Normal view

There are new articles available, click to refresh the page.
Yesterday — 3 December 2024Main stream

Windows 7 in 2024: The hidden dangers of clinging to the past

3 December 2024 at 10:00

Computers are a significant investment, especially for those on fixed incomes. Fortunately, with proper care and maintenance, older computers can remain secure and functional for years. Let's address a concern from Connie in Rochester, Minnesota, who wrote to us about her older computer's vulnerability to hackers:

"I'm still using Windows 7 on my 2013 computer. It says I have Security Essentials, but I saw somewhere that it ended in 2023? When I click on it, it says it's scanning, but am I protected or not? I pay yearly for MSN extra and use an iPhone 14. All the worrisome reports make a senior citizen a little nervous. What's your advice? A new computer? Will your virus protection be compatible with my old computer? I'm not keen on spending more on a new computer on a fixed budget."

This question is relevant to many users with older computers. Let's dive deeper into the situation and provide some comprehensive advice for Connie and others in similar situations.

I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS - Ends today at 3 pm ET

Enter by signing up for my free newsletter.

Using Windows 7 does pose significant security risks. Since Jan. 14, 2020, Microsoft has stopped providing security updates and technical support for Windows 7. This means that any new vulnerabilities discovered in the operating system will not be patched, leaving your computer exposed to potential attacks.

Since the start of 2023, 47 vulnerabilities have been discovered in Windows 7. Cybercriminals actively target outdated operating systems because they're more likely to be unpatched and vulnerable. Without official support, Microsoft is no longer compelled to disclose formal vulnerabilities, making it harder for users to stay informed about potential security risks.

Connie, you mentioned that you have Microsoft Security Essentials installed. Unfortunately, this software also stopped receiving updates on January 14, 2020. While it may still scan your computer, it's not providing up-to-date protection against new threats.

TOP WAYS TO OPTIMIZE YOUR PC AND MAC DEVICES

Given the security risks, it's advisable to take action. Here are some options to consider:

1) Upgrading your operating system or computer: While it’s possible to continue using Windows 7 with a third-party antivirus, it’s generally recommended to upgrade to a newer operating system for the best security. If your current computer meets the system requirements, you could consider upgrading to Windows 10 or even Windows 11. However, if a new computer isn’t in your budget right now, using a supported antivirus on your Windows 7 machine is a good step.

2) Install strong antivirus software: If upgrading isn't possible immediately, install a strong, reputable, up-to-date antivirus software that's compatible with Windows 7. However, keep in mind that this is a temporary solution and doesn't address all the vulnerabilities in the operating system itself. There are several antivirus programs that continue to support Windows 7. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Consider a new computer: While it's understandable that you're on a fixed budget, investing in a new computer might be the most cost-effective solution in the long run. New computers come with the latest operating systems and security features, providing better protection against current threats. You can see our picks for a variety of laptop computers and desktop computers (at a variety of price ranges). If you decide to upgrade and get a new computer, check out how to securely get rid of your old PC or Mac.

HOW TO SAFEGUARD YOUR OLDER PC

You might be wondering if it's really that dangerous if you're careful about what you download. The truth is, even if you're cautious, you're still at risk. Modern malware can be incredibly sophisticated. There's a type of threat called a "persistent threat" that can hide on your machine indefinitely, continuously monitoring your computer and stealing information without you even knowing it.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Let's address two other points you made in your email to us. Your iPhone 14 is not affected by the Windows 7 issue. Apple regularly updates its iOS software, providing security patches for supported devices. So, make sure your iPhone's software is up to date to ensure you have the latest security features. Here's how:

As for MSN Extra, while it may provide some additional features, it doesn't compensate for the lack of operating system security updates.

10 TIPS TO SPEED UP YOUR PC'S PERFORMANCE

Look, Connie, I know all this tech stuff can be overwhelming, but here's the deal: While we can't make your computer 100% hacker-proof, these steps will definitely up your security game. Keep your eyes peeled when you're checking emails or downloading stuff, especially if it's from someone you don't know. Now, about getting a new computer. I get it, it's not cheap. But think about it this way: It's like insurance for your digital life. The headache and costs of dealing with a hacked computer? Trust me, that's way worse. In this day and age, when we're all connected 24/7, keeping your digital self safe is super important. So, if you can swing it, seriously think about upgrading your system or getting a new computer with all the latest security bells and whistles. Bottom line? Taking these steps isn't just about protection. It's about giving yourself peace of mind every time you hop online. And let's face it, that's pretty priceless.

What are your biggest challenges when it comes to maintaining your devices and why? Share your tech hacks by writing to us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Robotic shorts give your legs a boost to walk farther and tire less

3 December 2024 at 06:00

Imagine slipping on a pair of shorts that could make walking feel like a breeze, almost as if you've instantly shed 20 pounds. Sounds too good to be true, right? Well, get ready to have your mind blown! Scientists at the Technical University of Munich have cooked up something that might just change the game for anyone who's ever wished walking was a little easier.

They call it the WalkON system, a pair of high-tech shorts that's not your average gym wear. These bad boys can cut down the energy you need for a stroll or jog by up to 18%! Whether you're a spring chicken or in your golden years, these shorts could be a game-changer, especially if stairs have become your nemesis or long walks leave you winded.

I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS - Ends today at 3 pm ET

Enter by signing up for my free newsletter.

The WalkON system combines sensors, artificial tendons and smart motors to enhance your natural walking motion. It starts with advanced sensors embedded in the shorts that continuously monitor the stress on your tendons. These sensors are incredibly precise, picking up on subtle changes in your movement, including how fast you’re walking and the angle of your hips.

