Normal view

There are new articles available, click to refresh the page.
Yesterday — 30 January 2025Technology News Articles on Fox News

How to organize, protect and streamline your inbox with an email alias

30 January 2025 at 10:00

Almost everything you do online asks for your email. If you have been using the same one for a while, chances are hundreds or even thousands of services have it. They send promotional messages, social media alerts, newsletters and more, turning your inbox into complete chaos. You can tame this madness using an email alias.

An email alias helps declutter your inbox by organizing emails based on their purpose. For example, you can create specific aliases for shopping, newsletters or work and set up filters to sort these messages into separate folders automatically. 

Aliases also help manage spam. If an alias starts receiving too many unwanted messages, you can disable it without affecting your main email.

Let’s dive into how to create an email alias on different platforms, including Gmail, Outlook and iCloud. 

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Gmail doesn’t allow you to create a completely separate alias, but it offers workarounds using "+ addressing" or by adding dots to your existing email address. However, these methods don’t prevent an unscrupulous sender from seeing your primary address, so exercise caution when using them with untrusted correspondents. Follow the steps below to get started.

Use your existing Gmail address and add a "+" followed by any keyword before "@gmail.com."

Example: If your email is yourname@gmail.com, you can use:

No additional setup is needed, just start using this alias when signing up for services or sharing your email.

Gmail ignores dots (.) in email addresses, so you can create variations of your email:

Example: If your email is yourname@gmail.com, you can use:

All variations will deliver emails to your main inbox automatically.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Outlook.com allows you to create additional email addresses (aliases) that are linked to your primary account. Emails sent to an alias will arrive in your primary inbox, and you can send messages using the alias as well.

If your primary email is johnsmith@outlook.com, you can create an alias like john.smith123@outlook.com. Emails sent to john.smith123@outlook.com will still go to johnsmith@outlook.com, but you can choose to send emails using either address.

Steps to create an alias:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Once added, you can send emails using your alias by selecting it in the From field when composing a new message.

Important limitations to note:

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

Apple allows you to create up to three email aliases through iCloud. These aliases can be used for specific purposes, helping you manage your inbox effectively. Here’s how to create one:

It's important to note that you can still create up to three email aliases through iCloud. Remember that while these aliases provide some flexibility, they do not create separate Apple IDs or completely hide your primary iCloud email address.

BEWARE OF ENCRYPTED PDFS AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

While many email providers offer basic alias functionality, most have significant limitations. Gmail's "+" addressing and dot tricks, Outlook's linked aliases and Apple's iCloud aliases all provide some flexibility, but they often fall short of true privacy protection.

For those of you seeking comprehensive email privacy and robust alias management, my No. 1 pick for private and secure email platforms contains no ads, no tracking and powerful privacy features like password-protected email and unlimited disposable email addresses. See my review of the best secure and private email services here.

Protecting your inbox from scammers requires a combination of smart practices and proactive tools. Using email aliases is an effective first step. By creating specific aliases for different activities, such as shopping, subscriptions or work, you can track where spam is coming from and deactivate problematic aliases as needed. Below are some other steps to take.

1. Avoid sharing your primary email address publicly on forums, social media or other platforms to minimize exposure. Most email providers offer robust spam filters, so ensure they are enabled and customize them as needed

GET FOX BUSINESS ON THE GO BY CLICKING HERE

2. Invest in personal data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

3. Enable two-factor authentication on all your email accounts to add an extra layer of security.

4. Be cautious of suspicious links and attachments. Never click on links or download attachments from unknown senders, as these could be phishing attempts.

5. Use strong antivirus software to protect against potential malware that might come through spam emails. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Regularly update your email password and make it strong and unique, avoiding common words or easily guessable combinations. Consider using a password manager to generate and store complex passwords.

These steps will provide a more comprehensive approach to protecting your inbox from scammers and reducing unwanted emails.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Taking charge of your inbox doesn’t have to be overwhelming. By implementing the tips and tools mentioned above, you’ll create a more secure, efficient and manageable email experience. Whether you’re battling spam or organizing your digital life, email aliases and secure services are great things to put into place.

Which email platform do you use most often, and how do you organize your messages there? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Warehouse robot uses AI to play real-life Tetris to handle more than ever before

30 January 2025 at 06:00

In a groundbreaking development for warehouse automation, Ambi Robotics just launched AmbiStack, a multipurpose robotic system that promises to transform the way items are stacked onto pallets and into containers. 

This innovative solution tackles a fundamental challenge in logistics: maximizing space utilization and reducing shipping costs.

AmbiStack operates like a real-world 3D Tetris game, expertly arranging items to optimize space in containers and pallets. By minimizing wasted space, warehouses can significantly reduce shipping costs and improve overall efficiency.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

"Logistics companies are under continuous pressure to deliver items faster and for lower cost, which puts a lot of strain on operations to maintain reliability while rapidly adapting for the future," Jim Liefer, CEO of Ambi Robotics, also tells CyberGuy. 

"AmbiStack can be rapidly configured to automate the repetitive motions involved in a huge variety of stacking and palletizing applications, driving greater accuracy and efficiency, while future-proofing warehouse operations."

CHINA’S NEWEST HUMANOID ROBOT IS READY TO SERVE LIKE NEVER BEFORE

The rapid development and deployment of AmbiStack was made possible by PRIME-1, Ambi Robotics' new artificial intelligence foundation model for warehouse robots. This advanced AI enables AmbiStack to begin working efficiently from day one in production environments.

Ken Goldberg, co-founder and chief scientist at Ambi Robotics, tells CyberGuy, "The engineering team at Ambi Robotics used 4 years of proprietary warehouse data to train a state-of-the-art generative model for 3D warehouse operations; their experiments with real production systems confirm that PRIME-1 significantly outperforms their previous systems."

ROBOTS PERFORM LIKE HUMAN SURGEONS BY JUST WATCHING VIDEOS

Cost reduction and efficiency: AmbiStack addresses the pressing need for automated solutions that cut labor costs, reduce manual inefficiencies and tackle accuracy challenges.

Ergonomic improvements: The system alleviates the physical strain on workers by handling heavy lifting tasks.

Adaptive intelligence: Trained using Sim2Real reinforcement learning, AmbiStack can make real-time decisions, adapting to various scenarios and delivering a faster return on investment.

Tackling complex tasks: Stacking presents more challenges than sorting, making AmbiStack a significant advancement in robotic capabilities.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

CHINESE ROBOT LIFTS 35 POUNDS PER HAND

AmbiStack utilizes advanced vision systems and AI models trained on extensive data from parcel sorting experiences. The robot learns in a virtual environment, earning higher scores for better stacking performance with random items.

Jeff Mahler, co-founder and CTO of Ambi Robotics, tells CyberGuy, "AmbiStack represents an evolution of our AI-powered robotics, building on our technology in physical AI to add stacking as a fundamental new robot skill in AmbiOS. We’ve started the AI flywheel for stacking with Sim2Real reinforcement learning and performance will only improve as robots collect data from production environments. We are committed to advancing this capability to provide reliable systems that deliver a strong ROI for our customers."

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

The potential market for AmbiStack is vast, as efficient packing and stacking are crucial in logistics. By optimizing container usage, AmbiStack ensures that companies aren't "shipping air," leading to substantial cost savings in transportation.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

AmbiStack is designed to complement human workers, not replace them. It allows employees to focus on decision-making and strategic tasks while reducing physical strain and repetitive motions.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

By combining advanced AI with practical robotics, AmbiStack is addressing a long-standing challenge in logistics. As the industry continues to evolve, solutions like AmbiStack will play a crucial role in shaping the future of warehouse operations and supply chain efficiency.

Do you believe these technologies will ultimately complement human workers or gradually replace them entirely in logistics and warehouse operations? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: DeepSeek underscores US-China race for AI dominance, OpenAI says

29 January 2025 at 12:09

IN TODAY’S NEWSLETTER:

- DeepSeek is the newest front in the AI competition between the US and China

- Trump, OpenAI CEO weigh in on DeepSeek frenzy

- Willing to pay $175,000 for a life-size robot friend that remembers everything about you?

CRITICAL FIGHT: DeepSeek’s release of a high-profile new AI model underscores a point we at OpenAI have been making for quite some time: the U.S. is in a competition with the Chinese Communist Party that will determine whether democratic AI wins over the Chinese Communist Party's authoritarian version of the technology. The U.S. must come out on top–and the stakes could not be higher.

'WAKE-UP CALL': President Donald Trump and OpenAI CEO Sam Altman both joined in on the buzz surrounding Chinese artificial intelligence startup DeepSeek, which sent the technology sector into turmoil on Monday following its emergence as a potential rival to leading U.S.-based firms.

ROBOT FRIEND MELODY: In a world where loneliness is becoming increasingly prevalent, researchers have taken a bold step forward by introducing Melody, a life-sized artificial intelligence robot designed to combat this growing epidemic. 

AI RACE: China-based artificial intelligence startup DeepSeek's release of new AI models that rival those made by leading U.S. tech firms roiled markets on Monday and prompted concerns about U.S. firms losing their edge in the AI race to Chinese rivals.

ROBOTIC DOG COMPANION: U.S. robotics company Tombot has introduced "Jennie," an innovative AI-powered robotic pet designed to provide comfort and companionship to those facing cognitive health challenges.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

UnitedHealth cyberattack exposes 190 million in largest US healthcare data breach

29 January 2025 at 10:00

UnitedHealth’s Change Healthcare unit suffered a data breach in February 2024, the news of which surfaced Feb. 21. 

Initially reported to have affected around 100 million individuals, the U.S. health insurance giant has now revealed that the actual number is significantly higher: 190 million. This makes it the largest breach of medical data in U.S. history, affecting nearly half the country’s population. 

A breach of this magnitude can have devastating consequences for the American people as malicious actors could exploit the data for a range of attacks if it finds its way to the dark web.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

UnitedHealth confirmed on Friday, Jan. 24, 2025, that the ransomware attack on its Change Healthcare unit affected approximately 190 million people in the United States. The company had previously estimated the number of affected individuals to be around 100 million in its preliminary analysis filed with the Office for Civil Rights, a division of the U.S. Department of Health and Human Services that investigates data breaches.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

UnitedHealth stated that the majority of those impacted have already been notified, either directly or through substitute notice. The final tally of affected individuals will be confirmed and submitted to the Office for Civil Rights at a later date.

The company tells CyberGuy it is "not aware of any misuse of individuals’ information as a result of this incident and has not seen electronic medical record databases appear in the data during the analysis." However, UnitedHealth did not disclose when it became aware of the additional 90 million victims, how the revised figure was determined or what changes led to the updated number.

