more effectively. By learning from these international examples and adapting them to the American context, the U.S. could significantly strengthen its defenses against the rising tide of cyberscams.

Recognizing red flags is essential to avoid falling victim to scams. Here are some important red flags to be aware of:

Protecting yourself and your loved ones from scams requires vigilance and awareness. Here are eight effective ways to safeguard against scammers:

1. Verify before you act: Always verify the identity of the person or organization contacting you. Use official contact information to reach out directly and confirm the legitimacy of the request.

2. Limit personal information sharing: Avoid sharing personal or financial information over the phone, email or online unless you are certain of the recipient's identity and legitimacy.

3. Use strong, unique passwords for all your accounts: A robust password should include a mix of uppercase and lowercase letters, numbers and symbols. Avoid reusing passwords across multiple platforms, and consider using a reputable password manager to store and generate complex passwords securely.

4. Enable two-factor authentication (2FA) wherever possible: 2FA adds an extra layer of security by requiring a secondary verification method, such as a code sent to your phone or biometric authentication. This ensures that even if your password is compromised, unauthorized access remains highly unlikely.

5. Keep your devices and software up to date: By regularly installing the latest updates and security patches, you can ensure your devices are equipped with the latest security features and bug fixes, reducing the risk of becoming a target for cyberattacks. Many cyberattacks exploit unpatched vulnerabilities, so enabling automatic updates for your operating system, apps and antivirus software can significantly reduce your risk. 

GET FOX BUSINESS ON THE GO BY CLICKING HERE

6. Invest in personal data removal services: Consider using a service that specializes in removing your personal information from the internet to reduce your exposure to potential scammers. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

7. Monitor financial accounts: Regularly check your bank and credit card statements for any unusual or unauthorized transactions. Promptly report any suspicious activity.

8. Be skeptical of unsolicited requests: Treat unexpected requests for money or personal information with caution. Scammers often create a sense of urgency to pressure you into acting quickly.

9. Be vigilant against phishing attempts and use strong antivirus software: Avoid clicking on links or downloading attachments from unsolicited emails or messages. Ensure your devices are protected with strong antivirus software that can detect and block malicious activities. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

10. Report Suspected Scams: If you suspect you've encountered a scam, report it to your local authorities, the Federal Trade Commission (FTC), and any relevant financial institutions.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The rise of cyberscams is not just an economic issue but a moral one that demands immediate action. With billions lost annually and countless lives disrupted, we cannot afford complacency in addressing this crisis. By learning from global best practices and fostering international collaboration, we can begin to dismantle these criminal networks. Be sure to follow the steps I outlined to keep yourself safe.

What do you think should be done to tackle cyberscams more effectively? Should governments focus on stricter regulations or public education campaigns? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: Trump's Stargate ambitions

15 February 2025 at 07:30

IN TODAY’S NEWSLETTER:

BREAKING GROUND: Stargate, the massive artificial intelligence (AI) infrastructure project recently unveiled by President Donald Trump, has begun production in Texas — with data center construction in other states expected to be announced in the coming months.

ON ONE CONDITION: Elon Musk will withdraw his unsolicited bid of $97.4 billion to take over OpenAI if its board of directors stops the company’s conversion into a for-profit entity. 

EXISTENTIAL THREAT: OPINION: Our socioeconomic system is facing an existential threat from AI. In our capitalist society, most people depend on jobs to sustain themselves. The U.S. government, in turn, relies heavily on taxing the income of individual workers for revenue.

UNCHARTED TERRITORY: OpenAI CEO Sam Altman commended Vice President JD Vance's artificial intelligence (AI) speech in Paris on Tuesday while laying out his vision for how people can take advantage of the rapidly evolving technology at the same conference.

INHUMAN CARTOON: "The Simpsons" star Hank Azaria has voiced his fears over artificial intelligence in a new opinion piece.

AI ROMANCE SCAMS: "Love is blind" takes on a more sinister meaning when so-called artificial intelligence (AI) becomes a tool for exploiting our deepest human emotions.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Hop in, no driver needed for this future ride-hailing robotaxi

15 February 2025 at 05:00

Autonomous driving technology company Waymo has partnered with automaker Zeekr to develop the next generation of vehicles for ride-hailing services.

Zeekr provides the base electric vehicle platform, called the Zeekr RT, which is purpose-built for autonomous applications. Waymo then integrates its proprietary sixth-generation Waymo Driver technology, including hardware and software, to create the final autonomous vehicle.

