Normal view

Before yesterdayTechnology News Articles on Fox News

Screenshot-scanning malware discovered on Apple App Store in first-of-its-kind attack

13 February 2025 at 09:00

Every tech expert will tell you the App Store is safer than Google Play Store. Some might even claim it is impossible to download a malicious app from the App Store, but they are wrong. 

While I admit the App Store is a secure and tightly controlled ecosystem, it cannot completely shield you. Security researchers have found that hackers are targeting several apps on the App Store to spread malware that steals information from screenshots saved on a device. 

The issue also affects those downloading apps from the Google Play Store.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

According to researchers at Kaspersky, this malware campaign is more advanced than typical info stealers, both in how it works and how it spreads. Instead of relying on social engineering tricks to get users to grant permissions like most banking trojans or spyware, this malware hides inside seemingly legitimate apps and slips past Apple and Google’s security checks.

One of its standout features is Optical Character Recognition. Instead of stealing stored files, it scans screenshots saved on the device, extracts text and sends the information to remote servers.

Once installed, the malware operates stealthily, often activating only after a period of dormancy to avoid raising suspicion. It employs encrypted communication channels to send stolen data back to its operators, making it difficult to trace. Plus, it spreads through deceptive updates or hidden code within app dependencies, an approach that helps it evade initial security screenings by app store review teams.

The infection vectors vary between Apple and Google’s ecosystems. On iOS, the malware is often embedded within apps that initially pass Apple’s rigorous review process but later introduce harmful functionality through updates. On Android, the malware can exploit sideloading options, but even official Google Play apps have been found to carry these malicious payloads, sometimes hidden within SDKs (software development kits) supplied by third-party developers.

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

The scope of stolen information is alarming. This malware primarily targets crypto wallet recovery phrases but is also capable of exfiltrating login credentials, payment details, personal messages, location data and even biometric identifiers. Some versions are designed to harvest authentication tokens, allowing attackers to access accounts even if users change their passwords.

The apps serving as malware carriers include ComeCome, ChatAi, WeTink, AnyGPT and more. These range from productivity tools to entertainment and utility apps. In some cases, malicious developers create these apps with full knowledge of the malware’s purpose. In others, the issue appears to be a supply chain vulnerability, where legitimate developers unknowingly integrate compromised SDKs or third-party services that introduce malicious code into their applications.

We reached out to Apple for a comment but did not hear back before our deadline. 

Apple has removed the 11 iOS apps mentioned in Kaspersky's report from the App Store. Furthermore, they discovered that these 11 apps shared code signatures with 89 other iOS apps, all of which had been previously rejected or removed for violating Apple's policies, resulting in the termination of their developer accounts.

Apps requesting access to user data such as Photos, Camera or Location must provide relevant functionality or face rejection. They must also clearly explain their data usage when prompting users for permission. iOS privacy features ensure users always control whether their location information is shared with an app. Also, starting in iOS 14, the PhotoKit API — which allows apps to request access to a user’s Photos library — added additional controls to let users select only specific photos or videos to share with an app instead of providing access to their entire library. 

The App Store Review Guidelines mandate that developers are responsible for ensuring their entire app, including ad networks, analytics services and third-party SDKs, complies with the guidelines. Developers must carefully review and choose these components. Apps must also accurately represent their privacy practices, including those of the SDKs they use, in their privacy labels.

In 2023, the App Store rejected over 1.7 million app submissions for failing to meet its stringent privacy, security and content standards. It also rejected 248,000 app submissions found to be spam, copycats or misleading and prevented 84,000 potentially fraudulent apps from reaching users.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

A Google spokesperson tells CyberGuy: 

"All of the identified apps have been removed from Google Play and the developers have been banned. Android users are automatically protected from known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services."

However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices. Here’s why:

HOW SCAMMERS USE YOUR PERSONAL DATA FOR FINANCIAL SCAMS AND HOW TO STOP THEM

1. Use strong antivirus software: Installing strong antivirus software can add an extra layer of protection by scanning apps for malware, blocking suspicious activity and alerting you to potential threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Stick to trusted developers and well-known apps: Even though malware has been found in official app stores, users can still minimize their risk by downloading apps from reputable developers with a long track record. Before installing an app, check its developer history, read multiple reviews and look at the permissions it requests. If an app from an unknown developer suddenly gains popularity but lacks a strong review history, approach it with caution.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Review app permissions carefully: Many malicious apps disguise themselves as legitimate tools but request excessive permissions that go beyond their stated purpose. For example, a simple calculator app should not need access to your contacts, messages or location. If an app asks for permissions that seem unnecessary, consider it a red flag and either deny those permissions or avoid installing the app altogether. Go to your phone settings and check app permissions on your iPhone and Android

4. Keep your device and apps updated: Cybercriminals exploit vulnerabilities in outdated software to distribute malware. Always keep your operating system and apps updated to the latest versions, as these updates often contain critical security patches. Enabling automatic updates ensures that you stay protected without having to manually check for new versions.

5. Be wary of apps that promise too much: Many malware-infected apps lure users by offering features that seem too good to be true — such as free premium services, extreme battery optimizations or AI-powered functionality that appears unrealistic. If an app’s claims sound exaggerated or its download numbers skyrocket overnight with questionable reviews, it’s best to avoid it. Stick to apps with a transparent development team and verifiable functionalities. 

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

The new malware campaign highlights the need for stricter vetting processes, continuous monitoring of app behavior post-approval and greater transparency from app stores regarding security risks. While Apple and Google have removed the malicious apps upon detection, the fact that they made it onto the platform in the first place exposes a gap in the existing security framework. As cybercriminals refine their methods, app stores must evolve just as quickly or risk losing the trust of the very users they claim to protect.