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

The cyberattack on Change Healthcare in February caused widespread disruptions across the U.S. healthcare sector, as the company took its systems offline to contain the breach. This shutdown impacted critical services such as claims processing, payments and data sharing, which many healthcare providers rely on.

The stolen data varied by individual but included a broad range of personal and sensitive information, such as names, addresses, dates of birth, phone numbers, email addresses and government ID numbers, including Social Security, driver’s license and passport details.

Plus, hackers may have accessed health-related information, including diagnoses, medications, test results, imaging records, care and treatment plans, and health insurance details. Financial and banking information tied to claims and payment data was also reportedly compromised.

The breach was the result of a ransomware attack carried out by ALPHV/BlackCat, a Russian-speaking ransomware and extortion group. The attack, a form of malware intrusion, locks victims out of their data unless a ransom is paid. ALPHV/BlackCat later took credit for the attack.

During a House hearing in April, Change Healthcare admitted that the breach was made possible due to inadequate security measures, specifically the absence of two-factor authentication to protect its systems.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

FROM TIKTOK TO TROUBLE: HOW YOUR ONLINE DATA CAN BE WEAPONIZED AGAINST YOU

1. Remove your personal information from the internet: The breach has exposed sensitive personal data, making it essential to reduce your online footprint. While no service can guarantee complete data removal, a reputable data removal service can significantly limit your exposure. These services systematically monitor and erase your personal information from numerous websites and data brokers. Check out my top picks for data removal services here.

2. Be wary of mailbox communications: With addresses among the compromised data, scammers may exploit this breach to send fraudulent letters. Be aware of mail claiming missed deliveries, account suspensions or security alerts. Always verify the authenticity of such communications before responding or taking action.

3. Be cautious of phishing attempts and use strong antivirus software: Scammers may use your compromised email or phone number to target you with phishing attacks. Be wary of messages asking for personal information or containing suspicious links. To protect yourself, ensure strong antivirus software is installed on all your devices. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Monitor your accounts: Given the scope of this breach, regular monitoring of your bank accounts, credit card statements and other financial accounts is critical. Look for unauthorized transactions or suspicious activity and immediately report any issues to your bank or credit card provider.

5. Recognize and report a Social Security scam: If your Social Security number is exposed, you could become a target for related scams. Official communication regarding Social Security issues usually comes via mail, not phone calls or emails. Learn more about spotting and reporting scams by visiting the Social Security Administration’s scam information page.

6. Invest in identity theft protection: Data breaches happen every day, and most never make the headlines, but with an identity theft protection service, you’ll be notified if and when you are affected. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

It’s surprising that a company of UnitedHealth’s scale failed to implement even basic cybersecurity measures when handling customer data. A breach affecting 190 million people – nearly half of the U.S. population – is staggering, leaving almost anyone at risk of becoming a target for hackers. While the company is still assessing the full extent of the breach, you can take precautions now by being cautious with any unknown links or unsolicited calls. Bad actors may use a variety of tactics to cause harm.

Do you think these companies are doing enough to protect your data, and is the government doing enough to catch those behind cyberattacks? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Don’t be so quick to click that Google Calendar invite. It could be a hacker’s trap

29 January 2025 at 06:00

A sophisticated phishing campaign exploiting Google Calendar has been uncovered by Check Point Software Technologies, raising alarms among cybersecurity experts. 

Cybercriminals are sending fake meeting invitations that appear legitimate, redirecting victims to phishing sites and mimicking Google's platforms to steal sensitive information. 

This emerging threat is particularly concerning given the widespread use of Google Calendar, which serves more than 500 million users globally in 41 languages. Researchers have identified nearly 4,000 phishing attempts in a matter of weeks, impersonating more than 300 reputable brands.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Hackers leverage the trust in Google's services to carry out their attacks. Victims receive seemingly authentic meeting invites via Google Calendar. Upon clicking links within these invites, they are taken to fake web pages that prompt them to input personal data. Once compromised, this information can be used for identity theft, financial fraud and unauthorized access to other accounts. Security experts warn that attackers are now using AI to craft highly convincing fake invitations, making it even harder to spot the fraud. Reacting to the findings from Check Point, a spokesperson for Google said:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

"We recommend users enable the 'Only If The Sender Is Known' setting in Google Calendar. This setting helps defend against this type of phishing by alerting the user when they receive an invitation from someone not in their contact list and/or they have not interacted with from their email address in the past."

ASK KURT: HOW TO NAVIGATE GOOGLE’S PRIVACY SETTINGS

Google has introduced the "known senders" feature in Google Calendar to combat sophisticated phishing attempts. This setting helps you filter out potentially malicious calendar invites. Here's how to enable it:

This ensures that only events from contacts, your organization or previous interactions are automatically added to your calendar.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

HOW ONE MAN GOT SCAMMED IN SECONDS USING GOOGLE

To further protect yourself from phishing scams, follow these steps.

Scrutinize unexpected invites carefully: Examine the sender's details, including their name, domain and email address, for any inconsistencies or signs of spoofing.

Avoid clicking suspicious links or downloading attachments from unknown sources: Threat actors often embed malicious links in calendar invites that can lead to phishing websites designed to steal your personal information.

Use strong antivirus software: This provides an additional defense mechanism against malware and can help detect potential phishing attempts before they cause damage. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Enable two-factor authentication (2FA) for your Gmail account: 2FA adds an extra layer of security that can prevent unauthorized access, even if your credentials are compromised.

Keep your security settings up to date: Regularly review and adjust your calendar and email settings to protect against evolving phishing tactics.

HOW A WRONG GOOGLE SEARCH CAN COMPROMISE YOUR DATA AND BRING LAW ENFORCEMENT CALLING

As phishing tactics evolve, cybercriminals are exploiting trusted platforms like Google Calendar to bypass traditional security measures. This underscores the importance of user vigilance and proactive security practices. By enabling the "known senders" setting and implementing additional security measures, you can significantly reduce the risk of falling victim to calendar-based phishing scams.

What digital security challenges have you encountered recently? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fake toll road texts sweep America as Chinese scammers target US drivers

28 January 2025 at 10:00

A new scam has come to light targeting residents across the United States with text messages that pretend to be from toll road operators. For many who receive these messages, it’s an easy and expensive trap to fall into.

The scam begins when people receive a message claiming they have unpaid tolls and may be charged fines. Scammers then ask for card details and a one-time password sent via SMS to steal their money. Security researchers believe that Chinese smishing groups are behind this scam, selling SMS-based phishing kits to thousands of scammers.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

As reported by KrebsOnSecurity, the scam begins with a text message claiming to be from a toll road operator, such as E-ZPass or SunPass. The message warns about unpaid tolls and the possibility of fines, forcing recipients to act quickly. Victims are directed to a fake website mimicking the toll operator’s site, where they are asked to provide sensitive information, including payment card details and one-time passwords. 

Security researchers have traced the scam to Chinese smishing groups known for creating and selling sophisticated SMS phishing kits. One such kit, "Lighthouse," makes it easy for scammers to spoof toll road operators in multiple states. These kits are designed to trick users into sharing financial information, which is then used to commit fraud. 

Reports of these phishing attacks have surfaced across the U.S., targeting users of toll systems like EZDriveMA in Massachusetts, SunPass in Florida and the North Texas Toll Authority in Texas. Similar scams have been reported in states including California, Colorado, Connecticut, Minnesota and Washington. The phishing pages are mobile-optimized and won’t load on non-mobile devices, making them even more deceptive.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Recent advancements in phishing kits include better deliverability through integration with Apple iMessage and Android’s RCS technology, bypassing traditional SMS spam filters. These methods increase the likelihood of victims receiving and engaging with fraudulent messages. The phishing sites are operated dynamically in real time by criminals, making them harder to detect and shut down. Even individuals who don’t own a vehicle have reported receiving these messages, indicating random targeting.

THAT APPLE ID DISABLED MESSAGE? IT'S A DANGEROUS SCAM

By staying vigilant and following the steps below, you can protect yourself from falling victim to toll scams. 

1) Verify directly with toll operators: If you receive a message about unpaid tolls or fines, do not click on any links. Instead, visit the official website of your toll operator or contact their customer service directly to verify the claim.

2) Install strong antivirus software: The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Do not share personal information: Never provide sensitive details like payment card information, Social Security numbers or one-time passwords via text or unverified websites. Legitimate toll operators will not request such information through SMS.

4) Enable two-factor authentication (2FA): Use 2FA for your accounts whenever possible. This adds an extra layer of protection by requiring two forms of verification, reducing the risk of unauthorized access even if some details are compromised.

5) Be wary of urgency in messages: Scammers often create a sense of urgency, claiming immediate action is required to avoid penalties. Take a moment to assess the situation and verify the legitimacy of the message through official channels.

6) Report suspicious messages: If you suspect a phishing attempt, report it to the Federal Trade Commission or the FBI's Internet Crime Complaint Center. Include details like the sender’s phone number and any links in the message. Additionally, inform your mobile carrier to help block similar scams.

7) Use a personal data removal service: Employ a reputable data removal service to reduce your online footprint and minimize the risk of scammers obtaining your personal information. These services can help remove your data from various data broker sites, making it harder for scammers to target you with personalized scams. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

It’s deeply concerning how these scams are becoming increasingly sophisticated and widespread. It’s no longer just about random phishing attempts. These are carefully crafted schemes designed to exploit our trust in systems we rely on daily. The fact that scammers can impersonate toll road operators so convincingly is alarming, and it shows how vulnerable we are to such attacks. It frustrates me to think of how many people may fall victim to these tactics, losing their hard-earned money.

Have you recently received a suspicious text message claiming to be from a toll road operator or any other service? How did you react? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

How to share a YouTube video starting at a specific time

28 January 2025 at 06:00

Ever watched a YouTube video and thought, "I need to share this exact moment with my friends?" Well, you're in luck. Sharing specific moments from YouTube videos is actually pretty easy. Whether you're on a computer, iPhone or Android device, I'm here to show you how easy it is to do just that.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

YOUTUBE’S 5 MOST OVERLOOKED USEFUL FEATURES

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

YouTube has recently introduced a new, simplified method for sharing video timestamps on Android.

Settings may vary depending on your Android phone’s manufacturer. 

These updated steps make sharing timestamps much simpler, as you no longer need to use Chrome or request the desktop site. For those using older versions of the YouTube app or Android OS or if the update isn't yet available on your device, here are the previous steps:

Settings may vary depending on your Android phone’s manufacturer. 

Both methods allow you to share specific moments in YouTube videos on your Android, but the new process is more streamlined and user-friendly.