Connected to these sensors are two thin artificial tendons that extend from your thighs to a specially designed waist belt. These tendons play a crucial role in how the system assists you. When you start to walk, the shorts analyze your gait pattern and can even detect the moment you transition from standing to walking. As each leg enters the "swing phase," the system knows exactly when to kick in.

At just the right moment, small but powerful motors activate and gently pull on the artificial tendons. This action helps lift your thigh, reducing the effort needed by your hip flexor muscles, making it feel much easier to move. What’s really impressive is how adaptable WalkON is; whether you prefer a slow stroll or a brisk jog, the system adjusts its level of assistance based on your speed and leg weight. All of this happens seamlessly, so you experience a natural enhancement to your movement rather than feeling like you’re being pushed or pulled by a machine.

KURT’S BEST HOLIDAY DEALS

Best gifts for MenWomenKidsTeensPet lovers

EXOSKELETON HELPS PARALYZED PEOPLE REGAIN INDEPENDENCE

The WalkON system significantly reduces energy expenditure by 18% for young people walking uphill. For older individuals walking on level ground, it decreases energy expenditure by 10%. This reduction in energy expenditure is equivalent to the feeling of instantly losing 22 pounds or 13 pounds, respectively. The system allows you to walk slowly or jog, providing versatility in movement. Participants in tests reported high satisfaction with the device, giving it a mean rating of 6 out of 7 for its ability to assist while maintaining a sense of control.

COULD THESE EXOSKELETON 'POWER PANTS' MAKE OUTDOOR ACTIVITIES EASIER IN THE FUTURE?

The WalkON system can benefit anyone seeking to increase their mobility; however, it shows particular promise for older adults who may experience declining physical capabilities. Additionally, individuals weakened by illness can find significant advantages in using WalkON to enhance their mobility and independence. Furthermore, the device is designed for those looking to maintain an active and healthy lifestyle, making it a versatile solution for a wide range of users.

WEARABLE EXOSKELETON CAN TURN YOU INTO A SUPERHUMAN ATHLETE

Unlike traditional rigid exoskeletons, WalkON's soft, flexible design offers several advantages over its more cumbersome counterparts. Conventional exoskeletons often feature rigid frames that can be difficult and time-consuming to put on, limiting their practicality for daily use.

In contrast, WalkON's soft robotic shorts can be put on quickly and easily, similar to regular clothing, and are more than a mechanical device. Professor Lorenzia Masia, the lead researcher, aptly compares WalkON to an electric bike for walking. This analogy highlights the system's ability to enhance natural movement without overpowering it, making mobility more accessible and appealing to a wider range of users. The lightweight, tendon-driven design of WalkON allows for a more natural range of motion, adapting to the user's movements rather than constraining them.

Furthermore, WalkON's compact and unobtrusive nature addresses a common concern with exoskeletons: social acceptance. Its design allows it to be worn discreetly under regular clothing, potentially increasing user comfort in social situations. This feature, combined with its efficiency in reducing metabolic cost, positions WalkON as a more practical solution for everyday use compared to bulkier exoskeleton systems.

Given the current stage of development and testing, it's likely that WalkON could be available to you within the next three to five years, pending further research and regulatory approvals.

While no exact price point is yet available, we can compare it to other assistive technologies. Current exoskeletons can cost anywhere from $40,000 to $100,000-plus. However, given WalkON's simpler design and intended widespread use, it's possible that it could be priced more affordably, perhaps in the range of $5,000 to $15,000 when it first hits the market. As with many technologies, the price could decrease over time as production scales up.

The WalkON system's potential to enhance mobility for people of all ages, particularly older adults and those with health challenges, is immense. By making movement easier and more efficient, WalkON could encourage more active lifestyles, potentially improving overall health and quality of life for many individuals. While questions about availability and cost remain, the development of WalkON is a promising sign that we're moving towards more accessible and user-friendly mobility assistance solutions.

If you could design your own mobility assistance device, what features or capabilities would you include and why? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

This crime shot up 400% — how to protect yourself

2 December 2024 at 15:31

To keep you and your money safe, I make it a point to always let you know about spreading scams, from crypto catfishing to AI deepfakes. I bet you’re going to be surprised by this news: The crime that shot up 400% last year is old-school check fraud.

We’re giving away a $500 Amazon gift card. Enter to win now. No purchase necessary.

It’s not high-tech, but it is highly effective. In 2023, check scammers stole $26.2 billion from Americans like you and me, right out of our mailboxes. You need to make sure you don’t become a statistic.

HOW TO (KINDLY) ASK PEOPLE NOT TO POST YOUR KIDS' PHOTOS ON SOCIAL MEDIA

Scammers coordinate in private groups on Telegram, Facebook or TikTok to share tips and sell tools that make it easy for scams to spread. One of their tricks? Buying universal keys that can open any USPS drop box or snapping up books of blank checks from the Dark Web.

But plenty of crooks just swipe checks right from your mailbox. Then, they use simple household chemicals like acetone to dissolve the ink and write themselves (or their alias) some spending money.

Fraudsters deposit their haul at an ATM or right from their couch through a banking app, then they withdraw the cash in chunks so it doesn’t trigger alerts. Before you or your bank know it, they’re on their way to the casino, buying designer goods or investing in real estate — you name it.

RELATED: 563,588 people start their day with this free tech newsletter.

Banks are cracking down on fraud with stricter deposit policies and extended hold times on deposits. So, if you’ve noticed your funds aren’t clearing as fast as they used to, it’s because banks are taking extra time to verify deposits for potential fraud.