Do you think app stores should take more responsibility for malware slipping through? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

$750,000 apocalypse SUV comes with its own gas mask

13 February 2025 at 05:00

Rezvani Motors, an innovative American automotive manufacturer, has redefined the luxury SUV market with its extraordinary Vengeance. 

This vehicle represents a groundbreaking fusion of military-inspired design and high-end luxury transportation. 

Designed by digital artist Milen Ivanov, known for his work in video game vehicle design, the Vengeance breaks conventional automotive boundaries with its aggressive styling and comprehensive security features.

GET EXPERT SECURITY ALERTS, MUST-KNOW TECH TIPS, AND THE LATEST DIGITAL TRENDS — STRAIGHT TO YOUR INBOX. SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

The Vengeance represents a unique fusion of a luxury SUV and military-grade transportation. This remarkable machine is built on GM's T1 platform, sharing fundamental architecture with the Cadillac Escalade. It measures an imposing 18 feet long and weighs approximately 6,200 pounds. Potential owners can choose between two powerful engine configurations. 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

The gasoline variant delivers 420 horsepower from a 6.2L V8 engine. The diesel option provides a robust 277 horsepower through a Duramax 3.0L Turbo-Diesel engine. Standard amenities include a sophisticated 19-speaker audio system. The vehicle offers tri-zone climate control for maximum passenger comfort. NFC phone pairing comes standard in the base model. Magnetic ride control ensures a smooth driving experience across various terrains.

TESLA'S CYBERTRUCK GETS A MILITARY MAKEOVER WITH A TACTICAL TWIST

The Vengeance offers an unprecedented level of personal security through its comprehensive Military Package. Bulletproof glass and B6-rated armor provide significant protection against potential threats. Two military-grade gas masks are included to protect against chemical warfare, tear gas and other potential airborne threats. 

The package also provides two bulletproof vests designed to meet professional security standards. A matching bulletproof helmet accompanies the protective gear, ensuring complete personal safety. Rezvani further enhances the package with a professional-grade first aid kit and a specialized hypothermia prevention kit. Optional features include smoke screens, thermal night-vision and electromagnetic pulse protection. Buyers can even add pepper spray dispensers and electrified door handles.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

360° THROWABLE TACTICAL CAMERAS ARE CHANGING THE GAME FOR THE MILITARY AND LAW ENFORCEMENT

The Vengeance targets ultra-high-net-worth individuals and those requiring exceptional personal security. Diplomats in volatile regions might find particular value in its defensive capabilities. Celebrities seeking maximum protection will appreciate its comprehensive security features.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

EXPLORING HYDROGEN-POWERED VEHICLES FOR THE FUTURE OF TRANSPORTATION

The base model starts at $285,000, with fully equipped versions approaching $750,000. This pricing positions the Vengeance as an exclusive statement of luxury and preparedness. The vehicle represents more than transportation; it's a comprehensive personal security solution.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The Rezvani Vengeance transcends traditional automotive boundaries. It combines luxury, performance and unparalleled security in a single extraordinary package. While most buyers may never utilize its full defensive capabilities, the Vengeance remains an impressive technological vehicle that will definitely have you ready for just about anything.

If money were no object, would you spend $750,000 on a vehicle like this to be prepared for the worst? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Tech security 101: How to spot a hidden tracker on your car

12 February 2025 at 14:22

The latest stats say 80% of stalking victims are tracked using tech. One of the most popular ways to do it? GPS trackers, like an AirTag. They’re small enough to slip into a bag, pocket or your car undetected.

"Kim, this doesn’t impact me." I wish that was true. Maybe you have an ex or friend who won’t buzz off, or maybe you met a stranger at a bar or store who was acting creepy. You’re at risk. Did you drive across the U.S. border? Yep, crooks are targeting tourists, too.

Win an iPhone 16 Pro with Apple Intelligence ($999 value). 

No purchase necessary. Enter to win now!

The good news is your phone can alert you when an unknown tracker is with you. If all else fails, good old-fashioned sleuthing works, too. I’ll show you how.

THE BIGGEST WI-FI MISTAKE YOU DIDN’T KNOW YOU WERE MAKING

The clock is ticking

An AirTag starts beeping only after 24 hours away from its owner. That gives the stalker plenty of time to reach you, especially if they’re local. If a carjacker tags your ride, they could learn your routine and follow you home before you even know what’s going on.

The rumor mill says Apple’s AirTags 2, coming later this year, will have antistalking tech. With the most current AirTags, tech-savvy stalkers can rip out the built-in speaker so you won’t get alert, but the new ones should make it harder.

For now, you need to do everything you can to stay safe.

RELATED: AirTags aren’t just for creeps. I always toss one in my luggage.

On your iPhone, make sure a few settings are enabled:

5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER

On Android, the process is similar as long as your phone is running Android 6.0 or newer. If it’s not, you really need a new phone!

The alerts aren’t foolproof

It’s not just ripping out the speakers. Older tracking devices might not set off an alert, and savvy creeps can reconfigure new trackers to follow you undetected for months. 

That’s why it’s important to check your car now and then, even if you don’t hear that telltale beep. First, grab a flashlight and a mirror.

If you don’t find anything but still feel uneasy, try a bug detector. This well-rated option ($37) works for cars, homes, bags or whatever.

Small hidden cameras are popular with creeps now, too. Here’s my guide on spotting cameras in a rental, dressing room, private space at the gym or anywhere else you expect privacy.

I’M A TECH EXPERT: 10 AI PROMPTS YOU’LL USE ALL THE TIME

‘I found a tracker. What now?’

Don’t smash it or disable it. You want to give the police all the info they need to catch whoever planted it. 