TOP ANDROID PHONES OF 2025

Sharing specific parts of a YouTube video has never been easier. Whether you’re on a computer, iPhone or Android device, these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.

Now that you know the steps to share an exact moment, follow our guide and share a specific part of our video with your friends right away. Don't forget to let us know their reactions by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Before yesterdayTechnology News Articles on Fox News

Outsmart hackers who are out to steal your identity

27 January 2025 at 10:00

Did you know that identity theft happens every 22 seconds? This means that, by the time you finish reading this sentence, someone has likely had their identity stolen. At best, identity theft will steal away your time and patience. But more often, identity theft leads to severe consequences, like losing control over your financial accounts, having your credit score affected or even losing lifelong savings.

However, you don't have to be a statistic. By understanding how identity thieves operate and implementing smart protection strategies, you can make your personal data a fortress that's too challenging for cybercriminals to breach. Drawing from the Federal Trade Commission's (FTC) latest Identity Theft Awareness Week insights, I'll walk you through expert-backed strategies to shield your most valuable asset: your identity.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

With so much of our lives having moved online, identity thieves are having an easier time than ever. Your most important accounts – banking, credit, Social Security – are all digital. Thieves don’t need to know much about you to steal your identity, just a few pieces of personal information can be enough. According to the Bureau of Justice Statistics, 24 million Americans reported identity theft in the past 12 months. In their lifetime, 1 in 3 Americans (more than 110 million people) have experienced identity theft. Here’s the part many people don’t realize: You might have already been a target. Maybe your identity was stolen, and the thieves failed, or maybe your good online habits saved you without you even knowing, which brings us to the next lesson: prevention.

THINK YOU'RE SAFE? IDENTITY THEFT COULD WIPE OUT YOUR ENTIRE LIFE’S SAVINGS

You don’t need to spend a fortune to guard against identity theft. While professional services can be helpful, most of what you need comes down to better habits and awareness. Here are some simple steps you can take today:

1) Check your accounts regularly: Review your bank, credit card and Social Security accounts for transactions you didn’t make, failed login attempts and password reset requests you didn’t initiate.

2) Keep an eye on your mail: Look for letters regarding accounts you didn’t open, notices of data breaches and transaction summaries that don’t match your records.

3) Monitor your email inbox: Be alert for password reset emails you didn’t request, confirmation of new accounts you didn’t open, receipts for purchases you didn’t make.

4) Use two-factor authentication (2FA): 2FA adds extra layers of security to your accounts. Even if a thief has your password, they won’t be able to log in without a second step, like a code sent via text message or app-based verification. While logging in might take an extra moment, it’s worth it; 2FA dramatically increases account security.

5) Check your credit report annually: Visit AnnualCreditReport.com to get your free credit report once a year. Use it to spot suspicious activity early. If you see something unusual, take action right away.

6) Use strong passwords: Use complex passwords and a password manager to secure your online accounts. Strong passwords are your first line of defense against cyber threats.

7) Stop oversharing: Limit the personal information you share on social media and other platforms. It’s a treasure trove for cybercriminals who use it to craft convincing fraud campaigns targeted specifically at you.

10 SIGNS YOUR IDENTITY HAS BEEN COMPROMISED

Nearly half of Americans don’t know how to respond if they fall victim to identity theft. Acting quickly can make a huge difference. Here’s what to do:

1) Contact the affected institution: Contact the company immediately if you notice something unusual, like a suspicious charge or an unfamiliar account. They’ll guide you through securing your account.

2) Change your passwords: Update the password for the affected account and any others using the same credentials. Use strong, unique passwords for each account to avoid further risks.

3) Report the theft to the FTC: Visit IdentityTheft.gov to report identity theft and get personalized recovery steps.

4) Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

Data breaches often start with personal information that’s readily available online. People search sites and data brokers collect and sell this information, including your name, address, phone number and more. Can you get your data removed? Yes, but it’s tricky. These companies don’t make it easy, and managing removal requests for hundreds of sites can be overwhelming. 

Instead, consider using a personal data removal service. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

CELLPHONE NIGHTMARE LEADS TO PORTED NUMBERS, IDENTITY THEFT, FIGHT FOR RECOVERY

Look, identity theft is scary, but you're not helpless. By staying smart and proactive, you can dramatically reduce your risks. Think of protecting your identity like locking your front door: It's just good common sense in today's digital world. At the end of the day, a little awareness goes a long way, and you've already taken the first step by reading this article. Now, take what you've learned and apply it to keep you safe from cybercriminals.

What situation have you found yourself in where you felt vulnerable to identity theft or needed help protecting your personal information? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Scammers find sneaky way to bypass your iPhone's safety features

27 January 2025 at 06:00

In an alarming development, cybercriminals have devised a new method to circumvent Apple's built-in phishing protection for iMessage, potentially exposing you to malicious links and scams. This sophisticated tactic exploits a security feature designed to protect you, turning it into a vulnerability that could lead to significant personal and financial risks.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Apple's iMessage automatically disables links in messages from unknown senders as a security measure. However, cybercriminals have found a way to exploit this protection. By instructing you to reply to the message, often with a simple "Y," the attackers can re-enable previously disabled links. This seemingly innocuous action not only activates the links but also signals to the scammers that they've found an engaged target for future attacks.

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

Apple defines social engineering as a targeted attack that employs impersonation, deception, and manipulation to gain access to personal data. Scammers often pose as representatives of trusted companies, using sophisticated tactics to persuade individuals to disclose sensitive information, such as passwords and financial details. Here are some of those sneaky tactics:

The messages typically end with instructions like: "(Please reply Y, then exit the SMS, re-open the SMS activation link, or copy the link to open in Safari)."

THE ONE SIMPLE TRICK TO HELP KEEP OUT CYBER CREEPS ON IPHONE

This new tactic is part of a broader trend of smishing (SMS phishing) attacks targeting mobile users. With the increasing reliance on smartphones for various activities, including financial transactions and personal communications, these attacks pose a significant threat to users' security and privacy.

DOES MY IPHONE NEED ANTIVIRUS PROTECTION?

To safeguard against these sophisticated phishing attempts, consider the following steps.

1) Never reply to suspicious messages: Avoid responding to texts from unknown senders, especially those asking you to reply to activate links. Additionally, make sure to delete suspicious text messages and block the sender to prevent further attempts. Since the sender is not in your contact list, you can click Report Junk at the bottom of the text. Then click Delete and Report Junk. This will report the conversation as junk by sending it to your wireless carrier and Apple using your phone number.

2) Verify sender identity: Contact organizations directly through official channels if you're unsure about a message's legitimacy.

3) Be skeptical of urgency: Scammers often use urgent language to prompt quick, thoughtless actions.

4) Enable message filtering: Use your device's built-in filtering options to sort messages from unknown senders. Here are the steps:

This feature allows you to automatically sort messages from unknown senders, easily filter unread messages and manage your message inbox more efficiently.

5) Use two-factor authentication (2FA): 2FA adds an extra layer of security to your accounts by requiring a second form of verification, such as a text message or authentication app, in addition to your password. This significantly reduces the risk of unauthorized access, even if your password is compromised.

6) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

7) Invest in personal data removal services: By reducing your online footprint, you make it harder for cybercriminals to obtain your contact information, potentially preventing them from sending you these deceptive iMessage phishing texts in the first place. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

If you suspect you've fallen victim to a smishing attack:

One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

This latest trick targeting iMessage users serves as a reminder that even seemingly secure systems can be vulnerable to social engineering. By remaining cautious and following best practices for digital security, you can significantly reduce your risk of falling victim to these sophisticated phishing attempts.

What other cybersecurity challenges have you encountered with your mobile devices, and what questions do you have for us? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Biggest Wi-Fi mistakes you can make on a plane

26 January 2025 at 20:49

When my husband and I were on the very long flight last year, he leaned over and asked, "I want to check our Morgan Stanley account. Do you think it’s OK to do it using the plane’s Wi-Fi?"

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

How did we live without Wi-Fi on a plane? Oh, yeah, we read magazines! Sorry to be the bearer of bad news, but Wi-Fi isn’t as protected as we hope. Fear not. I’ve got some tips on protecting yourself and surfing safely in the skies.

10 TECH UPGRADES TO SAVE YOUR TIME, PRIVACY AND MONEY THIS YEAR

Hackers use all kinds of sneaky tactics to hijack your privacy in flight. One thing in their favor: VPNs are more likely to drop in and out in the air than on the ground. (More on that below.)

Without that layer of protection, cybercriminals using the same airline Wi-Fi can easily tap into your devices, access your information and spread malware.

"S" for security: Only visit encrypted websites — the ones that start with "HTTPS" (that "S" is important!). In general, this blocks a hacker from viewing your activity on a given site, like the password or credit card number you typed in.

Beware of AirDrop: Keyloggers keep track of every single thing you type, and criminals love to pass them along using Apple’s AirDrop feature. Don’t accept drops from strangers in flight. Steps here to disable or limit AirDrop if you need help.

Name game: Crooks can create fake Wi-Fi networks with almost identical names to the airline’s. If you’re not careful, you could plug into a copycat network instead of the legit one.

THE NSA SAYS DO THESE 5 THINGS WITH YOUR PHONE RIGHT NOW

Is your home connection locked down? Do this check twice a year.

I know you’re not going to skip the Wi-Fi altogether. That’s OK, just be smart about it.

Update everything: Before you hit the road, make sure your phone, computer, tablet, smartwatch and any other connected devices are running the latest software. Steps here for Windows, Mac, iPhone and Android. Updates often include critical security patches that protect against the new threats. Don’t forget to update your apps, too.

Add a layer of security: A Virtual Private Network (VPN) encrypts your internet connection. Before accessing anything sensitive, like your email, online banking or shopping accounts, turn on your VPN. Double-check its status to ensure it’s actively protecting your connection. It should display as "connected" or "secured."

Verify names. If you notice multiple Wi-Fi networks with similar names, check with the airline staff and confirm which is the right one.

Use 2FA: For any account tied to financial information or personal details, two-factor authentication is a must. This adds an extra layer of security by requiring a second verification step, like a code sent to your phone or email, after entering your password. Set this up for all accounts with ties to your finances to reduce the risk of unauthorized access.

Secure your devices. Invest in antivirus and malware-protection software, and keep your devices physically secure. Avoid leaving your phone, tablet or laptop unattended, even for a moment. 

THE STEP I TAKE TO CLEAR MY INBOX EVERY JANUARY

Stop looky loos. Get a privacy screen for your laptop to prevent nearby shoulder snooping.