A recent viral TikTok glitch exploited J.P. Morgan's instant access feature for deposits from bad checks. Scammers flooded in, and many ended up being sued — proof crime doesn’t pay.

SMARTPHONE TRICKS EVERY IPHONE AND ANDROID USER SHOULD KNOW

If any of your checks go missing or you suspect fraud, file a report immediately — not just with your bank, but also with USPS and your local police department. Be sure to ask for a case number so you can track the progress of your claim.

The biggest checkwriters are baby boomers. They don’t like change.

SHARING IS NOT ALWAYS CARING: 7 DANGEROUS THINGS TO POST ONLINE

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

Data broker blunder: More than 600,000 sensitive files exposed in data services leak

2 December 2024 at 10:00

There are companies whose entire business model is built around collecting personal data, including criminal records, employment details, addresses and more. They use this data to offer background check services to other businesses and individuals. However, while they profit from this information, they often fail to adequately protect it. Earlier this year, the National Public Data made headlines for failing to secure 2.7 billion records of people whose data it collected. Now, on a smaller scale, another data aggregator has exposed the personal information of 600,000 Americans.

ENDS TOMORROW: I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Enter by signing up for my free newsletter.

As reported by Website Planet, the exposed database contained 644,869 PDF files, totaling 713.1 GB of sensitive data. These documents mainly consisted of background checks but also included court records, vehicle ownership details such as license plates and VINs, and property ownership reports. The background checks alone revealed highly sensitive personal data, including full names, home addresses, phone numbers, email addresses, employment details, information about family members, social media accounts and criminal histories.

The worst part is that the database was left publicly accessible without password protection or encryption, allowing anyone to grab it. Anyone with the link could view and download the files. Plus, the files were named in a way that exposed personal details, using formats like "First_Middle_Last_State.PDF." This made sensitive information visible even without opening the files.

HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS

The database that exposed over 600,000 records belongs to SL Data Services LLC, an information research provider that appears to prioritize convenience over basic data security. The company operates a sprawling network of around 16 websites, including Propertyrec, which advertises real estate ownership data and property records. However, SL Data Services’ business goes far beyond property records, offering services like criminal background checks, DMV records and even birth and death records.

While Propertyrec promotes its affordability, claiming users can search for documents for as little as $1, customer reviews paint a different picture. Many users report being unknowingly enrolled in subscription services, resulting in recurring charges instead of the promised one-time fees. This predatory business practice raises further questions about the company’s ethics and transparency.

BEWARE OF ENCRYPTED PDFs AS LATEST TRICK TO DELIVER MALWARE TO YOU

The exposure of sensitive personal info in this breach is a big deal for the people involved. The database has detailed data about them, and that’s basically a jackpot for cybercriminals. This kind of leak can lead to various dangerous outcomes. 

For one, attackers could use this info to run phishing scams or social engineering tricks. If they know details like your job, family or even criminal history, they can send super convincing messages to trick you into sharing even more sensitive details, like your financial info. That’s not all. Criminals could also use this leaked data to impersonate someone and apply for loans, credit cards or other services in their name.

What really gets me, though, is that most people whose info got leaked probably won’t even find out about it unless they’re using a service to remove their data. A lot of them might not have even known they were being background-checked in the first place. For those with criminal records, this kind of leak could cause major reputational damage or lead to discrimination, even if the info is outdated or flat-out wrong.

We reached out to SL Data Services/Propertyrec for a comment but did not hear back before our deadline.

1) Remove your personal information from the internet: While no service can promise to completely erase your data from the internet, using a data removal service is one of the best steps you can take. They do the heavy lifting by actively scanning and removing your personal information from hundreds of websites. This helps protect you from scammers who may cross-reference data from breaches with other information they find on the dark web. Check out my top picks for data removal services here.

2) Be wary of mailbox communications: With your address exposed, bad actors could try to scam you through physical mail. They may impersonate companies or people you trust and send fake urgent letters about things like missed deliveries, account suspensions or security alerts. Be skeptical of unexpected communications and verify any claims before taking action.

3) Be cautious of phishing attempts and use strong antivirus software: The leaked data could lead to phishing attacks via email, phone calls or messages from unknown sources. Be on high alert for any requests for personal information, especially if they seem urgent or ask you to click on suspicious links. Always verify the legitimacy of any request before responding.

To protect your devices from malicious links, make sure you have strong antivirus protection. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4) Monitor your accounts: Given the scope of this breach, it’s crucial to start regularly reviewing your bank accounts, credit card statements and other financial accounts. Keep an eye out for any unauthorized transactions and report them immediately to your bank or credit card company to prevent further damage.

5) Use strong, unique passwords: Create complex passwords for each of your online accounts and consider using a password manager to keep track of them securely.

6) Enable two-factor authentication (2FA): Implement this extra layer of security on all accounts that offer it to prevent unauthorized access.

7) Regularly update your software: Keep your operating system, apps and security tools up to date to protect against known vulnerabilities.

WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED

It’s alarming how many companies profit from collecting personal data, yet fail to protect it adequately. Recent breaches, including one exposing the sensitive information of 600,000 Americans, highlight this negligence. With unprotected databases containing everything from criminal records to addresses, cybercriminals have a treasure trove of information to exploit. This situation underscores the urgent need for you to take proactive steps to safeguard your privacy and demand better security practices from these data aggregators.

Should companies face stronger penalties for failing to protect personal data? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Try CyberGuy's new games (crosswords, word searches, trivia and more!)

Enter CyberGuy's $500 Holiday Gift Card Sweepstakes

Kurt’s Best New Cyber Monday Deals

Copyright 2024 CyberGuy.com. All rights reserved.