This collaboration follows Waymo's established process, which is similar to their work with Jaguar I-PACE vehicles.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

The Waymo Driver, integrated into the Zeekr RT, is equipped with an impressive array of 13 cameras, four lidar units, six radar sensors, and external audio receivers, ensuring a 360-degree view of its surroundings.

To maintain optimal performance in various weather conditions, the Zeekr RT features a specially designed system to keep its sensors clean. This custom-designed sensor-cleaning system includes tiny wipers and spray nozzles for windshield wiper fluid, specifically created by Waymo, to ensure clear visibility for the cameras and lidar sensors. The robotaxi's advanced sensor suite provides overlapping fields of view all around the vehicle, functioning effectively both day and night.

The Zeekr RT serves as the base vehicle for Waymo's autonomous driving technology. The Waymo Driver, which provides the autonomous capabilities, is integrated into the Zeekr RT. This integration includes Waymo's own suite of sensors and a powerful onboard computer. This powerful AI platform is capable of up to 2,500 teraflops of performance, unifying various intelligent functions such as automated driving, parking, occupant monitoring and infotainment into a single architecture.

BEST PRESIDENT’S DAY DEALS

Inside, passengers will find a spacious cabin with a fully configurable interior, which can be tailored to meet the specific requirements of Waymo's ride-hailing service. The Zeekr RT is built on Zeekr's Sustainable Experience Architecture (SEA) platform and features an 800V ultra-fast charging e-powertrain, showcasing the latest advancements in electric vehicle technology.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

ROBOTS TAKE THE WHEEL AS SAN FRANCISCO OPENS STREETS TO DRIVERLESS TAXIS

The journey from concept to production has been swift and impressive. The Zeekr RT was designed and developed at Zeekr's R&D facility, CEVT (China Europe Vehicle Technology Centre) in Gothenburg, Sweden. Waymo has been testing prototype versions of the Zeekr RT on public roads in San Francisco and Phoenix, with human safety drivers at the helm. Mass production of the Zeekr RT is set to begin later this year, with initial deliveries to Waymo for further testing and validation.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

ELECTRIC AIR TAXI AS QUIET AS A DISHWASHER POISED TO CHANGE AIR TRAVEL

As Waymo prepares to integrate the Zeekr RT into its commercial fleet, the future of autonomous ride-hailing services looks promising. Waymo plans to deploy these vehicles in its Waymo One service, which currently operates in select cities like Phoenix and San Francisco. After thorough testing, Waymo aims to operate these vehicles in fully driverless mode, marking a significant milestone in autonomous transportation. The introduction of a cost-effective and passenger-friendly vehicle could give Waymo a competitive edge in the growing robotaxi market.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The Zeekr RT is a pretty big deal in the world of self-driving cars. It's cool to see car companies and tech firms teaming up like this. As these robotaxis hit the streets for testing, we're getting a sneak peek at what city travel might look like in the near future. Sure, there are still some bumps in the road ahead, but the Zeekr RT is definitely pushing us closer to a world where calling a self-driving cab is as normal as ordering a pizza.

Would you feel comfortable taking a ride in a driverless robotaxi? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

China launches center to train 100-plus humanoid robots simultaneously

14 February 2025 at 05:00

Shanghai has officially unveiled its first heterogeneous humanoid robot training center, marking a significant accomplishment in China's robotics development. 

The Humanoid Robot Kylin Training Ground represents an important step in the country's technological advancement, showcasing China's commitment to becoming a global leader in robotics and artificial intelligence.

The National and Local Co-Built Humanoid Robotics Innovation Center has launched a groundbreaking training facility that is revolutionizing the field of robotics. This cutting-edge complex, spanning over 53,800 square feet, is currently capable of training more than 100 humanoid robots at once. The facility features an impressive array of over a dozen specialized training scenarios, including welding, manufacturing and automotive testing.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

These advanced robots have showcased exceptional proficiency, with an average success rate exceeding 90% in various tasks. Their capabilities range from organizing desks and sorting items to operating complex equipment, demonstrating the potential for widespread application across multiple industries. This remarkable achievement underscores the rapid progress being made in the field of humanoid robotics and highlights China's growing prominence in artificial intelligence and automation technologies.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

WAREHOUSE ROBOT USES AI TO PLAY REAL-LIFE TETRIS TO HANDLE MORE THAN EVER BEFORE 

The training facility aligns with China's broader strategy to address multiple challenges, including global tech competition and the complexities of an aging society. By 2027, the center aims to train 1,000 general-purpose robots simultaneously, with plans to collect 10 million high-quality physical data entries through collaborations with local robot manufacturers.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

WILLING TO PAY $175,000 FOR A LIFE-SIZE ROBOT FRIEND THAT REMEMBERS EVERYTHING ABOUT YOU?