First, hold your iPhone or NFC device to the white side of the AirTag. Tap that notification that pops up to see info about its owner. Jot down the serial number and phone number so you can share them with the cops.

Now, make an aluminum foil envelope. Wrap the tracker inside, making sure there are no gaps or holes. This will block any signals, so the person who installed it will just think it’s out of range. Take the foil-wrapped tracker to a police station. They’ll know how to pin down who put it there.

Are you being stalked or just paranoid? It’s a fine line. Read this if you can’t shake that "someone’s watching" feeling.

I’ve heard too many stories from stalking victims. I don’t want you or a loved one to be another. Share this with folks in your life.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

How to delete multiple text messages on a Mac and iPad

12 February 2025 at 05:00

Are you overwhelmed by the sheer volume of text messages cluttering your Mac or iPad? You're not alone. 

Many users find themselves endlessly scrolling through conversations, searching for important information or simply trying to declutter their digital space. 

Fortunately, Apple has provided ways to manage your messages more efficiently. Let's dive into how you can delete multiple messages on both your Mac and iPad, helping you regain control of your messaging app. Here are steps to bulk delete text messages on an iPhone or an Android.

GET SECURITY ALERTS + EXPERT TECH TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

If you're using a Mac, follow these steps to delete multiple messages at once:

BEST ANTIVIRUS SOFTWARE FOR YOUR MAC & IPAD

If you're using a Mac, follow these steps to delete multiple messages within a conversation at once:

This method is particularly useful when you need to remove several messages from a lengthy conversation without deleting the entire thread.

HOW TO KNOW WHEN IT'S TIME TO REPLACE YOUR MAC

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

HOW TO FILTER AND SORT EMAILS ON YOUR IPHONE AND IPAD

To prevent future clutter, consider setting up automatic message deletion:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

This setting will automatically remove older messages, keeping your conversations manageable.

Note: Deleting messages from your Mac does not delete them from other Apple devices unless you have Messages in iCloud enabled. To check if Messages in iCloud is enabled on your Mac:

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Managing message clutter can feel like a never-ending battle. While these tips won't magically solve all your digital chaos, they'll definitely help you take back control of your Messages app. A little effort now means less scrolling and more breathing room later. And hey, who doesn't love a clean, organized digital space that doesn't make you want to pull your hair out? Just remember, your messages are meant to connect you, not stress you out.

Tell us the most frustrating digital communication challenge you have and how we might be able to help. Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

How to not fall in love with AI-powered romance scammers

12 February 2025 at 09:00

"Love is blind" takes on a more sinister meaning when so-called artificial intelligence (AI) becomes a tool for exploiting our deepest human emotions. 

Convincing AI technologies are increasingly targeting mature online daters, turning fantasies into lucrative and dangerous criminal enterprises.

Romance scams have become the most common type of fraud in 2025 and have swindled would-be lovers out of over $1.3 billion in the United States alone. Just last year, the world heard the cautionary tale of a 53-year-old French woman who lost $850,000 to a convincing AI deepfake of Brad Pitt.

GET SECURITY ALERTS + EXPERT TECH TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

The scammers had wooed her for over 8 months with realistic (yet fake) images, voice calls, videos and even multiple social media accounts. Similarly, a 67-year-old from San Diego was tricked out of her life savings when an AI impostor gang posed as Keanu Reeves, also raising awareness about romance scams impacting the elderly. The worst side of both stories is that the fraudsters haven’t been caught, and the victims’ financial institutions did little to help them recover their funds.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

AI-powered romance scams have become far more sophisticated than "traditional" scams. Criminals use a variety of AI tools together with advanced tactics to create deeply personalized and remarkably realistic digital identities. Unlike traditional scams relying on generic scripts, these AI-powered approaches can generate nuanced, contextually appropriate conversations that adapt in real time to victims' emotional state and personal background. In short, romance scams have become so dangerous because they use multiple advanced methods.

AI-driven romance conversations are increasingly challenging for both victims and traditional anti-fraud mechanisms to detect. Spotting and preventing these scams can be tricky, but privacy experts recommend some tried-and-true ways.

BEST VALENTINE’S DAY GIFTS 2025

Spotting and preventing these sophisticated AI-driven scams can be tricky, but staying informed can help you avoid becoming a victim. By being vigilant, verifying identities and recognizing red flags, you can navigate online dating safely while protecting your finances and personal information. Here are some things to look out for:

STOP THESE V-DAY SCAMS BEFORE THEY BREAK YOUR HEART AND YOUR BANK ACCOUNT

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Your personal information is a scammer’s best tool. This includes your phone number, email and other contact details that allow them to reach you, as well as information like the celebrities you follow, your family members and even the type of content you engage with online to tailor the perfect attack. As scams become more sophisticated and reliant on loads of data, it’s more important than ever to take proactive measures to safeguard your personal information.

1. Vigilance in online dating: In the digital world, not everyone is who they claim to be. Be wary of potential romantic interests who ask for money or gifts or those who want to move the relationship along too quickly. Keep your personal and financial information private and never share it with someone you haven't met in person.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

2. Verify the identity: Request additional information or proof to verify their identity, such as video chatting or meeting in person if possible. Exercise caution before getting emotionally invested in someone you haven't met in real life.

3. Research and verify: Conduct an online search using the person's name, email address or phone number to see if any suspicious or fraudulent activities are associated with them. Reverse image search their profile pictures to check if they are stolen from elsewhere on the internet. You can also reverse-search their phone number for free by following the instructions found here.

4. Privacy settings: Keep your social media profiles private so only those you trust can see what’s going on in your life.

5. Limit sharing: Adjust the privacy settings on all of your online accounts and apps to limit data collection and sharing.

6. Use reputable dating platforms: Stick to well-known and reputable dating websites or apps with security measures to help protect their users from scams. These platforms often have guidelines for safe online dating and report suspicious users.