Is your friend's phone number compromised? Here's what to look for

2 December 2024 at 06:00

Phone hacking is a bigger deal than most of us realize, and it's something we all need to be aware of. Just the other day, Dennis sent an email sharing that he had a pretty unsettling experience with a suspicious text message that seemed to come from a friend's number. His story is a wake-up call for all of us to stay alert and informed. By understanding the signs of potential hacking, we can better protect ourselves and our loved ones from cyber threats.

ENDS TOMORROW: I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Enter by signing up for my free newsletter.

Dennis received a text from a friend that was unusually brief and out of character, simply asking, "Would you like to chat?" This raised immediate concerns, especially since the number appeared to be his friend's but wasn't recognized by Messenger as being in his contact list. Such scenarios often suggest phone number spoofing or hacking, where cybercriminals disguise their identity by using someone else's number.

HOW TO STOP ANNOYING ROBOCALLS

Understanding the signs of a compromised phone number is crucial for protecting your personal information and that of your friends. Here are some indicators that your friend's number might be hacked:

Unusual messages: If your friend starts sending texts that seem out of character – such as odd phrasing, unexpected links or requests for personal information – it could indicate their number has been hacked.

Unknown contacts: If Messenger says the number is not in your contact list when it actually is, it might indicate a problem.

Unexpected phone behavior: If your friend mentions their phone is acting strangely, they should look out for:

Unauthorized charges: If your friend’s phone bill shows unexpected charges, it can result from premium SMS services or calls made by malicious apps.

Spam sent from your friend's number: If you or other contacts receive spam or suspicious messages from your friend's number, it's a strong sign that their phone might be compromised.

KURT’S BEST NEW CYBER MONDAY DEALS

WHY AM I GETTING SPAM FROM MY OWN EMAIL ADDRESS AND HOW TO STOP IT

If you suspect your friend's phone number has been hacked, consider these actions:

1) Verify with your friend: Contact them through another method to confirm if they sent the message.

2) Check for malware using strong antivirus software: Advise your friend to use strong antivirus software to scan for malicious apps or malware on the device. The best way for them to safeguard from malicious links that install malware, potentially accessing their private information, is to have antivirus software installed on all their devices. This protection can also alert them to phishing emails and ransomware scams, keeping their personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Change passwords: If your friend suspects their phone number has been hacked, they should change their passwords for all accounts linked to their phone number. They should consider using a password manager to generate and store complex passwords.

4) Contact service provider: Your friend should contact their mobile service provider to report the issue. The provider can help secure their account and prevent further unauthorized access.

5) Enable two-factor authentication: Encourage your friend to enable two-factor authentication nn their accounts for added security.

6) Monitor accounts: Advise your friend to regularly check their bank statements and credit reports for suspicious activity.

Phone hacking is a bigger issue than most people realize, and Dennis's recent experience is a stark reminder of that. It's crucial for all of us to stay vigilant and informed about the signs of potential hacking. By recognizing these warning signs and taking proactive steps, we can better protect our personal information and our loved ones from cyber threats.

Have you ever experienced a suspicious message or a potential hacking incident? Share your story with us and let us know how you handled it by writing to us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Try CyberGuy's new games (crosswords, word searches, trivia and more!)

Enter CyberGuy's $500 Holiday Gift Card Sweepstakes

Kurt’s Best New Cyber Monday Deals

Copyright 2024 CyberGuy.com. All rights reserved.

9 ways scammers can use your phone number to try to trick you

1 December 2024 at 10:00

Scammers have various methods when it comes to getting their hands on your phone number. You might think, "Well, what's the big deal? Isn't it easy to find someone's number these days, no matter what?" Yes. And if you've already had your fair share of telemarketers call you, maybe you feel like you've got it under control.

The problem is that scammers with the right knowledge and the wrong intentions can wreak havoc just by having your phone number in their possession. 

Once they do, they can use it to trick you in all sorts of ways. 

The good news is that by familiarizing yourself with their tactics, you can be one step closer to preventing yourself from falling victim to them. Here's what you need to know.

2 DAYS LEFT! I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS (Ends 12/3/24, 12 pm PT)

In today’s digital age, your phone number is more than just a way for friends and family to reach you. It can be a gateway for scammers to access your personal information and wreak havoc on your life. From phishing attempts to extortion, the risks are numerous and varied. Here are nine ways scammers can exploit your phone number if it falls into the wrong hands:

Scammers can also use your phone number to launch rather easy phishing attacks. They might send text messages or make calls posing as your bank or a popular online service that you subscribe to. The goal is to call you and trick you into providing login credentials, credit card details or other personal information, which they can then use for fraudulent activities. And once they have all your other information, they can do a lot more damage just by having your phone number as that initial segue.

In some cases, scammers use your phone number for extortion or blackmail. They may claim to have compromising information about you and demand payment to keep it private. By contacting you directly, they can apply continuous pressure, making their threats seem more real and immediate.

One unique way they do this to target elderly people is by pretending to be your grandchild or another relative in distress. The scammer often claims that your grandchild is in an emergency situation — such as needing bail money or medical assistance — and urgently requests financial help. With AI voice cloning technology, they may even be able to use your grandchild's voice. This emotional manipulation usually gets the victim to pay up.

This one may not be as dramatic, but your phone number can be sold to robocall and spam message services. These automated systems bombard you with unwanted calls and texts, often promoting scams or fraudulent products. While these may seem like minor annoyances, they can lead to bigger scams if you engage with the messages or follow their instructions. Hang up on them.