The center is preparing to introduce the 2.0 version of its humanoid robot, "Deep Snake," which will showcase advanced technologies like linear joint actuators. This means the robot will have smoother, more precise movements. Linear joint actuators are like advanced motors that allow the robot's joints to move in a straight line, giving it more fluid and controlled motions. It's a big step forward in making robots that can perform a wider range of tasks with greater accuracy and efficiency. These innovations are expected to enhance the versatility and performance of humanoid robots, further solidifying China's leadership in the robotics industry.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

ROBOTIC DOG HELPS THOSE FACING MENTAL HEALTH AND COGNITIVE CHALLENGES

The Chinese humanoid robot market is experiencing explosive growth, showcasing the country's rapid advancement in this cutting-edge technology sector. In 2024, the market was valued at $379 million, demonstrating significant initial traction. Looking ahead, projections indicate a remarkable expansion to approximately $2.3 billion by 2025, based on current exchange rates. Even more impressive is the anticipated growth to about $11.8 billion by 2030, highlighting the immense potential of this industry. The development extends beyond industrial applications, with plans for the first World Humanoid Robot Sports Games and even a marathon-running robot named "Tiangong" set to compete in April.

BEST PRESIDENT’S DAY DEALS

China's investment in the Humanoid Robot Kylin Training Ground is a strategic move to reshape industrial capabilities, address societal challenges and position the country at the forefront of global innovation. As the technology continues to evolve, the world will be watching closely to see how these advanced robots will transform various sectors and potentially redefine human-machine interaction.

Do you think humanoid robots are the solution to tomorrow's workforce challenges or the beginning of a technological transformation where humans are replaced? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: VP calls for ideology-free AI

12 February 2025 at 10:47

IN TODAY’S NEWSLETTER:

- Vance tells world leaders AI must be 'free from ideological bias,' American tech won't be censorship tool

- Altman says Musk 'trying to slow us down,' OpenAI not for sale

- Top translation apps for travelers

FREE FROM BIAS: Vice President JD Vance told world leaders in Paris on Tuesday that the United States intends to remain the dominant force in artificial intelligence and warned that the European Union's far tougher regulatory approach to the technology could cripple it.

'TRYING TO SLOW US DOWN': OpenAI CEO Sam Altman said Elon Musk is "probably just trying to slow us down" with his bid to purchase the company, insisting on Tuesday that it is not for sale. 

'MASS SURVEILLANCE': OpenAI CEO Sam Altman predicts that artificial general intelligence will lead to lower costs for many goods, but has also warned that AI could be leveraged by authoritarian governments aiming to control people.

TRANSLATED TRUTH: Whether you have an iPhone or an Android, these apps have got you covered with features like live speech translation, text input and even AI-powered sign and menu translation.

CONDOLEEZZA RICE, AMY ZEGART: DeepSeek’s new AI model is causing deep consternation from Silicon Valley to Washington. Few would have predicted that a little-known Chinese startup with a couple of hundred homegrown engineers would be able to release a frontier AI model rivaling the capabilities of America’s best and biggest tech companies – reportedly at a fraction of the cost and computational power.

SPEEDY ROBOT DOG: A Chinese team has unveiled a groundbreaking quadruped robot that is pushing the boundaries of robotics and speed.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Reset what you see on social media

11 February 2025 at 13:55

You went down a rabbit hole and now gardening (or hot rod or political) posts are all you see online. Algorithms are smart, but they don’t know when you’re ready to get back to your regularly scheduled programming. 

It’s time to reset your feed and take control of what you see.

Win an iPhone 16 Pro with Apple Intelligence ($999 value). 

No purchase necessary. Enter to win now!

5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER

Start with Facebook

Goodbye, annoying ads. It only takes a minute to kick out the things you no longer want to see.

The fix: Filter your advertising topics by going to Settings & Privacy > Settings > Account Center > Ad Preferences > Customize ads.

Random Facebook requests can end badly. This one lost a widow $40K.