7. Invest in personal information removal services: I highly recommend you remove your personal information that can be found on various people search sites across the web. If you give someone your email address or phone number, they could potentially reverse-search your information and get your home address. Check out my top picks for data removal services here.

AI-powered romance scams have become a serious threat, exploiting our deepest emotions for financial gain. As you navigate the digital dating landscape, it's crucial to stay vigilant and protect yourself from these sophisticated schemes. Remember, if something seems too good to be true, it probably is. Trust your instincts, take things slow and always prioritize your safety and financial well-being.

How has the rise of AI-powered romance scams changed your approach to online dating or your views on digital relationships? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Don't fall for that sneaky iCloud storage alert in your inbox

11 February 2025 at 09:00

iCloud scams are becoming increasingly sophisticated, targeting unsuspecting users with urgent messages about their accounts. Our team recently received two suspicious iCloud emails. We want to share our experience and provide comprehensive steps on how to identify and protect yourself from these scams.

GET SECURITY ALERTS + EXPERT TECH TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

iCloud scams typically follow a pattern designed to create a sense of urgency and fear. Let's break down the two emails our team received below. Here is the urgent wording that the scammers used, "Payment Failure for iCloud Storage Renewal" and "iCloud Suspended. Fix it before Mon, 13 January 2025." Both emails share common characteristics of phishing attempts, including urgent language, threats of account suspension or data loss, requests to update payment information, links to external websites and vague or incorrect account details. These emails are crafted to look legitimate, often mimicking Apple's branding and tone. However, they contain several red flags that indicate they are scams.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

To protect yourself from falling victim to these scams, look out for these telltale signs:

If you receive a suspicious email claiming to be from Apple or iCloud, follow these steps:

THAT APPLE ID DISABLED MESSAGE? IT'S A DANGEROUS SCAM

Follow these steps if you think you may have fallen for an iCloud scam.

1) Change your Apple ID password immediately: Ensure you create a strong, unique password that you haven't used on other accounts.

2) Check for any unauthorized changes to your account settings or payment information: Go to account.apple.com and review any devices, personal information or security settings that look unfamiliar.

3) Contact Apple Support directly through official channels for assistance: Forward the suspicious email to reportphishing@apple.com or abuse@icloud.com to help Apple track and block these scams.

4) Monitor your financial accounts for any suspicious activity: If you provided payment information, cancel and replace your credit card immediately and pay close attention to even small unauthorized charges.

5) Consider placing a fraud alert on your credit reports: Report the scam to the Federal Trade Commission and Internet Crime Complaint Center to help combat these fraudulent activities.

6) Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

FBI’S NEW WARNING ABOUT AI-DRIVEN SCAMS THAT ARE AFTER YOUR CASH

Remember, Apple will never ask you to provide personal information, passwords or security codes via email, text message or phone call. If you're ever in doubt about the legitimacy of a communication from Apple, always err on the side of caution and contact Apple directly through their official website or support channels. By staying vigilant and following these guidelines, you can better protect yourself from iCloud scams and keep your personal information secure. Don't let the urgency of these messages cloud your judgment. Take a moment to verify before you act, and you'll be much safer in the long run.

Have you ever been targeted by an iCloud or Apple-related scam? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

ESA’s space telescope Euclid discovers ‘astonishing' Einstein ring

10 February 2025 at 20:52

The European Space Agency (ESA) said Monday that its Euclid space telescope has detected a rare bright halo of light around a nearby galaxy.

Known as an Einstein ring, the halo was captured in photos encircling a galaxy nearly 590 million light-years away, which is considered close by cosmic standards. A single light-year is measured at 5.8 trillion miles.

While astronomers have known about the galaxy where the phenomenon was captured for over a century, they were surprised when Euclid revealed the bright glowing ring, 

Euclid blasted off from Cape Canaveral, Florida on July 1, 2023, to begin a six-year mission to explore the dark universe.

GIANT STELLAR NURSERY REVEALED IN NEW IMAGES FROM ESA'S SPACE TELESCOPE

But before the space telescope could begin its survey of the universe, scientists had to ensure everything onboard was working properly. During the early phase of testing, which took place in September 2023, Euclid sent images back to Earth.

The ESA said the images were deliberately out of focus, but in one of the images, Euclid Archive Scientist Bruno Altieri saw what he believed was a very special phenomenon and decided to look at it a bit closer.

"I look at the data from Euclid as it comes in," Bruno said in a press release from the ESA. "Even from that first observation, I could see it, but after Euclid made more observations of the area, we could see a perfect Einstein ring. For me, with a lifelong interest in gravitational lensing, that was amazing."

For most of the population out there, an Einstein Ring is an "extremely rare phenomenon," the ESA said.

POWERFUL WEBB TELESCOPE SPIES SPECTACULAR STAR BIRTH CLUSTER BEYOND THE MILKY WAY

When a distant galaxy is observed through a telescope, the light from that galaxy may encounter another galaxy on its way to the telescope. When that happens, the foreground galaxy acts like a magnifying glass, and gravity causes the traveling light rays to bend. When light rays bend, scientists call that gravitational lensing, according to the ESA.

When the background galaxy, lensing galaxy and telescope are in perfect alignment, the image appears as a ring, also known as an Einstein Ring.

The galaxy, called NGC 6506, is about 590 million light-years away, and this is the first time the ring of light around its center has ever been detected.

"All strong lenses are special, because they're so rare, and they're incredibly useful scientifically," Conor O’Riordan of the Max Planck Institute for Astrophysics said. "This one is particularly special, because it’s so close to Earth and the alignment makes it very beautiful."