HOW TO STOP ANNOYING ROBOCALLS

Phone number spoofing is a common tactic where scammers disguise their caller ID to appear as a trusted contact by calling from what appears to be a familiar number as it may have the same area code where you live, an area code where your friends or family live or even the actual phone number of someone close which you can recognize.

This makes it more likely that you'll answer the call, giving them the opportunity to deceive you into revealing personal information or transferring money. This is, of course, the case when phone spoofing is used against you. But in situations where they use YOUR phone number, they can be scamming those close to you without you even knowing!

With these phone spoofing tactics, scammers can use your phone number to impersonate government officials, such as IRS agents or Social Security administrators. They may call you claiming there’s an urgent issue, like unpaid taxes or suspicious activity involving your Social Security number. This ploy often involves threats of legal action or arrest to pressure you into providing sensitive information or making immediate payments.

Instead of pretending to be from a government agency, another trick is for scammers to try their luck by posing as a representative from a utility company, like an electric or water company. Scammers will claim that you have an overdue invoice and threaten to cut off your service unless you pay immediately. Using your phone number, they can contact you repeatedly, making the scam seem more legitimate (and pressing).

SIM swapping or a port-out scam is when scammers transfer your phone number to a new SIM card in their possession. By convincing your mobile carrier to reroute your number, they can receive all your calls and messages, including those containing two-factor authentication codes. This allows them to bypass security measures and take over your online accounts.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

With SIM swapping techniques/port-out, scammers can also use your phone number as a key to access sensitive data stored in your online accounts. By initiating password resets and intercepting verification codes sent via SMS, they can gain unauthorized access to your email, social media and banking accounts, leading to significant personal and financial damage.

Finally, scammers can use all the tactics above to not only access the accounts you already have but also create fake online accounts in your name. These accounts can be used for a variety of malicious purposes, such as spreading malware, launching further scams or conducting identity theft. The presence of your phone number makes these accounts appear more legitimate, increasing the chances of deceiving others.

10 SIMPLE STEPS TO IMPROVE YOUR SMARTPHONE'S SECURITY AND PRIVACY

To protect your phone number from falling into the hands of scammers, here’s what you can do:

1. Be cautious about sharing your phone number publicly: Avoid posting your phone number on public forums, websites or social media platforms where it can be easily accessed by scammers.

2. Limit exposure of your phone number on social media and other online platforms: Use privacy settings to restrict who can see your contact information. Most social media platforms and online services offer privacy settings that allow you to control who can view your personal information. Make sure to review and adjust these settings regularly. Only share your phone number with trusted contacts.

3. Consider using a secondary number for online registrations and transactions: Services like Google Voice can provide you with a secondary number that you can use for online activities, keeping your primary number private.

4. Monitor your accounts regularly for unusual activity: Check your bank accounts, email and other online accounts for any signs of unauthorized access or suspicious activity.

5. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Use two-factor authentication apps instead of SMS-based verification where possible: Two-factor authentication (2FA) provides an extra layer of security that is more difficult for scammers to bypass compared to SMS-based verification.

7. Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

8. Remove your personal information from the internet: While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with the information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. 

GET FOX BUSINESS ON THE GO BY CLICKING HERE

If you suspect that scammers already have your phone number, take the following steps:

Contact your mobile carrier to alert them of the scam calls, especially if they come from the same number. Your carrier may be able to block the number or provide additional security measures.

Consider changing your phone number if the issue persists: If scam calls continue despite your efforts, changing your phone number may be the best solution.

Report any suspicious activity to the appropriate authorities: Contact your local law enforcement or consumer protection agency to report scams and seek advice on further actions.

Consider placing fraud alerts on your accounts: Fraud alerts can help protect your credit and financial accounts from unauthorized access.

Monitor your phone for unusual calls or messages: Keep an eye out for any unexpected calls or messages, and do not respond to them.

Check your phone bill for unauthorized charges: Regularly review your phone bill to ensure there are no unexpected charges, which could indicate that your number has been used fraudulently.

By following these steps, you can significantly reduce the risk of falling victim to phone number scams and protect your personal information.

RECLAIM YOUR PRIVACY BY DISABLING YOUR CELL PHONE CARRIER'S DATA TRACKING

Scams have become much more sophisticated these days, especially with artificial intelligence, making it easier for scammers to target more people and get away with it. Always be wary of a scam. If you think something seems strange, it's probably best to go with your gut.

Have you ever experienced a scam involving your phone number? If so, how did you handle it? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com.  All rights reserved.

No tennis partner? No worries with this AI robot

1 December 2024 at 06:00

Imagine having a personal tennis coach who never gets tired, always hits the perfect shot, adapts to your skill level and is available 24/7. 

Enter the PongBot, a groundbreaking artificial intelligence-powered tennis robot that's turning heads in the tennis world. 

This isn't just another ball-serving machine; it's a smart training partner designed to elevate your tennis game.

2 DAYS LEFT! I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS (Ends 12/3/24, 12 pm PT)

The PongBot comes with a clever clip-on sensor that tracks your position on the court. This sensor ensures that the PongBot can deliver shots tailored to your exact position, simulating the dynamic nature of a real tennis match. Additionally, this technology enables the AI match training feature to adjust ball speed and spin in real time, providing a highly immersive and challenging training experience.

DON'T HAVE ANYONE TO PLAY PING-PONG WITH? NO PROBLEM WITH THIS CREEPY COMPETITIVE ROBOT  

Want a personalized training experience? The PongBot app lets you create custom drills down to the individual ball level. Imagine programming a sequence like a deep forehand return, followed by a short backhand, two volleys and an overhead shot — all saved and ready for your next practice session. The PongBot offers up to 300 preprogrammed drills with three difficulty levels. Whether you're a beginner or a seasoned player, there's a drill that'll challenge you just right.