Bonus: Don’t post pics of your boarding pass or other travel docs

You’re excited, waiting for the plane. What’s the harm in posting a pic of your boarding pass? A whole lot. Boarding passes display your full legal name, ticket number and passenger name record. That six-digit code plus your last name gives anyone access to your booking information online.

The same goes for your license, passport, visa or other identification documents. Thieves keep an eye out for any detail they can use.

Keep these photos on your phone before vacation. Scroll to No. 3. You’ll thank me if something goes missing.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

Don’t let this credit card fraud nightmare happen to you

26 January 2025 at 10:00

Credit card fraud has been on the rise in recent years.

The Federal Trade Commission’s most recent database indicates that 416,582 cases of credit card fraud were reported in 2024, making it one of the most common forms of identity theft. You know you've been a victim of this fraud when you notice unauthorized transactions on your credit card bill. 

These transactions are usually below $100 to avoid detection. However, sometimes they can exceed $1,000. One such incident happened with Martin from Martinsville, Virginia, when he was randomly charged $1,095 in Hong Kong.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

"Hello, I recently received a fraud alert from my credit card company that said that there was a $1,095 charge on my credit card in Hong Kong. I use my iPad and Safari browser to buy online. Can you please explain how this could happen? By the way, my credit card company canceled my credit card and will send me a new Mastercard in the mail, and I’m not responsible for the charges on my credit card. What can I do in the future to prevent this from happening again?"

I'm sorry to hear about the fraudulent charge on your credit card, Martin. It’s good that your credit card company is handling it and that you’re not responsible for the charges. For future reference, I'll be discussing how this could have happened and how to stay safe.

Credit card fraud can happen in several ways, often without you even realizing it. One common method is when fraudsters get hold of your card information through data breaches at online stores or banks, which means your details get leaked without your knowledge. 

Another sneaky tactic is phishing, where scammers trick you into giving away your card info by posing as legitimate companies via emails or fake websites. 

There’s also the risk of "card skimming," where devices at ATMs or gas stations secretly capture your card details when you swipe it. In some cases, fraudsters might also exploit weak security on public Wi-Fi networks or compromised apps to access your information while you’re shopping online.

OUTSMART THE SCAMMERS: HOW THE SNEAKY CEO APPLE GIFT CARD SCAM ALMOST GOT ME  

A report from Security.org reveals that 52 million Americans experienced credit card fraud in 2023, a figure even higher than the one reported by the FTC. With four out of five American adults owning at least one credit card, the report found that three in five cardholders have faced unauthorized charges — an estimated 128 million victims. Even more concerning, 75% of these victims reported having their credit card information stolen more than once. 

The typical unauthorized transaction is around $100, which adds up to approximately $5 billion in criminal purchases each year. Interestingly, most unauthorized transactions involve credit cards that weren’t physically lost or stolen, highlighting the growing risks of online fraud and data breaches.

THE BEST BALANCE TRANSFER CREDIT CARDS 2025

Data breaches are one of the main ways credit card fraud happens. Hackers often get unauthorized access to sensitive information stored by businesses or institutions. When a retailer, financial institution or online store experiences a data breach, the hackers usually go after the payment systems where customer credit card details are kept.

If these systems aren’t properly secured, hackers can grab things like credit card numbers, expiration dates and sometimes even security codes. Once they have that info, they can either use it themselves or sell it to others.

But it’s not just credit card information at risk. Data breaches can also expose personal details like names, email addresses and phone numbers. Scammers can then use this stolen info to launch phishing attacks, pretending to be trusted companies and tricking you into giving away more sensitive information.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

This is why identity theft monitoring is so important. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY

1. Notify your credit card issuer immediately: If you notice fraudulent charges on your credit card, start by calling the number on the back of your credit card. From there, you should get more detailed information on what to do next.

2. Monitor your statements regularly: One of the best ways to catch credit card fraud early is to keep an eye on your statements. Review your transactions regularly to spot any unfamiliar charges. The sooner you notice something suspicious, the quicker you can report it to your credit card company and prevent further damage.

3. Regularly check your credit report: In addition to monitoring your credit card statements, periodically review your credit report to catch any unauthorized accounts opened in your name.

4. Use strong, unique passwords: Always use strong, unique passwords for your online accounts, especially those that store payment details. Avoid using easily guessable information, and consider using a password manager to store and generate secure passwords. This reduces the chances of fraudsters accessing your accounts.

5. Use credit card alerts: Set up transaction alerts with your credit card company. This way, you’ll receive a notification via email or text for every transaction made with your card. If you receive an alert for a purchase you didn’t make, you can take immediate action to report it and prevent further charges.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

6. Be Cautious with public Wi-Fi: Avoid making purchases or entering sensitive information when connected to public Wi-Fi networks because they’re often not secure. If you need to make an online purchase while on the go, consider using a VPN (Virtual Private Network) to encrypt your connection and keep your credit card details safe from hackers. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices 

7. Don't store credit card info on browsers and websites: Storing your credit card information on browsers or websites can make it convenient, but it also exposes you to a higher risk of fraud. If your browser or the website’s security gets compromised, hackers could gain access to your saved card details. To stay safe, avoid saving your credit card information and manually enter it each time you make a purchase. If a site offers to save your details for future use, think twice before accepting. It's better to take the extra step to enter your information each time, ensuring your data stays secure.

8. Use EMV chip technology: When making in-person purchases, always use the chip reader instead of swiping your card. Chip technology provides an extra layer of security against fraud.

9. Be wary of phishing attempts and have strong antivirus software: Be cautious of unsolicited emails, texts or phone calls asking for your credit card information. Legitimate companies typically don't request sensitive information through these channels. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

10. Keep your card in sight: When using your card in restaurants or stores, try to keep it within view. This reduces the risk of someone copying your card details.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

It's clear that credit card fraud is more prevalent than ever, affecting millions of Americans each year. The good news is that there are effective steps to protect yourself from becoming a victim. By staying vigilant and employing best practices — like monitoring your statements and using strong passwords — you can significantly reduce your risk. Remember, awareness and proactive measures are your best defenses against credit card fraud.

Have you or someone you know ever experienced credit card fraud, and how did it impact you? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Crooks can't steal this motorcycle that hides in plain sight

26 January 2025 at 06:00

Imagine walking down a busy city street surrounded by the usual urban clutter — graffiti-covered walls, chained bicycles and various pieces of street furniture. 

Among these familiar sights, you might pass by what appears to be a nondescript telecom signal box

But with the push of a button, this unassuming object transforms into a fully functional motorcycle. Welcome to the world of the Nomoto, a revolutionary concept by designer Joey Ruiter that challenges our perception of urban transportation.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

The Nomoto, short for "No moto here, buddy," is a remarkable electric motorcycle concept that blurs the line between vehicle and urban infrastructure. When parked, it looks like nothing more than a graffiti-covered metal box, seamlessly blending into its surroundings. 

This camouflage serves a dual purpose. It's an artistic statement about urban design and a practical solution to bike theft.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

WHO CAME UP WITH THIS CRAZY BUT COOL ELECTRIC MONOWHEEL?

The genius of the Nomoto lies in its transformation. At the touch of a button, the seemingly immobile box rises up on wheels, ready to ride. The design eliminates the need for a kickstand because the bodywork lowers itself to sit flush with the ground when parked. 

A drop-down cover reveals the handlebars, while flip-up covers on the front and rear boxes provide small storage areas. While the Nomoto's primary appeal is its unique aesthetic, it's not just for show. The bike is a fully functional electric scooter, albeit a basic one. It features stealthy headlight and brake light arrangements, though it appears to lack mirrors and indicators.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Joey Ruiter is no stranger to pushing the boundaries of design. Known for his minimalistic approach, Ruiter strips products down to their essence, reimagining ordinary objects in extraordinary ways.

His portfolio includes a 215-horsepower watercraft and the Snoped, an upright single-track snow bike with stark, boxy bodywork. Ruiter's work often polarizes opinion, and he wouldn't have it any other way. 

"I don't mind if somebody doesn't like my work," he says. "I think the polarization makes it fun." 

The Nomoto embodies this philosophy, challenging our expectations of what a motorcycle should look like and how it should function in an urban environment.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

A PEDAL-ELECTRIC HYBRID THAT'S HALF BIKE, HALF CAR

The Nomoto represents a bold reimagining of urban transportation. It's a testament to the power of creative design to solve practical problems while challenging our perceptions. While it may never see mass production, the Nomoto serves as an inspiring example of how thinking outside the box — or, in this case, inside a very unusual box — can lead to innovative solutions for city living.

Would you feel comfortable riding a motorcycle that looks completely invisible when parked, trading traditional motorcycle aesthetics for ultimate urban stealth? Let us know what you think by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Allstate sued for allegedly tracking and selling 45M Americans' location data

25 January 2025 at 10:00

Nowadays, almost every app you download asks for location permissions, meaning it wants to track where you are and your movements. For an app like Google Maps, requesting location access makes perfect sense. It's also reasonable for apps like Uber or DoorDash, which rely on location for their services. 

However, many apps that have nothing to do with location still ask for it, and we often grant these permissions without thinking twice. When you give an app access to your location, that data is stored and, in some cases, might even be sold. According to Texas Attorney General Ken Paxton, this practice is not uncommon. 

A recent lawsuit filed by Paxton alleges that the insurance company Allstate collected and sold the location data of 45 million Americans' smartphones.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

In a press release, Paxton announced that he had sued Allstate and its subsidiary, Arity, for unlawfully collecting, using and selling data about the location and movements of Texans' cellphones. The data was gathered through secretly embedded software in mobile apps, such as Life360. "Allstate and other insurers then used the covertly obtained data to justify raising Texans’ insurance rates," the press release stated.

The insurance provider allegedly collected trillions of miles' worth of location data from more than 45 million Americans nationwide. The data was reportedly used to build the "world’s largest driving behavior database." When customers sought a quote or renewed their coverage, Allstate and other insurance companies allegedly used the database to justify raising car insurance premiums.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Paxton claims the actions violated the Texas Data Privacy and Security Act. The lawsuit alleges customers were not clearly informed their data was being collected and did not consent to the practice.

"Our investigation revealed that Allstate and Arity paid mobile apps millions of dollars to install Allstate’s tracking software," said Paxton. "The personal data of millions of Americans was sold to insurance companies without their knowledge or consent in violation of the law. Texans deserve better and we will hold all these companies accountable."

We reached out to Allstate and Arity for comments. A rep for the Allstate Corporation provided CyberGuy with this statement: "Arity helps consumers get the most accurate auto insurance price after they consent in a simple and transparent way that fully complies with all laws and regulations."