POWERFUL WEBB TELESCOPE CAPTURES PHOTOS OF ONE OF THE EARLIEST SUPERNOVA EVER SEEN

Einstein rings are based on physicist Albert Einstein’s general theory of relativity, which predicts that light will bend around objects in space, so they focus the light like giant lenses, ESA said. The phenomenon allows scientists to sometimes see the light from distant galaxies that would otherwise be hidden.

"I find it very intriguing that this ring was observed within a well-known galaxy, which was first discovered in 1884," Valeria Pettorino, ESA Euclid project scientist, said. "The galaxy has been known to astronomers for a very long time. And yet this ring was never observed before. This demonstrates how powerful Euclid is, finding new things even in places we thought we knew well. This discovery is very encouraging for the future of the Euclid mission and demonstrates its fantastic capabilities."

Over the course of the mission, scientists expect Euclid will reveal more about the role of gravity in the Universe, as well as the nature of dark energy and dark matter.

Euclid will map over a third of the sky and observe billions of galaxies as far as 10 billion light-years away, ESA said. In doing so, scientists expect Euclid to find around 100,000 more strong lenses, though finding one so cosmically close to home and so spectacular, ESA added, "is astonishing."

"Euclid is going to revolutionize the field, with all this data we've never had before," O’Riordan said.

The Associated Press contributed to this report.

Microsoft Teams is becoming a prime target for sophisticated scammers

10 February 2025 at 09:00

If there is one corporation that is targeted by scammers more than anyone else, it is Microsoft. From customer support scams to impersonation and phishing attacks, the company’s services are constantly under threat. Recently, even Russia-sponsored hackers managed to breach Microsoft and steal sensitive information.

While Microsoft services as a whole are prime targets, one that stands out is Teams. The collaboration tool is used by more than 300 million people worldwide, making it a goldmine for attackers. Hackers are using it to spread phishingvishing and quishing campaigns, relying on social engineering tactics to trick victims into sharing private and sensitive data.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Cybercriminals are increasingly targeting Microsoft Teams users with sophisticated attack methods. One such technique involves malicious GIF images that exploit worm-like vulnerabilities, allowing attackers to take over accounts and infiltrate chat sessions when the image is opened. 

Hackers also insert malware-laden files into chat threads, tricking users into downloading DLL files that enable system takeover. Phishing campaigns leverage compromised accounts or domains to send deceptive invitations, luring victims into downloading harmful files. 

Some attackers use email bombing and vishing, posing as tech support to overwhelm users with spam emails before tricking them into granting remote access. Compromised email addresses and stolen Microsoft 365 credentials provide another entry point for unauthorized access. 

Plus, external access settings in Microsoft Teams, which often allow outside users to initiate chats or meetings, can be exploited if not properly restricted. Another common tactic is sending phishing links through Teams chats, often disguised as invoices or payment notifications, leading to ransomware infections.

9 WAYS SCAMMERS CAN USE YOUR PHONE NUMBER TO TRY TO TRICK YOU

Scammers have been running fake job schemes for a while, but their tactics keep evolving. Lately, I reported how fake job emails are being used to install crypto mining software that slows down computers. Now, they are using Microsoft Teams chat to trick people. 

It usually starts with an email about a job followed by a suggestion to do the interview over Teams. The first red flag is that the entire interview happens over chat with no video and no call. After that, you are "hired" and asked to submit your details, often through a Google Doc requesting personal info like your social security or tax number. Some victims are even asked to buy equipment for the job, pay a hiring fee or purchase gift cards, which are classic signs that the whole thing is a scam.

SPOTIFY PLAYLISTS ARE BEING HIJACKED TO PROMOTE PIRATED SOFTWARE AND SCAMS

1) Avoid opening suspicious links and attachments: Be cautious of unsolicited links or attachments, especially in chat messages or emails. Cybercriminals often use these to deliver malware or phishing links. Never click on links that seem unusual or come from unknown sources.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2) Check for red flags in job offers: If you receive a job offer that seems too good to be true or involves an interview conducted entirely via chat with no phone call or video meeting, it's likely a scam. Legitimate companies typically conduct interviews using multiple forms of communication. 

A job offer that insists on only text-based conversations is a major red flag. Other warning signs include being asked to provide personal information through Google Docs, being asked to pay for equipment, paying fees to secure the job or purchasing gift cards as part of the hiring process.

3) Use strong, unique passwords: Ensure your Microsoft 365 and other accounts are protected with strong passwords. Consider using two-factor authentication to add an extra layer of protection against unauthorized access. Also, you might want to use a password manager to generate and store complex passwords.

4) Be cautious with personal information: Never share sensitive personal details, like social security numbers or tax information, through unsecured or unsolicited channels, such as Google Docs or messages on Teams. Always verify the legitimacy of such requests.

5) Report suspicious activity: If you notice any suspicious activity on your Microsoft Teams account or receive unusual job offers, report it immediately. Prompt action can prevent a potential breach or further compromise. Notify your IT department or relevant authorities so they can investigate and take appropriate measures.

6) Verify IT support requests: Be cautious of unsolicited messages or calls claiming to be from IT support, especially those asking you to install software or grant remote access. Cybercriminals often impersonate IT staff to deploy ransomware or steal sensitive data. Always verify such requests with your actual IT department before taking any action. If in doubt, contact your IT team directly using official channels, not through the message or call you received.

ENERGY-SAVING SCAM USES ELON MUSK’S NAME – HERE’S THE TRUTH

Scammers and hackers are not slowing down, so staying sharp is the only way to stay ahead. If something feels off, like a job that sounds too good to be true, a random Teams message with a sketchy link or an interview that is just a chat, trust your instincts. You should always be careful with external messages and invites that you to receive on Microsoft Teams. Even if it seems like it is from someone you know, it is best to double-check, especially if it involves a file, a link or an invitation to a chat you were not expecting to receive.