Now, on to YouTube

Say your family is staying with you for the holidays and your niece is watching cartoons on your YouTube account all day long. Now that’s all YouTube recommends. Delete your search history to get things back to normal. 

The fix: On the YouTube app, tap You to bring up your History. Tap the cog icon > Settings > Manage All History. At the bottom, you’ll see DELETE with a blue down arrow. Tap from the dropdown menu to delete videos from today, a custom range or all time. Click X to remove items individually, if you prefer.

10 TECH UPGRADES TO SAVE YOUR TIME, PRIVACY AND MONEY THIS YEAR

Going forward, turn off your viewing history any time you don’t want those vids in your algorithm. You can set your video and search histories to autodelete, too. Now your YouTube is back to how you like it, with my video podcast at the very top. You’ll love it!

TikTok tracks your habits 

TikTok’s algorithm is built to keep you on the app. Every time you like, follow or comment on something, it tells the algorithm you’re interested in a video, and more videos like it will pop up on your For You page. Disliking a video or writing a nasty comment doesn’t matter, by the way; you still kept watching.

The fix: Reset your feed. Open your Profile in the bottom right corner then press the three lines at the top right > Settings and Privacy > Content Preferences > Refresh Your For You Feed > Continue. 

Fine-tune Instagram 

Watch Instagram Reels instead? There’s no way to reset them, but you can nudge the algorithm in the right direction.

The fix: Tap the three dots in the upper right corner. From here, you can adjust:

I’M A TECH EXPERT: 10 AI PROMPTS YOU’LL USE ALL THE TIME

Here’s the giveaway that an email from Instagram about your security is fake.

Most apps have this option

On just about every social platform, you can hide or see less of certain things. The more you take this action, the more you steer the algorithm.

The fix: Next to a post, video or anything else, look for the three-dot or three-line menu that opens more options. On YouTube, for example, tap the three dots next to a video and choose Don’t recommend channel or Not interested.

Feeling inspired to clean more of your digital traces? Wipe your browser history while you’re at it. Here’s how.

Final piece of advice

Your social media feed is carefully curated based on who you follow, who follows you and, most importantly, what you do online. Sure, you can reset your algorithm, but don’t be fooled. Every post you linger on, like, comment on or share gets tracked and used to shape what you see next. Even just scrolling tells the platform what grabs your attention. 

Before your next deep dive, remember: Big Tech is always watching, and your every move fine-tunes what pops up next.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

Elon Musk's X Attracts Fresh Advertisers but Revenue Recovery Remains Uncertain

14 February 2025 at 12:14

Elon Musk's X has successfully drawn in new advertisers in recent months, with some big-name brands like Apple making a comeback, but the platform's overall advertising revenue recovery remains uncertain, according to third-party data.

The post Elon Musk’s X Attracts Fresh Advertisers but Revenue Recovery Remains Uncertain appeared first on Breitbart.

Interstellar Voyager 1 resumes operations after pause in communications with NASA

1 December 2024 at 15:53

NASA has confirmed that after a pause in communications with Voyager 1 in late October, the spacecraft has regained its voice and resumed regular operations.

Voyager unexpectedly turned off its primary radio transmitter, known as its X-band, before turning on its much weaker S-band transmitter in October.

The interstellar spacecraft is currently located about 15.4 billion miles away from Earth and the S-band had not been used in over 40 years.

Communication between NASA and Voyager 1 has been spotty at times and the switch to the lower band prevented the Voyager mission team from downloading science data and information about the spacecraft’s status.

NASA RECONNECTS WITH INTERSTELLAR VOYAGER 1 SPACECRAFT USING TECHNOLOGY NOT USED IN DECADES

Earlier this month, the team was able to reactivate the X-band transmitter and resume collection of data from the four operating science instruments onboard Voyager 1.

Now that the data can be collected and communications have resumed, engineers are finishing a few remaining tasks to return Voyager 1 back to the state it was in before the issue came up. One task is to reset the system that synchronizes Voyager 1’s three onboard computers.

The S-band was activated by the spacecraft’s fault protection system when engineers activated a heater on Voyager 1. The fault protection system determined the probe did not have enough power and automatically turned off systems that were not necessary to keep the spacecraft flying in order to keep providing power to critical systems.

VOYAGER 1 DETECTS ‘HUM’ WHILE IN INTERSTELLAR SPACE: REPORT

But in the process, the probes turned off all nonessential systems except for science instruments, NASA said, turning off the X-band and activating the S-band, which uses less power.