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Car manufacturers have also been accused of selling similar data to insurance companies. Last year, Paxton sued General Motors for allegedly collecting and selling the private driving data of more than 1.5 million Texans to insurance companies without their knowledge or consent. In addition to insurance companies, data brokers are frequent buyers of customer data. Critics say these brokers fail to adequately protect the information, leaving it vulnerable to hackers. Earlier this month, hackers claimed to have breached Gravy Analytics, a major location data broker and the parent company of Venntel, which is known for selling smartphone location data to U.S. government agencies.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

1. Avoid installing the insurance company’s app: Many insurance companies encourage users to download their apps to "simplify" claims, payments or policy management. However, these apps often collect and track your location data under the guise of improving their services. If the app is not absolutely essential, manage your account through the company’s website or contact customer service directly instead.

2. Don’t give location permissions unnecessarily: When an app requests location access, ask yourself whether it genuinely needs this information to function. For example, a weather app may need approximate location data, but a flashlight app does not.  Always choose "Deny" or "Allow only while using the app" unless absolutely necessary. Most modern devices also allow you to provide an approximate location rather than a precise one, which is a safer option when location access is unavoidable.

3. Review and manage app permissions regularly: Over time, you may forget which apps have been granted permissions. Regularly go through your device’s app settings to check and adjust permissions. On most devices, you can access this under settingsprivacyapp permissions (specific steps vary by operating system). Revoke access for any apps that don’t need it or seem suspicious.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

4. Turn off location services when not in use: Keep location services off when you don’t need them. This reduces the chances of apps or devices tracking you passively in the background. For tasks like mapping or food delivery, turn location services on temporarily, then turn them off when you’re done. For added security, avoid connecting to public Wi-Fi networks, which can also be used to track your location indirectly.

5. Use privacy-focused tools and apps: Invest in tools designed to safeguard your privacy. Virtual private networks (VPNs) can mask your location online and prevent unwanted tracking while browsing.  VPNs will also protect you from those who want to track and identify your potential location and the websites that you visit. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices

BEWARE OF ENCRYPTED PDFS AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

If Allstate is indeed unlawfully collecting and selling people’s location data, Attorney General Paxton is right to hold them accountable by filing a lawsuit. In an era where cybercriminals exploit every opportunity to scam individuals, companies that fail to protect customer data are unacceptable and should face consequences. Data has become the new oil, and everyone seems eager to exploit it — often at the expense of ordinary people. Businesses that prioritize profits over privacy erode trust and put consumers at risk, making it crucial to enforce strict accountability for such practices.

Do you think companies like Allstate should be required to make their data practices crystal clear to customers? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: Musk vs. Altman

25 January 2025 at 08:00

IN TODAY'S NEWSLETTER:

- Musk casts doubt on Trump-backed Stargate project: 'They don't actually have the money'
- Elon Musk biographer offers big prediction for Trump term
- AI abortion training has arrived: New tech tools navigate the blurry line between healthcare and politics
-Trump’s AI deal fueling early cancer detection: Oracle’s Larry Ellison
-Microsoft CEO says AI is the ‘most important’ export of American services

EMPTY COFFERS?: Business magnate and X CEO Elon Musk has cast doubt on whether there is enough funding available to follow through on a massive $500 billion artificial intelligence (AI) infrastructure project announced by President Donald Trump on Tuesday.

ON THE BRINK: Walter Isaacson, author of "Elon Musk," discusses the Trump administration’s collaboration with tech giants to drive AI innovation and technological advancement on "America’s Newsroom."

CONTROVERSIAL TECH: Artificial intelligence (AI) tools are now available for future medical professionals at one Texas university to navigate the complexities of pregnancy and abortion—a development that further blurs the line between technology, politics and healthcare.

FUELING CANCER VACCINES: Oracle founder Larry Ellison said the massive artificial intelligence (AI) infrastructure project dubbed Stargate is helping to fuel the development of a cancer vaccine.

'MOST IMPORTANT' EXPORT: Microsoft vice chair and president Brad Smith breaks down how the company plans to invest in artificial intelligence during an appearance on ‘Mornings with Maria.’

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Willing to pay $175,000 for a life-size robot friend that remembers everything about you?

25 January 2025 at 06:00

In a world where loneliness is becoming increasingly prevalent, researchers have taken a bold step forward by introducing Melody, a life-sized artificial intelligence robot designed to combat this growing epidemic. 

However, Melody is not just another gadget; she represents a significant move toward creating robots that closely resemble humans in both appearance and interaction.

Realbotix, the innovative tech firm responsible for Melody's creation, aims to produce robots that are not only visually indistinguishable from humans but also capable of meaningful interactions.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

According to CEO Andrew Kiguel, "Melody was created with the intention of having robots that are easy to travel with and modify for various forms of personal interaction." This focus on adaptability allows Melody to serve multiple roles, from educational tools to companions in entertainment.

Melody boasts an impressive array of features that enhance her functionality and user experience:

Realistic movements: Equipped with advanced motor technology, Melody can execute fluid and natural movements, enhancing her ability to engage in lifelike interactions.

CHINA’S NEWEST HUMANOID ROBOT IS READY TO SERVE LIKE NEVER BEFORE

Eye tracking and object recognition: With micro-cameras embedded in her eyes, she can maintain eye contact and recognize objects, making conversations feel more genuine.

Modular design: Her components can be easily disassembled and reassembled, allowing for portability and customization according to user needs.

Open-source compatibility: Melody's design supports integration with various AI platforms, including Realbotix's proprietary companionship AI, making her versatile for different applications.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Realbotix emphasizes that Melody's primary purpose lies in fostering connection rather than intimacy. Her role as an engaging companion is designed to enhance human experiences through interaction and fun. However, she can engage in adult conversations if desired. The company envisions Melody as a versatile solution for addressing loneliness, with potential applications across multiple domains such as education, healthcare and personal companionship.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

With a price tag of $175,000, Melody is positioned as a premium product aimed at those seeking a unique blend of companionship and technology. This investment speaks to the growing market for humanoid robots designed for personal interaction, reflecting a shift in how we view relationships in an increasingly digital world.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

One look at Melody, and you might think she is designed for something else entirely. As technology evolves, so too does our understanding of companionship. Melody represents not just a technological advancement but also a cultural shift towards accepting robots as part of our social fabric. With her ability to remember personal interactions and adapt to individual preferences, she challenges our perceptions of connection in the modern age.

What do you think about the rise of humanoid robots like Melody? Are they the solution to loneliness or just another gadget? Let us know what you think by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

The NSA says do these 5 things with your phone right now

24 January 2025 at 15:31

Can’t remember the last time you turned your phone off? Is Bluetooth always on? Do you plug into any charger you can find?

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

If you answered yes to any of these questions, the NSA says you’re playing a crapshoot with your privacy. The National Security Agency’s purpose is to listen and collect communications from satellites, cellphones and anywhere else, really. 

THESE MISTAKES COULD TANK YOUR CREDIT SCORE

Let’s take a deeper look at five smartphone rules they use that you can, too.

1. Restart your phone once a week

It’s dead simple and absolutely worth doing. Turn off your phone, wait 10 seconds, then turn it back on. This works to combat zero-click exploits where a hacker can get in simply by sending you the right code.

Heads up: A restart won’t work for other types of malware. If your phone becomes infected, you’ll need to do a full factory reset.

2. Disable Bluetooth when you don’t need it

Bluetooth works similarly to Wi-Fi and cellular networks but performs simpler tasks at shorter ranges. You don’t need a cellular signal or network connection to use Bluetooth, and it doesn’t use data. And like any other connection, it’s not 100% safe.

Hackers and scammers must be close to you to use Bluetooth to hijack your phone. But in just about any public space, you’re arm’s length from strangers.

The NSA’s advice: Turn off Bluetooth when you’re not using it. It’ll help battery life, too.

Airplane mode also disables Bluetooth and Wi-Fi, among other things, so it works in a pinch — but you won’t receive calls or texts.

THE STEP I TAKE TO CLEAR MY INBOX EVERY JANUARY

3. Skip public USB ports

In spaces like the airport or coffee shop, hackers can use them to install malware or steal your data. Now, actual cases of juice jacking are rare in the U.S. but it’s still a real threat. They happen through USB connections, so if a kiosk has actual power outlets to charge your phone using your own adapter, you’re good to go.

Stay away from USB ports of any size, especially when traveling overseas. USB standards are international, and foreign hackers can target USB ports in hotels or rentals to steal your data, even if you’re not using a kiosk.

More and more public kiosks have wireless charging pads instead of USBs. This method doesn’t exchange data directly with your phone, so it’s virus-free by default. 

If you’re desperate for juice, you can use a USB connection safely … with the right cable. Pack a charge-only cable for your trip. They’re cheap and compact, and they don’t allow for data transfers.

4. Don’t use public Wi-Fi

It's a playground for snoopers. Public Wi-Fi is open to everyone, and every device is susceptible, whether it’s your smartphone, laptop or tablet.

Just because a public Wi-Fi network pops up and asks if you want to join doesn’t mean it’s legitimate. If you’re at a coffee shop or hotel, ask an employee for the specific name of their Wi-Fi network. Scammers will sometimes create networks called "Coffee Shop" or "Hotel Guest" to make you believe you’re connecting to the real thing when, actually, you’re not.

Here’s a good rule of thumb: If it requires a username and password to log in, you should only access that site from your own private network. If you do need to access sensitive sites or info on a public network, don’t do it without a VPN enabled.

AI ISN’T GOING ANYWHERE: PROMPTS TO MAKE LIFE EASIER

5. Cover your mic and camera

The NSA says it’s best to use a protective case that drowns out your microphone and covers your camera when you’re not using it.

In "hot-miking" attacks, hackers activate your microphone without you knowing it so they can listen into your conversations. It happens when your device has been compromised in some way, usually through malware or an app that’s exploiting permissions you granted. Most folks aren’t targets for attacks like this, but I’d rather be safe than sorry.

Start with app permissions to check what access you’ve handed out:

It’s not just hackers to worry about. Most of what you type, say, search and buy is being tracked in one way or another.

The only unhackable layer of security is physically blocking the sound or camera feed. There are expensive cases out there that do the job, or you can buy a mic blocker for around $10. 

It slides into your headphone port to stop recording. You’ll need an adapter unless your phone still has an audio jack. For a cheaper DIY option, grab your oldest corded headphones, snip them off and plug that into an adapter.

Pro tip: When your phone’s microphone is on or was recently accessed, you’ll see a small orange dot at the top of the screen. You’ll see a green dot if your camera is in use or was recently recording. 