Should Microsoft be doing more to prevent phishing and impersonation scams on Teams? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Top translation apps for travelers

11 February 2025 at 05:00

Traveling abroad can be an incredible adventure, but the language barrier can make even the most intrepid explorer nervous. The fear of being unable to communicate or understand signs and menus keeps many would-be travelers from ever leaving their home country. But fear not. With the rise of powerful translation apps, you can harness the latest technology right on your smartphone to bridge the language gap wherever your journey takes you.

I've tested out the top contenders to bring you my picks for the best translation apps for global travelers. Whether you have an iPhone or an Android, these apps have got you covered with features like live speech translation, text input and even AI-powered sign and menu translation.

GET SECURITY ALERTS + EXPERT TECH TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Google Translate is the best translation app for most people. It supports the most languages, with 133 languages supported. It also features an incredibly user-friendly interface and design, and best of all, it's completely free. There are multiple ways to translate languages with Google Translate, be it by typing text into the translation box or utilizing text-to-speech translation, and you can even take advantage of Google's AI translator, which can translate text from photos that you take.

If you are using an iOS device, you can download Google Translate here. If you are using an Android-based device, you can download Google Translate from the Google Play Store here. Additionally, you can access Google Translate in your web browser from any device by going to translate.Google.com.

THE BEST TRAVEL GEAR FOR 2025

If you're an iOS devotee, you may have already encountered Apple Translate, which comes pre-installed on all iOS devices. This powerful translation app is one of the best available exclusively to iOS users, capable of translating written text and images of text and facilitating direct speech translation to help you converse with speakers of other languages. Apple Translate currently supports 19 languages, including popular options like Spanish, French, German, Chinese and Arabic, making it a valuable tool for planning international vacations or communicating while traveling.

Additionally, the Translate app is available on the Apple Watch, allowing you to access your favorite translations on the go. With its seamless integration across Apple devices, you can easily switch between your iPhone and Apple Watch for quick and convenient translations. Whether you're navigating a foreign city or engaging in conversation with locals, Apple Translate is designed to enhance your travel experience.

HOW TO STAY CONNECTED NO MATTER WHERE YOU TRAVEL IN THE WORLD

Microsoft Translator is a totally free-to-use translation app that is popular with business professionals. Featuring over translation for more than 120 languages, this is one of the most robust free-to-use translation apps. You can translate via text, spoken word or images with Microsoft Translate, and where the app really stands out is its ability to be used with multiple devices. You can create translation groups with Microsoft Translator and everyone can talk and translate together. The Microsoft Translator is available for both iOS and Android devices.

HOW TO SET UP FREE MESSAGING ON YOUR PHONE WHILE TRAVELING INTERNATIONALLY

With over 500,000 reviews on the Apple App Store, iTranslate is one of the most popular translation apps for travelers. It offers translation options for more than 100 languages, and its premium features make it well worth the cost of the app. You can use iTranslate for free, but you will be limited to just text translations. With the paid option, you can access both voice translations and text-via-camera translations. For those willing to pay $6 per month, users can save their translations and dictionaries offline, so you can use them from anywhere, even without service. iTranslate is available for both the iOS platform and the Android platform.

BEST GEAR FOR THE DARK OUTDOORS

There are a lot of different translation apps out there on the market aimed at travelers, and we highlighted our favorites today. While the majority of the apps in this list are free-to-use, and all the apps in this list have a free-to-use mode, you will need to pay for additional features from apps such as iTranslate.

What challenges have you faced while communicating in a foreign language during your travels? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Is your camera ticket a fake? Here’s how to tell

10 February 2025 at 05:00

Suddenly, a red light camera ticket arrives in your mailbox bearing your name but you weren't even driving that day. This frustrating scenario is catching many drivers off guard. So, what's the deal here? Let's break down these tricky fake tickets and how to fight back when you're wrongly in the crosshairs.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

First things first, not all "tickets" are created equal. If you receive something that looks like a ticket but doesn't have the court's full address or phone number – or worse, it says "Do not contact the court" – you might be dealing with what's cheekily called a "snitch ticket." These aren't real tickets at all but rather attempts to get you to rat out whoever was actually driving. The dead giveaway is usually that they will say something like, "Courtesy Notice: This is not a ticket."

BEWARE OF FAKE PARKING TICKETS ON YOUR WINDSHIELD WITH FAKE FINES

Because cities often have to pay camera vendors for every ticket issued, whether or not they ever collect a dime. So, when the footage is too blurry to ID the driver, they toss out these "Whoops, was this you?" tickets, hoping you’ll do their homework for them. It’s basically a shady game of "Guess Who?" except you never agreed to play, the rules are rigged and the only prize is an unwanted fine.

THESE 5 FUZZ BUSTER APPS CAN HELP GET YOU OUT OF A SPEEDING TICKET

If you've received a "snitch ticket" (a fake ticket designed to get you to identify the driver), here's what you can do.

Ignore it: Since it's not a real ticket, you're not legally obligated to respond. Many people simply disregard these notices.

Don't identify the driver: Remember, you're under no legal obligation to name who was driving your car.

Check for red flags: Confirm it's a fake by looking for missing court information or the phrase "Do not contact the court regarding this notice."

Stay informed: Keep the notice for your records, but don't let it stress you out. It's not a legal document.

Remember, these fake tickets are just fishing expeditions. You're well within your rights to toss them in the recycling bin and go about your day.

BEWARE OF THE NEW SNEAKY PARKING QR CODE SCAM

If you receive a genuine ticket (one with all the court info) but you weren't the driver, you've got options.

1) Contact the police (optional): You can try calling the number on the ticket and explaining the situation. But beware, they might pressure you to identify the actual driver.