KURT’S BEST NEW BLACK FRIDAY DEALS EXTENDED

ROBOT DOG IS MAKING WAVES WITH ITS UNDERWATER SKILLS 

The real game-changer is the AI match training feature. The robot continuously reads your court position and analyzes your performance, adjusting ball speed and spin to simulate real match conditions. It's like having a smart opponent who knows exactly how to push your limits.

QUADRUPED ROBOT CLIMBS LADDERS, CREEPS US OUT  

The PongBot isn't just smart, it's powerful. It can serve balls at up to 80 mph with various spin types (topspin, underspin or no spin), reaching up to 60 rotations per second. With a ball capacity of 150 and a battery life of eight hours, you'll have plenty of time for an intense training session.

What truly sets the PongBot apart is its ability to integrate with the broader tennis technology ecosystem. It works seamlessly with smart devices like intelligent rackets and can sync performance data with the Apple Watch. The over-the-air updates promise continuous improvement, ensuring your training tool stays cutting-edge.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

The PongBot's journey began on Kickstarter, where it far exceeded its initial goal of just $10,000. This overwhelming support showcases not only the demand for innovative training solutions but also confidence in the creators behind this project. Early backers still have the chance to snag some fantastic deals. You can get the Pace S for about $699 or the Pro model for $899.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Despite some caution often associated with crowdfunding platforms, potential backers can feel secure in their investment here; the team behind PongBot has solid backing from Qualcomm and experience in creating impressive robotics technology. If everything goes according to plan, backers can expect their machines to ship by December — just in time for some serious off-season training.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

By combining AI, smart sensors and adaptive training modes, PongBot offers tennis players an unprecedented opportunity to improve their game. Backed by Qualcomm and created by robotics experts who've already impressed the tech world with ping-pong robots, the PongBot isn't just another crowdfunding project. It's a serious training tool for players who are serious about improving their tennis game.

Would you feel comfortable using a robotic training partner like the PongBot to enhance your tennis skills? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com.  All rights reserved.

Helpful Hack: Siri's new tricks, photo magic and writing help with iOS 18.1's new AI features

30 November 2024 at 10:00

Ready to make your iPhone even smarter? With the latest iOS 18.1 update, Apple Intelligence brings many powerful new features to your fingertips. 

Before you dive into these exciting tools, let’s get your device updated and set up. 

Don’t worry — it's a quick and easy process. And once you're all set, you'll be amazed at how these features can transform your day-to-day interactions with your phone. Let's get started.

3 DAYS LEFT! I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS (Ends 12/3/24 12 pm PT)

First things first, you'll need to update your iPhone to iOS 18.1 or later. Here's how:

Open the Settings app.

Tap General.

Select Software Update.

If iOS 18.1 or later is available, tap "Download and Install."

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

Once you're on iOS 18.1 or later, enabling Apple Intelligence is a breeze:

Go to Settings.

Tap Apple Intelligence & Siri.

Toggle on Apple Intelligence.

Your iPhone will then download the necessary AI models. You'll get a notification when it's ready to roll. Currently, Apple Intelligence is only available on iPhone 15 Pro, iPhone 15 Pro Max, and newer iPads and Macs with M1 chips or later.

WHICH IPHONE 16 IS RIGHT FOR YOU? DISCOVER YOUR PERFECT MATCH

Now for the fun part. Let's check out some of the coolest new features:

You can use Apple Intelligence to summarize messages and mail and get the key details at a glance. Here's how it works:

In your mail app, tap an email message or thread.

Now, tap the summarize button in the top right corner.

An animation appears as Apple Intelligence analyzes the text, and a summary will appear above the email.

IS IT TIME FOR ME TO UPGRADE TO A NEW IPHONE?

Siri's gotten a major upgrade and is now supercharged by Apple Intelligence. When you talk to Siri, you'll notice an elegant glowing light around the edge of your screen that shows that Apple Intelligence is working for you.

It now can handle those "umm" moments we all have. For example, try saying, "Hey Siri, set a 10-minute, no, 15-minute timer." Siri will understand and set the 15-minute timer.

If you don't want to ask Siri out loud, you can now type to Siri. Just double-tap at the bottom of the screen, and you can quickly and quietly type your Siri request.

Apple Intelligence has your back when it comes to writing. Here's how to use it:

Select any text in an email or document by double-tapping on the text and dragging the cursor over the text you want help with.

Then, the selection handles will appear. Tap the Writing Tools icon that appears above the selected text.

Choose from options like "Proofread," "Rewrite," "Friendly," "Professional," "Concise," "Summary," "Key Points," "List" or "Table." Here's what each does specifically:

Proofread: Checks for grammar and spelling errors.

Rewrite: Offers alternative phrasing for the selected text.

Friendly: Makes the text more casual and approachable.

Professional: Adjusts the tone to be more formal and polished.

Concise: Shortens the text to be more direct.

Summary: Provides a brief overview of the selected text.

Key Points: Highlights the main ideas.

List: Converts the text into a list format.

Table: Organizes the text into a table.

Once you've made your selection, you can either tap Done or Revert to what you had.

Your photo library just got a lot more searchable:

Open the Photos app.

Tap the search icon at the top of the screen.

Try natural language queries like "dog sitting on the couch."

Click Search, and you'll be amazed at how accurately it finds your photos.

Tap Done 

Want to remove unwanted objects from your photos? Here's how:

Open a photo in the Photos app.