While this is on your mind, go a step further. Here’s a quick 5-minute phone cleanup I like to do a few times a year.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

Robotic dog helps those facing mental health and cognitive challenges

24 January 2025 at 06:00

U.S. robotics company Tombot has introduced "Jennie," an innovative AI-powered robotic pet designed to provide comfort and companionship to those facing cognitive health challenges.

This groundbreaking creation is set to transform the lives of millions struggling with dementia, mild cognitive impairment and various mental health issues.

Jennie's inception stems from a personal tragedy experienced by Tombot CEO Tom Stevens. When his mother, Nancy, was diagnosed with Alzheimer's, the family had to make the heart-wrenching decision to rehome her beloved dog, Golden Bear. 

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

This difficult choice led to increased loneliness and depression for Nancy. Recognizing the widespread need for a solution, Stevens founded Tombot with the mission to create a robotic companion that could provide the emotional benefits of pet ownership without the associated challenges.

5 NEW INNOVATIONS TO HELP SENIORS LIVE BETTER

Jennie's lifelike appearance is the result of a collaboration with Jim Henson's Creature Shop, renowned for creating the iconic Muppets. This artistic partnership has resulted in a hyperrealistic Labrador retriever puppy that captures the essence of a real dog.

Jennie features an impressive array of interactive technologies designed to create a lifelike and engaging companion experience. The robotic puppy features sophisticated interactive touch sensors strategically placed across its body, allowing it to respond authentically to human touch and interaction. When a user pets or touches Jennie, the advanced sensor technology enables nuanced, realistic reactions that mimic a real puppy's behavior.

Voice command recognition technology allows Jennie to understand and respond to verbal instructions, creating an incredibly realistic puppy-like interaction. Users can give commands like "speak" or "sit," and Jennie will react accordingly, providing a sense of genuine companionship and responsiveness.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

To enhance its authenticity, Jennie's sounds are meticulously crafted from actual recordings of 8- to 10-week-old Labrador puppies. These genuine puppy sounds create an incredibly immersive experience, making interactions feel remarkably true to life and emotionally engaging.

The robotic puppy is engineered for practical, everyday use with an impressive all-day battery life. Users can simply plug Jennie in overnight, similar to charging a smartphone, ensuring the companion is ready for full daily interaction without interruption.

A dedicated smartphone app provides users with extensive customization options. Through this digital interface, owners can name their Jennie, personalize its functionality and track daily interactions, adding another layer of personal connection to the robotic pet experience.

Tombot is committed to continuous improvement, offering regular software updates that will introduce new behaviors and commands. This approach ensures that Jennie remains dynamic and evolving, with the potential for expanding capabilities over time through simple app-based upgrades.

BEST CREDIT CARDS FOR SENIORS AND RETIREES 2025

Jennie was specifically designed to address the needs of individuals facing various health challenges:

Dementia and mild cognitive impairment: Peer-reviewed studies suggest that robotic animals can help ease symptoms such as hallucinations and aggressive outbursts.

Anxiety and depression: Jennie provides comfort and support for those struggling with mental health issues.

Loneliness: The robotic puppy offers companionship to seniors and others experiencing isolation.

Stress: Jennie can help alleviate psychological stress in long-term hospital patients.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

BEST TECH FOR SENIORS

Tombot aims to register Jennie as an FDA-regulated medical device, potentially expanding its use in hospitals and care facilities. With over 7,500 preorders from homes, hospitals and care centers, Jennie is poised to make a significant impact in the field of robotic companionship.

Jennie offers an affordable and accessible alternative to live pet ownership. This is particularly beneficial for those who cannot safely or practically care for a real animal due to health or living conditions. To join the Jennie waitlist, prospective owners can click the link on Tombot's website, and the company will directly contact you with specific pricing details and shipping availability as the next production batch approaches. The company tells CyberGuy that Tombot puppies will likely retail for around $1,500.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Jennie represents a significant step forward in addressing the emotional and companionship needs of those facing cognitive and mental health challenges. By combining cutting-edge technology with a compassionate approach, Tombot has created a solution that could improve the quality of life for millions of people worldwide.

Do you think AI robotic companions like Jennie could provide genuine comfort and emotional support in your life or the life of a loved one? Why or why not? Let us know what you think by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

The sickening truth: Healthcare data breaches reach all-time high

23 January 2025 at 10:00

If your healthcare data hasn't been breached in 2024, then you either don't know it yet or should consider yourself very lucky. 

That's because 2024 was a nightmare year for healthcare institutions and patients in the U.S. A total of 184,111,469 records were breached. That's 53% of the 2024 population of the United States. 

This staggering figure represents a significant increase from previous years, setting a new and alarming record in healthcare data breaches. 

The healthcare sector faced unprecedented challenges in cybersecurity, with attacks becoming more frequent, sophisticated and damaging than ever before.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Being admitted to a hospital is stressful enough. It caused additional stress for the 100 million clients of Change Healthcare, whose data was exposed following a breach orchestrated by the BlackCat ransomware group. Not only did the breach expose sensitive health information, but it also caused widespread disruptions in claims processing. Patients and providers across the country faced chaos as the breach impacted their ability to access and pay for healthcare services.

The second significant breach occurred at Kaiser Foundation Health Plan, where the personal data of 13.4 million individuals was compromised. This breach involved unauthorized access and the use of tracking technologies that transmitted user interactions to third parties. 

HACKERS CLAIM MASSIVE BREACH OF COMPANY THAT TRACKS AND SELLS AMERICANS' LOCATION DATA

You’ll receive a notification letter, although be aware that it may take months before it reaches you (as was the case for victims of the Ascension Health data breach). The consequences are real and can be very painful. Medical identity theft directly affects patients' health and safety. It happens when criminals use stolen personal health information to obtain medical services or medications under another person’s name. It can result in incorrect medical records being created that can include inaccurate diagnoses, allergies or treatments. 

And as you may have guessed, it can also result in financial repercussions, such as patients getting fraudulent claims and bills for services they did not receive. Resolving these issues with insurers and healthcare providers takes time and mental strength. And you’re probably not in a hurry to see your breached healthcare provider ever again. That’s normal. A study has shown that up to 54% of patients consider switching providers after a data breach.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

ARE DATA BROKERS ENDANGERING YOUR RETIREMENT SECURITY?

Sensitive health information can easily be combined with personal identifiers from data brokers, creating comprehensive profiles that criminals can exploit. As a reminder, data brokers are companies that specialize in collecting, processing and selling personal information from various sources, including public records, online activities and social media. 

They aggregate this data to create detailed consumer profiles that can be sold to marketers, insurance companies and other entities for various purposes. The more detailed the profile, the higher the chance of identity theft and potential discrimination in employment and insurance. Employers might make hiring decisions based on perceived health risks, while insurers could deny coverage or increase premiums.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

You can’t prevent a data breach, but you can minimize its consequences by reducing your digital footprint overall.

1. Set your social media to private: Restrict access to your personal information and limit what strangers can see about your life and potentially your health status. Ensure your privacy settings are robust and regularly updated to prevent unauthorized data collection.

2. Remove your personal data from data brokers’ databases: Either by searching for your name on people search sites and requesting removals, one by one, or by using a data removal service. Data removal services automate data removal for you and let you track where exactly your data has been found and whether it was removed, not only on people search sites, which are public data brokers, but also on hidden, private databases where you can’t look yourself up (and these are the worst).

Once your data is removed, data removal services monitor data brokers for your data and remove it again as needed (because it has a tendency to be re-listed after a while). This way, you prevent data broker companies from compiling a full profile on you and selling it to the first bidder, whether that’s a hacker, a marketing agency or an insurance company. Check out my top picks for data removal services here.

3. Delete all unused apps on your phone: Unused applications can be hidden gateways for data leakage and potential security vulnerabilities. Regularly audit and remove apps that you no longer use or need.

4. Check the permissions of the ones you want to keep: Review each app's access to your personal data, location and device features to ensure you're not inadvertently sharing more information than necessary. Be particularly cautious with health and fitness tracking applications.

5. Use a VPN (virtual private network) when browsing: Encrypt your online activities and mask your digital location to add an extra layer of anonymity and protection. A reliable VPN can help shield your personal information from potential interceptors and data miners. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

The reality of healthcare data breaches is daunting, but it’s not entirely out of your control. While you can’t prevent breaches from happening, you can take steps to minimize the risks and protect your personal information. Think of it as adding locks to your digital doors: set your social media to private, use a VPN and clean up unused apps. Remember, the less information you leave out there, the harder it is for bad actors to exploit it. Stay vigilant and don’t let your data become someone else’s advantage.

How do you feel about the growing risks to your personal information, and what steps have you taken to protect your data? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

This flying motorcycle can take you from traffic to sky in minutes

23 January 2025 at 06:00

The unveiling of the Skyrider X1, which claims to be the "world’s first amphibious flying passenger motorcycle," has certainly stirred up excitement. 

This innovative vehicle promises to change how we think about personal mobility by combining land and air travel in one sleek design.

Developed by Rictor, a sub-brand of the Chinese company Kuickwheel, the Skyrider X1 marks a big progression from Rictor's previous product, the K1 e-bike. Transitioning from an electric bicycle to a flying motorcycle is no small feat, and it shows Rictor's ambition to push the boundaries of eco-friendly and energy-efficient transportation.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

The Skyrider X1 features amphibious functionality, allowing it to operate on both land and water, although some skeptics are curious about how well it will perform in real-world conditions. This vehicle can reach speeds of up to 62 mph (100 km/h) and offers flight times of around 25 minutes for the base model with a 10.5-kWh battery. The premium version, equipped with a 21-kWh battery, boasts up to 40 minutes of flight time.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

Made from lightweight carbon fiber composites and aviation-grade aluminum, the Skyrider X1 balances durability with flight capability. It also incorporates smart technology that includes automatic route planning to determine optimal flight paths based on your destination and real-time adaptability that adjusts altitude, speed and direction according to weather conditions.

CHINESE AUTO GIANT WANTS TO MAKE FLYING CARS YOUR NEXT COMMUTE OPTION

Safety is a top priority for Rictor in the design of the Skyrider X1. The vehicle includes triple-redundant flight control systems that ensure safe operation even if an engine fails. Additionally, it features an integrated emergency parachute for added peace of mind.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

AN ELECTRIC AIRCRAFT THE MILITARY HAS ITS EYES ON CAN TAKE OFF WITH ONLY 150 FEET OF RUNWAY

With an expected price tag of around $60,000, the Skyrider X1 aims to make personal air travel more accessible compared to other eVTOL options. By blending performance with affordability, Rictor hopes to bring flying within reach for more people.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

As cities grow and traffic congestion worsens, innovative solutions like the Skyrider X1 could become essential. This vehicle not only aims to ease urban travel but also promotes sustainable options in personal transportation. With advancements in battery technology and autonomous systems, eVTOL vehicles may soon transform how we navigate our environments.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The Skyrider X1 is a glimpse into a future where flying could actually be part of our everyday lives. Imagine zipping through the skies instead of sitting in traffic. It sounds pretty cool, right? However, there are still some big questions to tackle about how this will all work in practice. We need to think about safety and whether it can really handle the demands of real-world travel. So, while the idea of flying motorcycles is exciting, we’ll have to wait and see how they fit into real-world scenarios.