2) Stand your ground: Remember, you're not legally required to identify the driver. It's not your job to play detective for them.

3) Go to court: If push comes to shove, you can always contest the ticket in court. Just be prepared for some potential pushback.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Dealing with red light camera tickets can feel like navigating a legal minefield. The key is to know your rights, stand firm and don't let anyone pressure you into admitting guilt or identifying others if you're not comfortable doing so. Remember, the burden of proof is on them, not you. Stay informed, stay calm, and if all else fails, seek legal advice. After all, justice shouldn't be a game of "gotcha."

Has a "snitch ticket" ever landed in your mailbox? Tell us how you handled it by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Top 20 apps tracking you every day

9 February 2025 at 09:00

If something is free, you’re the product being sold. This is especially true for most online services we use. For example, Google’s primary source of revenue is ads. They make money by collecting data about you and me and selling targeted advertising to companies, which then show us products relevant to our interests.

You might have noticed that the moment you search for a product on Google, you start seeing ads for it on Facebook. The same applies to apps like Instagram, Threads and LinkedIn. In fact, research shows that the apps collecting the most data about you are also among the most widely used. 

Let’s look at the top 20 of them and explore how you can take control of your personal information.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Apps collect all sorts of data about you, but let’s get one thing straight. Not all data collection is bad. Some apps genuinely need access to certain information to function properly. For example, Uber stores your location data to help you find a ride faster, while WhatsApp requires access to your contacts so you can send messages.

The real issue is data collection that serves no purpose other than showing you ads or selling your information to third parties. According to Marin Marinčić, head of IT Infrastructure at Nsoft, the top 20 most invasive apps collect data that is not necessary for their core functions.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Leading the list is Meta with all four of its major apps. Facebook, Messenger, Instagram and Threads share 68% of collected data with third parties while also using it for targeted ads. LinkedIn follows, sharing around 37% of user data, with Amazon in third place, followed by YouTube.

What makes this concerning is how deeply embedded these apps are in our daily lives, making it nearly impossible to find alternatives or avoid data collection altogether.

The list also includes Elon Musk’s X at No. 5, followed by Uber Eats, PayPal, Uber, Google and Amazon Prime Video. TikTok, despite ongoing scrutiny over its data policies, ranks 14th. While many of these names were expected, one surprising entry is the mobile game Candy Crush, which uses 28% of collected data for ads. You can find the full list in the image below.

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

Avoiding data collection is nearly impossible if you use the apps above. The only way to dodge these invasive apps is to switch to apps that respect your privacy. While it may seem impossible to replace some of the biggest platforms, there are alternatives that collect little to no unnecessary data.

Switching to these alternatives may require some effort, but it is the best way to limit how much of your personal data is being collected. Taking control of your privacy starts with making conscious choices about the apps you use.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

HOW TO GET RID OF ROBOCALLS WITH APPS AND DATA REMOVAL SERVICES

If you’re not able to delete the apps listed above, follow the simple steps below to minimize how much information is being collected and shared.

1. Review app permissions: Most apps request access to data they do not actually need. Go to your phone settings and check app permissions on your iPhone and Android. Disable access to location, microphone, contacts and other sensitive data unless absolutely necessary.

2. Turn off ad personalization: Many companies track your online activity to show targeted ads. You can limit this by disabling ad personalization in GoogleFacebook, and other accounts. This reduces the amount of data collected about your interests and behavior.

3. Limit social media tracking: Social media platforms track your activity even when you are not using them. Adjust privacy settings to restrict data collection.

4. Avoid signing in with Google or Facebook: Many websites offer login options using Google or Facebook. While convenient, this shares even more data with these platforms. Instead, create separate accounts using email whenever possible.

5. Use a Virtual Private Network (VPN) and private browsing mode: VPN hides your IP address, helping to obscure your location and online activity, making it harder for websites to track you. Combined with private browsing or incognito mode, this reduces the amount of data companies can collect about your online activity. Using a VPN service can also enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. 

While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices

6. Regular app cleanup: Uninstall apps you no longer use to reduce passive data collection.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

Protect your personal information across the popular platforms mentioned above with these essential privacy adjustments.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The best way to reduce companies from collecting your data is to remove invasive apps from your phone. Many apps request unnecessary permissions that can track your activity, so deleting them limits exposure. Instead of downloading standalone apps, try using the browser versions of popular social media platforms, as they typically have fewer permissions. 

However, web tracking still exists through cookies and fingerprinting, so using a privacy-focused browser like Brave, Firefox with enhanced tracking protection, or Safari with Intelligent Tracking Prevention (ITP) can further reduce data collection. However, some apps are so deeply integrated that replacing them is difficult. For example, if you use an Android phone, avoiding Google’s ecosystem is nearly impossible. Apple, on the other hand, offers more privacy controls, giving users better options to limit data collection.

Do you check app permissions before installing? How do you decide which permissions are acceptable? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Never lose cell service again with this space-age satellite tech

9 February 2025 at 05:00

Imagine never being without a cell signal again, anywhere, any time on the planet. 

That's exactly what AST SpaceMobile is working to achieve. Founded in the heart of Texas in 2017, this innovative company is developing the world's first global cellular broadband network that can connect directly to your everyday smartphone, no special equipment required. 

Its mission? To ensure that no matter where you are around the globe — from remote mountain ranges to isolated islands — you'll never be out of touch again.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

AST SpaceMobile made history in April 2023 by completing the first two-way phone call via space on an unmodified cell phone. This milestone was achieved using its low Earth orbit satellite, Blue Walker 3 (BW3), which was launched aboard a SpaceX Falcon 9 rocket in September 2022.