Voyager 1 had not used the S-band to communicate with Earth since 1981.

NASA PUBLISHES NEVER-BEFORE-SEEN PHOTOS OF ‘RAVIOLI’ MOON ORBITING SATURN

Voyager 1′s odyssey began in 1977, when the spacecraft and its twin, Voyager 2, were launched on a tour of the gas giant planets of the solar system.

After beaming back dazzling postcard views of Jupiter’s giant red spot and Saturn’s shimmering rings, Voyager 2 hopscotched to Uranus and Neptune. Meanwhile, Voyager 1 used Saturn as a gravitational slingshot to power itself past Pluto.

There are 10 science instruments on each spacecraft, and according to NASA, four are currently being used to study the particles, plasma and magnetic fields in interstellar space.

Pioneers of AI win Nobel Prize in physics for laying the groundwork of machine learning

8 October 2024 at 11:23

Two pioneers of artificial intelligence — John Hopfield and Geoffrey Hinton — won the Nobel Prize in physics Tuesday for helping create the building blocks of machine learning that is revolutionizing the way we work and live but also creates new threats for humanity.

Hinton, who is known as the godfather of artificial intelligence, is a citizen of Canada and Britain who works at the University of Toronto, and Hopfield is an American working at Princeton.

"These two gentlemen were really the pioneers," said Nobel physics committee member Mark Pearce. "They ... did the fundamental work, based on physical understanding which has led to the revolution we see today in machine learning and artificial intelligence."

NOBEL PRIZE GOES TO 3 PHYSICISTS FOR WORK ON QUANTUM SCIENCE

The artificial neural networks — interconnected computer nodes inspired by neurons in the human brain — the researchers pioneered are used throughout science and medicine and "have also become part of our daily lives, for instance in facial recognition and language translation," said Ellen Moons, a member of the Nobel committee at the Royal Swedish Academy of Sciences.

Hopfield, whose 1982 work laid the groundwork for Hinton's, told The Associated Press Tuesday, "I continue to be amazed by the impact it has had."

Hinton predicted that AI will end up having a "huge influence" on civilization, bringing improvements in productivity and health care.

"It would be comparable with the Industrial Revolution," he said in an open call with reporters and officials of the Royal Swedish Academy of Sciences.

"Instead of exceeding people in physical strength, it’s going to exceed people in intellectual ability. We have no experience of what it’s like to have things smarter than us. And it’s going to be wonderful in many respects," Hinton said.

"But we also have to worry about a number of possible bad consequences, particularly the threat of these things getting out of control."

The Nobel committee also mentioned fears about the possible flipside.

Moons said that while it has "enormous benefits, its rapid development has also raised concerns about our future. Collectively, humans carry the responsibility for using this new technology in a safe and ethical way for the greatest benefit of humankind."

Hinton shares those concerns. He quit a role at Google so he could speak more freely about the dangers of the technology he helped create.

"I am worried that the overall consequence of this might be systems more intelligent than us that eventually take control," Hinton said.

For his part, Hopfield, who signed early petitions by researchers calling for strong control of the technology, compared the risks and benefits of machine learning to work on viruses and nuclear energy, capable of helping and harming society.

Neither winner was home when they received the news. Hopfield, who was staying with his wife at a cottage in Hampshire, England, said that after grabbing coffee and getting his flu shot, he opened his computer to a flurry of activity.

"I’ve never seen that many emails in my life," he said. A bottle of champagne and bowl of soup were waiting on his desk for him, he added, but he doubted there were any fellow physicists in town to join the celebration.

Hinton said he was shocked at the honor.

"I’m flabbergasted. I had no idea this would happen," he said when reached by the Nobel committee on the phone. He said he was at a cheap hotel with no internet.

3 WIN NOBEL PRIZE IN PHYSICS FOR WORK TO UNDERSTAND COSMOS

Hinton, 76, helped develop a technique in the 1980s known as backpropagation that has been instrumental in training machines how to "learn" by fine-tuning errors until they disappear. It’s similar to the way a student learns from a teacher, with an initial solution graded and flaws identified and returned to be fixed and repaired. This process continues until the answer matches the network’s version of reality.

His team at the University of Toronto later wowed peers by using a neural network to win the prestigious ImageNet computer vision competition in 2012. That win spawned a flurry of copycats and was "a very, very significant moment in hindsight and in the course of AI history," said Stanford University computer scientist and ImageNet creator Fei-Fei Li.