So, what do you think? Would you be ready to hop on a flying motorcycle like the Skyrider X1? Let us know what you think by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: Tech titans sound off on Trump's AI project

22 January 2025 at 12:08

IN TODAY’S NEWSLETTER:

- AI executives praise Trump's Stargate project: 'This is a very large investment that affects all of humanity'

- Trump announces major AI infrastructure investment involving Softbank, OpenAI and Oracle

- AI company Perplexity bids to merge with TikTok to avoid ban: report

- Chinese tech firm shares robot training secrets with the world

'FOR THE GOOD OF HUMANITY': The three tech CEOs who have joined forces in President Donald Trump's multi-billion dollar artificial intelligence infrastructure project defended the venture as an investment that "impacts all of humanity."

POWERING UP: President Donald Trump unveiled a massive artificial intelligence infrastructure project from the private sector on the first full day of his second term in office on Tuesday.

TIME'S UP: Artificial intelligence company Perplexity AI has bid to merge with TikTok U.S., so the video sharing platform can avoid being banned in the country, according to a report.

ROBOT TRAINING SECRETS: AgiBot, a pioneering Chinese artificial intelligence and robotics company, has introduced a transformative open-source dataset called AgiBot World Alpha.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Best home inventory apps to protect your property in case of emergency

22 January 2025 at 10:00

The recent disasters sweeping the nation, from the torrential floods in North Carolina to the fires still raging in Southern California, showed how vital it is to have an evacuation plan because you might only have mere seconds to determine which items to take with you as you evacuate. 

While caring for your loved ones during this extremely stressful time should be a top priority, it is unavoidable that you must rebuild your home and life, which can mean having to provide detailed accounts of what you lost to your insurance provider. 

Trying to figure out what to take when you are given seconds or minutes to evacuate or having to file detailed insurance claims afterward can be a painful and confusing process.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Home inventory and restoration apps can provide you with a tool to itemize and track every item in your home. Not only can these apps help you stay organized and fiscally responsible for everyday home projects, but they can also help you easily determine what you need to grab and where it would be when you have limited time to grab items to take with you when you evacuate. It is important to determine where and what to prioritize, especially if your home is at risk. 

These apps can centralize all your home information so that you can stay within budget for home projects and maintenance work, and they can help you should you ever have to submit a claim after any disaster. It can also help you keep your home safer with routine maintenance. Additionally, creating a home inventory can help you determine if you have the appropriate amount of insurance coverage. Some apps allow you to upload important documentation for your home in general or specific items. This means if you ever deal with the worst-case scenario and cannot grab all the important home documents, your apps will have them stored for you and accessible by phone or computer.

Here are the top picks for apps that are best at keeping track of your home before or after a disaster.

TOP FIREPROOF BAGS, ORGANIZERS AND SAFES TO PROTECT YOUR VITAL DOCUMENTS

A comprehensive home management platform, HomeZada, helps homeowners manage all aspects of their home, including but not limited to: maintenance, finances, inventory and improvement projects. Because it acts as a central hub to organize and track important home-related information, it will help you track, locate, rescue important items and make filing insurance claims easier.

Key features of HomeZada

Pricing

HomeZada offers both free and premium plans. Premium plans features include providing additional tools for inventory management, financial tracking and project planning.

Website

For more information or to sign up, click here.

TOP PICKS TO AMP UP YOUR HOME SECURITY

While not as comprehensive as Homezada, Centriq has a strong focus on home management, which centralizes everything you need to organize, troubleshoot, operate and maintain your home.

Key features of Centriq

Pricing

Centriq offers both free and premium plans. Some of the extra features of the Premium plan include interactions between multiple properties and shared access for multi-users.

Website

For more information or to sign up, click here.

TECH TIPS TO AVOID CONTRACTOR SCAMS AFTER A STORM OR DISASTER

The National Association of Insurance Commissioners created the NAIC Home Inventory app to help you if you need to file a claim, as well as provide expert tips. The app showcases a simple, clean design of the inventory section with built-in room suggestions. Though a bit more generic than some of its competitors, this app helps you create an itemized list of your home should you need to file an insurance claim in the future.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Key features of NAIC home inventory app

Pricing

NAIC Home Inventory app is free.

Website

For more information or to sign up, click here.

BEST APPS TO TRACK AND MONITOR AIR QUALITY TO STAY SAFE

Unlike its namesake, Itemtopia actually goes beyond itemizing your belongings. Available in over 170 countries worldwide, the app allows you to manage services, warranties as well as medical records. A rich and interactive app helps you start with ease by incorporating AI intelligence.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Key features of Itemtopia

Pricing

Itemtopia offers both free and premium plans. Some of the extra features of the Premium plan include larger storage (up to 2 GB or approximately 3,000 items), the option to add more users and the ability to showcase items for sale with a shareable link.

Website

For more information or to sign up, click here.

THE ALARMING SURGE OF HOME TITLE THEFT AND HOW TO PROTECT YOUR PROPERTY

It’s easy to feel chaotic and overwhelmed when disaster strikes or when friends or family members are grappling with huge losses in home and security. There are, however, home apps that can help you create a plan before and after disaster strikes so you can have one less problem to manage while grieving your losses. While the hope is that disasters will not happen to you, these apps I mentioned will help you know, organize and restore your home should disaster strike. With some of the easiest and best ways to create a home inventory, it will give you peace of mind and a proactive way to respond during an emergency.

Are you prepared for possible evacuation in an emergency? Have you survived a disaster? What did you learn, and what would you do differently? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

A new security seal of approval is coming to your smart home gadgets

22 January 2025 at 06:00

The White House has unveiled a groundbreaking initiative to enhance the security of internet-connected devices in American homes. 

The U.S. Cyber Trust Mark, a new cybersecurity safety label, is set to appear on smart products sold in the United States later this year. 

This program aims to help you make informed decisions about the safety of the smart devices you bring into your home.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

The U.S. Cyber Trust Mark is a label designed for consumer smart devices, including home security cameras, TVs, internet-connected appliances, fitness trackers, climate control systems and baby monitors. This mark signals that a device meets a set of security features approved by the National Institute of Standards and Technology (NIST).

Vendors can label their products with the Cyber Trust Mark logo if they meet NIST's cybersecurity criteria. These criteria include:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Consumers will be able to scan a QR code next to the Cyber Trust Mark label to access additional security information. This information includes:

ARE DATA BROKERS ENDANGERING YOUR RETIREMENT SECURITY?

There is a growing concern about cybercriminals remotely hacking into home security systems and malicious actors tapping into insecure home cameras. With the average U.S. household having 21 connected devices, according to a Deloitte study, the threat of cyberattacks is increasingly significant.

BEWARE OF THESE DOORBELL CAMERAS THAT COULD BE COMPROMISED BY CYBERCRIMINALS

The program is set to launch in 2025. Companies will soon be able to submit their products for testing to earn the label, and major retailers like Best Buy and Amazon have committed to highlighting labeled products. The program has garnered support from major electronics, appliance and consumer product makers, including Amazon, Google, Best Buy, LG Electronics U.S.A., Logitech and Samsung Electronics.

While the U.S. Cyber Trust Mark aims to cover a wide range of smart home gadgets, not everything in your tech arsenal will be sporting this new seal of approval. Here's a rundown of what's left out:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

And here's a surprise: Your trusty personal computer, smartphone and router won't be getting the Cyber Trust Mark either, at least not yet. The program is kicking off with wireless consumer IoT products, but who knows? It might grow to include more devices down the road. For now, NIST is cooking up some cybersecurity rules for those consumer-grade routers we all rely on.

So, while you might not see the Cyber Trust Mark on everything in your tech toolkit, it's a solid start in making our connected homes a bit safer from digital ne'er-do-wells.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

HACKED CHROME EXTENSIONS PUT 2.6 MILLION USERS AT RISK OF DATA LEAK

The U.S. Cyber Trust Mark is a game-changer for you and me as consumers in our hyper-connected world. Let's face it: Understanding device security can be a headache. But this program cuts through the tech jargon, giving us clear, easy-to-grasp info about the gadgets we're considering bringing into our homes.

How do you think the U.S. Cyber Trust Mark will impact your future purchasing decisions for smart home devices? Will you actively look for this label when shopping for new gadgets? Let us know what you think by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

10 tech upgrades to save your time, privacy and money this year

21 January 2025 at 14:44

At its best, today’s tech makes life easier. The trick is, you need to know the insider secrets. Luckily you have me. 

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

Here’s one to make your AI results better. With ChatGPT or any other, the more constraints you give, the better your answer. It’s called priming. Examples: "Limit your response to 250 words," "Give me the list in bullet points" and "Format the results as a table."

Sweet. Let’s keep going with 10 more tips and tricks.

5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER

1. Ctrl + Z (undo) isn’t just for Word docs

Did you accidentally delete an email, close a browser tab or move a file? Ctrl + Z on a PC (Cmd + Z on a Mac) is the universal lifesaver. Use it everywhere, from editing spreadsheets to undoing changes in most apps. It’s a superpower.

2. Screenshots for the win

Forget scrambling for a pen and paper — just take a screenshot! Whether it’s a recipe, directions or an annoying error message, capturing your screen can save time and frustration. On your PC, hold down your Windows key + Shift + S. On a Mac, it’s Cmd + Shift + 4.

I have more time-saving keyboard tricks here.

3. Use your voice more

You’ll be surprised by what you can tell your phone to do. For starters, forget fumbling for an app. Just say, "Hey, Siri, open Instagram" or, for Google Assistant, "Open Spotify." You can also tell your assistant to call someone in your contacts, set a reminder, take a photo, convert milliliters to ounces, turn on the flashlight, flip a coin — the list goes on.

Pro tip for voice texting: To delete the last word you dictated, say, "Delete the last word." To delete the last sentence, say, "Clear sentence." If you want to get rid of everything you just said, say, "Clear all."