Tap the Edit button below the picture.

Select the Clean Up tool in the bottom right of the screen.

Circle or tap the object you want to remove.

Apple Intelligence will work its magic to erase it seamlessly.

Then, click either done or cancel.

Create custom photo slideshows using natural language prompts. Here's how to use this feature:

Open the Photos app.

Scroll down to where it says Memories.

Click where it says Create to Create a Memory Movie.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Enter a text prompt describing the theme or content you want and then tap the up arrow.

Apple Intelligence will work its magic to Create a Memory Movie seamlessly.

Tap the three horizontal dots at the top of the screen to Edit Move Timeline, or you can tap Share Movie to share it via Messages, Mail or Social Media.

Tired of notification overload? Apple Intelligence now provides smart summaries for your emails and messages. Just swipe down from the top of your screen to see condensed versions of your notifications.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Remember, to access these features, you'll need a compatible device (iPhone 15 Pro, iPhone 16 series or newer iPads/Macs with M1 chips or later) running iOS 18.1 or later. You'll also need to enable Apple Intelligence in your device settings.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

While these features are exciting, Apple has even more in store. We're still waiting on some promised capabilities like emoji creation, image playground and ChatGPT integration. Apple hasn't given us a firm timeline, but stay tuned — the AI revolution on your iPhone is just getting started.

What feature of Apple Intelligence are you most excited to try out on your device, and why? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Try CyberGuy's new games (crosswords, word searches, trivia and more!)

Enter Cyberguy’s $500 Holiday Gift Card Sweepstakes

KURT’S HOLIDAY GIFT GUIDES 

Deals: Unbeatable Best Black Friday deals | Laptops | Desktops | Printers 

Best gifts for: Men | Women | Kids | Teens | Pet lovers 

For those who love: Cooking | Coffee | Tools | Travel | Wine

Devices: Laptops | Desktops | Printers | Monitors | Earbuds | Headphones | Kindles | Soundbars | Vacuums | Surge strips and protectors

Accessories: CarKitchen | Laptop | Keyboards | Phone | Travel | Keep It Cozy

Can’t go wrong with these: Gift Cards | Money-saving apps | Amazon Black Friday insider tips  

Copyright 2024 CyberGuy.com. All rights reserved.

Robots perform like human surgeons by just watching videos

30 November 2024 at 06:00

In a groundbreaking development, researchers at Johns Hopkins University (JHU) and Stanford University have successfully trained a robotic surgical system to perform complex tasks with the skill of human doctors. 

This achievement marks a significant step toward autonomous robotic surgery, potentially transforming the future of medical procedures.

The team utilized a da Vinci Surgical System, a robotic platform typically controlled remotely by surgeons. Using a machine learning technique called imitation learning, they trained the system to perform three critical surgical tasks: manipulating a needle, lifting body tissue and suturing.

3 DAYS LEFT! I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS (Ends 12/3/24 12 pm PT)

What sets this approach apart is the training method. Instead of painstakingly programming each movement, the robot learned by watching hundreds of videos recorded from wrist-mounted cameras on da Vinci robots during actual surgical procedures. This method allows the robot to learn from the collective experience of numerous skilled surgeons, potentially surpassing the capabilities of any single human operator.

KURT’S BEST NEW BLACK FRIDAY DEALS

 COULD YOUR NEXT PHYSICAL EXAM BE PERFORMED BY A ROBOT FINGER?

The researchers developed an AI model that merges imitation learning with the machine learning architecture used in popular language models like ChatGPT. However, this model operates in the language of robotics — kinematics — translating visual input into precise robotic movements. This sophisticated approach allows the system to understand and replicate complex surgical maneuvers with remarkable accuracy.

THE CREEPY YET HELPFUL HUMANOID ROBOT READY TO MOVE INTO YOUR HOME

The surgical system not only executed tasks as proficiently as human surgeons but also demonstrated the ability to correct its own mistakes. As Axel Krieger, assistant professor at JHU, noted, "Like if it drops the needle, it will automatically pick it up and continue. This isn't something I taught it to do." This level of autonomy and adaptability is crucial in surgical settings where unexpected situations can arise. The robot's ability to problem-solve and adjust its actions in real time could potentially reduce complications and improve patient outcomes.

ROBOTS GET A FEEL FOR HUMAN TOUCH, NO ARTIFICIAL SKIN REQUIRED 

This breakthrough could significantly speed up the development of autonomous surgical robots. Traditional methods of programming robots for surgery are time-consuming and limited in scope. With this new approach, Krieger explains, "We only have to collect imitation learning of different procedures, and we can train a robot to learn it in a couple days." This rapid learning capability opens up possibilities for quickly adapting surgical robots to new procedures or techniques, potentially revolutionizing the field of robotic surgery.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

The JHU team is now working on expanding this technology to train robots to perform complete surgical procedures. While fully autonomous robotic surgery may still be years away, this innovation paves the way for safer and more accessible complex treatments worldwide. The ability to train robots on entire surgical procedures could lead to standardized, high-quality surgical care even in areas lacking specialized surgeons.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

By harnessing the power of AI and imitation learning, we're witnessing the birth of surgical robots that can learn and adapt much like human surgeons. As this technology continues to evolve, it holds the promise of reducing medical errors, increasing surgical precision, and potentially making advanced surgical procedures available to more patients globally. While there are still challenges to overcome, including ethical considerations and regulatory approvals, the future of AI-assisted and autonomous robotic surgery looks increasingly promising.