"Many people consider that the birth of modern AI," she said.

Hinton and fellow AI scientists Yoshua Bengio and Yann LeCun won computer science’s top prize, the Turing Award, in 2019.

"For a long time, people thought what the three of us were doing was nonsense," Hinton told told the AP in 2019. "They thought we were very misguided and what we were doing was a very surprising thing for apparently intelligent people to waste their time on."

"My message to young researchers is, don’t be put off if everyone tells you what are doing is silly."

And Hinton himself uses machine learning in his daily life, he said.

"Whenever I want to know the answer to anything, I just go and ask GPT-4," Hinton said at the Nobel announcement. "I don’t totally trust it because it can hallucinate, but on almost everything it's a not-very-good expert. And that’s very useful."

Hopfield, 91, created an associative memory that can store and reconstruct images and other types of patterns in data, the Nobel committee said.

"What fascinates me most is still this question of how mind comes from machine," Hopfield said in a video posted online by The Franklin Institute after it awarded him a physics prize in 2019.

Hinton used Hopfield's network as the foundation for a new network that uses a different method, known as the Boltzmann machine, that the committee said can learn to recognize characteristic elements in a given type of data.

Bengio, who was mentored by Hinton and "profoundly shaped" by Hopfield’s thinking, told the AP that the winners both "saw something that was not obvious: Connections between physics and learning in neural networks, which has been the basis of modern AI."

He said he was "really delighted" that they won the prize. "It’s great for the field. It’s great for recognizing that history."

Six days of Nobel announcements opened Monday with Americans Victor Ambros and Gary Ruvkun winning the medicine prize for their discovery of tiny bits of genetic material that serve as on and off switches inside cells that could one day lead to powerful treatments for diseases like cancer.

The prize carries a cash award of $1 million from a bequest left by the award's creator, Swedish inventor Alfred Nobel. The laureates are invited to receive their awards at ceremonies on Dec. 10, the anniversary of Nobel’s death.

Nobel announcements continue with the chemistry prize on Wednesday and literature on Thursday. The Nobel Peace Prize will be announced Friday and the economics award on Oct. 14.

Border Patrol agents to stop wearing body cameras after social media post reveals ‘security risk’

16 February 2025 at 11:41

Agents with the U.S. Customs and Border Protection (CBP) will no longer wear body cameras during field operations after a social media post publicized how to identify individual agents.

"All U.S. Border Patrol Agents will cease the use of body-worn cameras (BWC) in all operational environments," CBP said in a statement to NewsNation, which originally reported the news.

The directive comes after a post on Reddit claimed that the mobile application BLE Radar, which uses Bluetooth to scan for low-energy devices such as phones, smartwatches and speakers, can also track CBP body cameras from a distance of 100 yards and can also trigger improvised explosive devices.

FRUSTRATED CHICAGOANS BACK ICE DEPORTATIONS, APPLAUD DOJ LAWSUIT TARGETING SANCTUARY POLICIES

CBP officials sent out a directive following the post informing agents of a "potential security risk" while immediately pulling body cameras from use in the field.

"Pending completion of investigation and risk mitigation, all Agents will stand down the use of their BWCs [body worn cameras] until further notice. Additional guidance and information will be disseminated as it is received," the directive said.

Sources told NewsNation that the cameras used by CBP agents are Avon body cams, which the social media post claims are devices BLE Radar, which was developed by F-Droid, can detect.

DAILY AVERAGE OF KNOWN GOTAWAYS AT SOUTHERN BORDER PLUMMETS, DOWN 93% FROM BIDEN ADMINISTRATION HIGHS

The directive comes as both CBP and U.S. Immigration and Customs Enforcement (ICE) agents have ramped up enforcement efforts in the weeks since President Donald Trump took office, an effort that was a cornerstone of the president's campaign to return to the White House.

Since the beginning of February, the daily average of gotaways, or illegal immigrants who successfully enter the U.S. without being apprehended, at the southern border has fallen to just 132 per day, a 93% drop from highs seen under former President Joe Biden, a senior Department of Homeland Security source told Fox News.

Data obtained by Fox News showed that during FY 2023, 670,674 known gotaways were recorded by the agency, or more than 1,800 per day.

CLICK HERE TO GET THE FOX NEWS APP

CBP did not immediately respond to a Fox News Digital request for comment.

Fox News’ Bill Melugin and Greg Wehner contributed to this report.

❌
❌