DON’T SCAM YOURSELF WITH THE TRICKS HACKERS DON’T WANT ME TO SHARE

4. Because you never have a pen

Snap a pic with your phone’s camera, and you can copy, search or translate the text. On iPhone: Open the image in Photos. Tap and hold the text and select an option. On Android: Open a pic in Google Photos, then tap on the Lens icon. Select the text, then tap the action you want to take. 

Phone photos a mess? How to delete duplicates

5. Bring your old laptop back to life

Install ChromeOS Flex, a free, cloud-based operating system. With processing done on Google’s servers and a bare-bones interface, you’ll get surprisingly good performance. Your PC needs to meet these minimum specs: x64 CPU, 4GB of RAM, 16GB of storage and a USB port for installation.

6. Calling back a random number? 

Hide yours first. Punch in star, 6 and 7, followed by the number you’re calling, and that’s it. The caller will see "Private" or "Blocked." If you want your number hidden all the time, change the settings on your smartphone. On an iPhone, tap Settings > Phone > Show My Caller ID. Toggle it Off. On Android, the option is called Hide Number.

7. Instant podcasts about anything

Google’s NotebookLM lets you upload audio files, notes, documents or anything else, then search them, find citations (from your own docs) or produce a snazzy podcast you can listen to. It’s impressive. Reader Bob told me after he heard about it on my show, he used it to create training modules for his employees.

Grandfluencers: Folks trading retirement for internet fame

8. Track the kids

Apple AirTags (iOS) or Tile trackers (Android) let you keep tabs on your little ones. Attach a tracker to their backpack, shoelaces or belt loop. Pro tip: At somewhere very public, like a Disney park, give your child’s tracker a unique name, like "Buzz Lightyear." That way, if someone gets a "Tracker Nearby" alert, your child’s name won’t pop up.

9. Every mail has its day

It’s a game-changer for staying organized. In Apple Mail on your iPhone or iPad, compose your email as usual, then tap and hold Send. You’ll see options like "Send Later," where you can select a specific date and time for delivery. In Gmail, after drafting your email, click the small arrow next to the Send button and select Schedule Send.

10. Stop getting lured in at the grocery store

With an Amazon Prime account, you get access to a rotating library of popular magazines for free. Check them out here. Now you can read the latest weird royal rumors without paying for the magazine.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

Does your Windows 11 PC keep restarting? Let's fix that frustrating problem

21 January 2025 at 10:00

Experiencing a Windows 11 boot loop can be incredibly frustrating, transforming your computer into a seemingly endless cycle of restarts that disrupts productivity. When your system continuously fails to load the login screen and instead repeatedly attempts to restart, you're facing a critical technical issue that demands immediate attention.

This persistent reboot problem can stem from various causes. So, what do you do? Let's look at some ways to diagnose and resolve the Windows 11 boot loop, helping you restore your computer's functionality and get back to work.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

There's no single cause for a Windows 11 PC getting stuck in a reboot loop. A reboot loop can be caused by an issue with your computer's power supply, a malware infection, overheating or even hardware drivers. Here are the different things to check if your Windows 11 laptop or desktop keeps restarting.

When you are troubleshooting any problem on your PC, you should boot your computer in safe mode. If your PC is in safe mode and no longer experiences the restart loop, this means that the default Windows 11 settings and drivers aren't causing the issue. This allows you to narrow down the sources of problems causing your Windows 11 PC to crash, making it easier to troubleshoot. Here's what you need to do to boot in safe mode:

When your computer restarts, it will automatically restart in safe mode. If your computer restarting is making it difficult to follow these steps, you can also follow these steps at the sign-in screen:

Now, when your PC restarts, you will be presented with a list of options. Select or F4 to start your PC in safe mode. If you need to use the internet while the computer is in safe mode, you can select option or press F5.

WINDOWS 11 TIPS AND TRICKS YOU DIDN'T KNOW YOU NEEDED

If your automatic rebooting problem began after installing a new app, uninstall that app and monitor your PC. If you still notice your PC restarting, there's a chance that the app has infected your system settings before you uninstalled it. To fix this, you'll need to restore the system. To do a system restore, you should first boot your PC in safe mode and then follow these steps:

An overheating laptop or desktop will try to prevent damage to critical hardware components by shutting itself down. This is one of the leading causes of a Windows 11 PC getting stuck in a restart loop. If you've noticed your desktop giving off a lot more heat than usual or a laptop feeling hot to the touch, chances are you have an overheating issue.

A computer's CPU and GPU generate the most heat, so I recommend monitoring those hardware pieces to see if they are overheating. You don't need any additional software to monitor the temperatures of your GPU, as some temperature readings are built into Windows 11. Here's how to check your hardware temperatures in Windows 11:

Unfortunately, the built-in temperature reading doesn't read your CPU temperature, and you'll need to manually go into the UEFI/BIOS to check the temperature without installing any additional software. However, there's a multitude of free-to-use apps that manufacturers have developed to measure your CPU temperature, including Core Temp, HWMonitor or Open Hardware Monitor.

When you open one of these monitoring tools, you'll be able to view your PC's stats, including CPU and GPU temperatures and loads. If your CPU or GPU is running too hot, try cleaning the components to remove dust. For custom-built desktops, adding more exhaust fans to the case can improve airflow and cooling. Persistent overheating, especially in older laptops, may indicate that it's time to consider upgrading your machine.

TAKE YOUR WINDOWS PC'S SECURITY TO THE NEXT LEVEL

A computer will randomly restart when it has a failing power supply unit (PSU). If you have an issue with your power supply, you'll know if your computer won't restart or turn on. In addition to causing shut-offs and restart loops, a faulty power supply can also cause a blue screen of death error. In severe cases, you might even smell a burning scent or witness smoke coming from your PC's power supply exhaust vent. If you use a laptop with PSU issues, you cannot send your computer to a repair shop or the manufacturer for repair.

Desktop PC owners have it a bit easier, assuming they have a pre-built PC that can be altered easily. If you do have a desktop, turn off and unplug your computer before going into the case to investigate if dust build-up is affecting your PSU. If your PSU fails, you must purchase and install a new one.

Malware and other viruses are a common cause of a crashing or constantly restarting PC. The easiest way to do this is by using strong antivirus software. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

If your computer is stuck rebooting, you may need to boot in safe mode in order to run an antivirus application. Here's what you need to do to boot your PC in safe mode with Windows 11:

Now, your computer should act more stable after booting in safe mode, allowing you to run an antivirus scan.

10 USEFUL WINDOWS KEYBOARD SHORTCUTS YOU NEED TO KNOW

If you have automatic restart enabled in Windows 11, your PC will restart every time it encounters a system failure. You can easily disable this future within the Windows 11 command prompt. Here's what you need to do:

Keep in mind this isn't a fix for the problem, but it will help you further troubleshoot the restart loop problem by disabling automatic restarts.

An issue with your Windows 11 system files may be causing your PC to constantly restart. If you think a corrupted system file is why your PC keeps restarting, there's a quick and easy fix you can do within the Windows Powershell. The System File Checker (SFC) is a built-in tool that will scan your Windows system files for corruption or any other changes. If a system file has been modified, it will automatically replace the file with the correct version. Here's how to run the SFC command:

If there's no problem with your Windows system files, after the scan, you'll see a message that says, "Windows Resource Protection did not find any integrity violations." If you instead see a message saying, "Windows Resource Protection found corrupt files but was unable to fix some of them," you should try running SFC again but in safe mode.

Your PC might be restarting itself because it doesn't have access to enough random access memory (RAM). Windows 11 may become unstable without enough RAM in your computer, causing the OS to randomly reboot. You can use the built-in Memory Diagnostics Tool in Windows 11 to check your computer for issues related to RAM. Here's what you need to do:

When your PC restarts, the Windows Memory Diagnostics Tool will check for any RAM-related issues; if the test detects an error, take note of the error code. You can check the error code online to find the correct fix for that specific error.

These are the best fixes for a computer that is constantly restarting. While you can perform these fixes at home, it might be your best bet to send your computer to a repair shop or back to the manufacturer if you continue having an issue with your Windows 11 PC being stuck in a restart loop after these fixes. It also may be time to invest in a new laptop if you are experiencing a system slowdown and random restarting on your Windows 11 PC, but I would recommend trying to fix the problem first before buying a new machine.

What was the most challenging computer technical issue you've ever encountered, and how did you resolve it? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Sony’s surprising entry into electric vehicle market

21 January 2025 at 06:00

Sony has officially entered the electric vehicle (EV) market with its new model, the Afeela 1. This innovative vehicle, developed in partnership with Honda, aims to redefine the driving experience by integrating advanced technology and entertainment features. Unveiled at CES 2025, the Afeela 1 is now available for preorder, marking a significant milestone in Sony's expansion beyond consumer electronics into the automotive industry.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Equipped with a powerful 482 hp all-wheel-drive powertrain, the Afeela 1 features a 91 kWh battery that offers an EPA-estimated range of 300 miles. It supports fast charging at 150 kW and is compatible with Tesla's Supercharger network, providing convenience for long-distance travel.

 EV PARADISE OR CHARGING HELL? ALARMING ELECTRIC CAR SECRET EXPOSED

The Afeela 1 boasts an impressive array of 40 sensors and cameras, enabling Level 2+ ADAS features. These systems include lidar assistance for tasks like automated parking and real-time environmental monitoring. The vehicle's AI processing capabilities allow it to perform up to 800 trillion operations per second, paving the way for future updates that may enhance its autonomous driving capabilities.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

Sony emphasizes creating an interactive experience within the Afeela 1. The car features:

Moreover, certain functionalities will be available through a subscription model after an initial three-year complimentary period.

IS THIS PINT-SIZED VEHICLE ABOUT TO BE A BIG DISRUPTOR IN THE US?

The design of the Afeela 1 focuses on comfort and aesthetics. Its interior is crafted from high-quality materials, including plant-derived and recycled components. The cabin is optimized for entertainment, featuring strategically placed displays and noise-canceling technology to enhance the passenger experience.

SETTING UP APPLE CARPLAY ADAPTERS: STEPS AND TOP RECOMMENDATIONS

The Afeela 1 is available in two trims: the Origin, which starts at $89,900, and the Signature, priced at $102,900. Currently, preorders are open exclusively for California residents, requiring a refundable reservation fee of $200. The Signature variant is expected to ship in mid-2026, while the Origin will follow in 2027.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Sony's entry into the electric vehicle market with the Afeela 1 represents a significant shift towards integrating technology and mobility. With its high-performance specs, advanced driver assistance systems and focus on entertainment, it aims to appeal to tech-savvy consumers looking for more than just transportation.

What features are most important in an electric vehicle, and how will that affect your decision to purchase one? Let us know what you think by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

❌
❌