Would you feel comfortable undergoing surgery performed by a robotic system trained using AI and imitation learning? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Artificial intelligence changes across the US

29 November 2024 at 19:21

An increasing number of companies are using artificial intelligence (AI) for everyday tasks. Much of the technology is helping with productivity and keeping the public safer. However, some industries are pushing back against certain aspects of AI. And some industry leaders are working to balance the good and the bad.

"We are looking at critical infrastructure owners and operators, businesses from water and health care and transportation and communication, some of which are starting to integrate some of these AI capabilities," said U.S. Cybersecurity and Infrastructure Security Agency Director Jen Easterly. "We want to make sure that they're integrating them in a way where they are not introducing a lot of new risk."

US AGRICULTURE INDUSTRY TESTS ARTIFICIAL INTELLIGENCE: 'A LOT OF POTENTIAL'

Consulting firm Deloitte recently surveyed leaders of business organizations from around the world. The findings showed uncertainty over government regulations was a bigger issue than actually implementing AI technology. When asked about the top barrier to deploying AI tools, 36% ranked regulatory compliance first, 30% said difficulty managing risks, and 29% said lack of a governance model.

Easterly says despite some of the risks AI can pose, she said she is not surprised that the government has not taken more steps to regulate the technology.

"These are going to be the most powerful technologies of our century, probably more," Easterly said. "Most of these technologies are being built by private companies that are incentivized to provide returns for their shareholders. So we do need to ensure that government has a role in establishing safeguards to ensure that these technologies are being built in a way that prioritizes security. And that's where I think that Congress can have a role in ensuring that these technologies are as safe and secure to be used and implemented by the American people."

Congress has considered overarching protections for AI, but it has mostly been state governments enacting the rules.

"There are certainly many things that are positive about what AI does. It also, when fallen into the hands of bad actors, it can destroy [the music] industry," said Gov. Bill Lee, R-Tenn., while signing state legislation in March to protect musicians from AI. 

The Ensuring Likeness Voice and Image Security Act, or ELVIS Act, classifies vocal likeness as a property right. Lee signed the legislation this year, making Tennessee the first state to enact protections for singers. Illinois and California have since passed similar laws. Other states, including Tennessee, have laws that determine names, photographs and likenesses are also considered a property right.

"Our voices and likenesses are indelible parts of us that have enabled us to showcase our talents and grow our audiences, not mere digital kibble for a machine to duplicate without consent," country recording artist Lainey Wilson said during a congressional hearing on AI and intellectual property.

AI HORROR FLICK STAR KATHERINE WATERSTON ADMITS NEW TECH IS ‘TERRIFYING’

Wilson argued her image and likeness were used through AI to sell products that she had not previously endorsed.

"For decades, we have taken advantage of technology that, frankly, was not created to be secure. It was created for speed to market or cool features. And frankly, that's why we have cybersecurity," Easterly said.

The Federal Trade Commission (FTC) has cracked down on some deceptive AI marketing techniques. It launched "Operation AI Comply" in September, which tackles unfair and deceptive business practices using AI, such as fake reviews written by chatbots.

"I am a technologist at heart, and I am an optimist at heart. And so I am incredibly excited about some of these capabilities. And I am not concerned about some of the Skynet things. I do want to make sure that this technology is designed and developed and tested and delivered in a way to ensure that security is prioritized," Easterly said.

Chatbots have had some good reviews. Hawaii approved a law this year to invest more in research utilizing AI tools in the health care field. It comes as one study finds, OpenAI’s chatbot outperformed doctors in diagnosing medical conditions. The experiment compared doctors using ChatGPT with those using conventional resources. Both groups scored around 75% accuracy, while the chatbot alone scored above 90%.

AI isn’t just being used for disease detection, it’s also helping emergency crews detect catastrophic events. After deadly wildfires devastated Maui, Hawaii state lawmakers also allocated funds to the University of Hawaii to map statewide wildfire risks and improve forecasting technologies. It also includes $1 million for an AI-driven platform. Hawaiian Electric is also deploying high-resolution cameras across the state.

AI DETECTS WOMAN’S BREAST CANCER AFTER ROUTINE SCREENING MISSED IT: 'DEEPLY GRATEFUL'

"It will learn over months over years to be more sensitive to what is a fire and what is not," said Energy Department Under Secretary for AI and Technology Dimitri Kusnezov.

California and Colorado have similar technology. Within minutes, the AI can detect when a fire begins and where it may spread.

AI is also being used to keep students safe. Several school districts around the country now have firearm detection systems. One in Utah notifies officials within seconds of when a gun might be on campus.

"We want to create an inviting, educational environment that's secure. But we don't want the security to impact the education," said Park City, Utah, School District CEO Michael Tanner.

Maryland and Massachusetts are also considering state funds to implement similar technology. Both states voted to establish commissions to study emerging firearm technologies. Maryland’s commission will determine whether to use school construction funding to build the systems. Massachusetts members will look at risks associated with the new technology.

"We want to use these capabilities to ensure that we can better defend the critical infrastructure that Americans rely on every hour of every day," Easterly said.

The European Union passed regulations for AI this year. It ranks risks from minimal, which have no regulations, to unacceptable, which are banned. Chatbots are classified as specific transparency and are required to inform users they are interacting with a machine. Software for critical infrastructure is considered high risk and must comply with strict requirements. Most technology that profiles individuals or uses public images to build-up databases is considered unacceptable.

The U.S. has some guidelines for AI use and implementation, but experts say they believe it will not go as far as the EU classifying risks.

"We need to stay ahead in America to ensure that we win this race for artificial intelligence. And so it takes the investment, it takes the innovation," Easterly said. "We have to be an engine of innovation that makes America the greatest economy on the face of the earth."

❌
❌