IPHONE'S SATELLITE MESSAGING: A CRUCIAL LIFELINE DURING A STORM

Since its inception, AST SpaceMobile has made remarkable technological advancements. In September 2023, it achieved a 14-Mbps data stream on the BW3 satellite. A year later, in September 2024, the company launched five additional satellites, BlueBird 1 through 5. The ultimate goal is to establish a constellation of 168 satellites, offering speeds up to 120 Mbps.

IS YOUR PHONE READY FOR AN EMERGENCY? TURN ON THESE LIFESAVING SETTINGS

AST SpaceMobile has forged strategic partnerships with major telecom players across the globe. In the United States, it has partnered with AT&T and Verizon. Internationally, it has teamed up with Bell Canada, Rakuten, Vodafone and other telecommunications providers. These partnerships potentially give about 2.8 billion people worldwide access to its satellite network.

 BAD WEATHER? HOW TO GET SURVIVAL-READY IN ANY STORM

AST SpaceMobile's approach to satellite connectivity is uniquely innovative. It focuses solely on direct-to-cell service, distinguishing itself from other competitors. Its current BlueBird satellites unfold to approximately 700 square feet in space, with future satellites planned to be three times larger and offer ten times the data capacity. Impressively, 95% of its manufacturing process is completed in house in the United States.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

CELL PHONE BOOSTERS VS. MOBILE HOTSPOTS: WHAT’S THE DIFFERENCE AND HOW DO YOU CHOOSE?

While both AST SpaceMobile and Elon Musk's Starlink aim to provide global connectivity, their approaches significantly differ. AST SpaceMobile is built for direct-to-cell service, requiring no special equipment for users.

Starlink, primarily a data-focused service, has only recently launched modified satellites for direct-to-cell capabilities. AST's focus on unmodified smartphones gives it a unique advantage in accessibility.

Despite the promising technology, the company faces several challenges. The brightness of satellites like BW3 could potentially interfere with astronomical observations. There are concerns about possible interference with radio-quiet zones used for scientific research. The increasing number of satellites also contributes to growing space debris concerns.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

As of January 2025, AST SpaceMobile has not yet announced specific pricing for its services. However, given its partnerships with major carriers like AT&T and Verizon, it's likely that the service will be offered as an add-on to existing cellular plans. The company aims to provide coverage to remote areas and eliminate dead zones, suggesting that pricing may be competitive to attract a wide user base.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

AST SpaceMobile's innovative approach to global connectivity has the potential to revolutionize how we stay connected, especially in remote areas. While challenges remain, the benefits of ubiquitous communication, particularly in emergency situations, are compelling. As the company continues to expand its satellite network and partnerships, we may soon see a world where being "out of range" is a thing of the past.

If universal satellite connectivity could solve one major communication challenge in your life, what would it be? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Huge healthcare data breach exposes over 1 million Americans' sensitive information

8 February 2025 at 09:00

The healthcare industry has recently been a major target for hackers. You might remember the 2024 Ascension attack, which led to significant disruptions. 

The Change Healthcare breach was also on a massive scale. UnitedHealth initially claimed that 100 million Americans were affected, but later raised that number to 190 million. 

There have been countless other incidents, and now you can add another to the list. Community Health Center, Inc. (CHC), a Connecticut-based federally qualified health center, has disclosed a data breach following a criminal cyberattack on its systems. 

The attack has affected over a million people in the U.S.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Community Health Center, Inc. (CHC) detected a data breach on Jan. 2 after identifying unusual activity within its computer systems. An investigation confirmed that a skilled hacker had accessed and extracted data but did not delete or lock any information. If CHC's claims are accurate, this is a positive outcome, as hackers often deploy ransomware, a type of attack in which they lock systems and demand payment before restoring access.

In a regulatory filing with the Maine Attorney General’s Office, CHC said that 1,060,936 people were affected by the data breach. The type of information compromised varies depending on an individual’s relationship with CHC. Patient data that may have been accessed includes names, dates of birth, addresses, phone numbers, email addresses, diagnoses, treatment details, test results, Social Security numbers and health insurance information.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

For individuals who are not regular CHC patients but received COVID-19 services at a CHC clinic, the breached data may include names, dates of birth, phone numbers, email addresses, addresses, gender, race, ethnicity and insurance details if provided. Additional information, such as test dates, results and vaccine details, including type, dose and administration date, may also have been affected. In rare cases, Social Security numbers were also included in the breach.

The organization did not disclose how the hackers gained access to the data or whether proper cybersecurity measures were in place at the time of the breach. While CHC has assured that its systems are no longer at risk, the same cannot be said for its patients, who may now be targets of various cyberattacks.

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

CHC said the hacker’s access was terminated within hours, and daily operations were not disrupted. To strengthen cybersecurity, CHC claims it has implemented advanced monitoring software and reinforced system protections. The organization said there is no evidence at this time that the compromised data has been misused.

The health center is offering free identity theft protection services for all patients and COVID-19 service recipients whose Social Security numbers were involved in the breach. The organization is also encouraging individuals whose Social Security numbers were not affected to take additional steps to protect their information.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

1. Remove your personal information from the internet: The breach has exposed sensitive personal data, making it essential to reduce your online footprint. While no service can guarantee complete data removal, a reputable data removal service can significantly limit your exposure. These services systematically monitor and erase your personal information from numerous websites and data brokers. Check out my top picks for data removal services here.

2. Be wary of mailbox communications: With addresses among the compromised data, scammers may exploit this breach to send fraudulent letters. Be aware of mail claiming missed deliveries, account suspensions or security alerts. Always verify the authenticity of such communications before responding or taking action.

3. Be cautious of phishing attempts and use strong antivirus software: Scammers may use your compromised email or phone number to target you with phishing attacks. Be wary of messages asking for personal information or containing suspicious links. To protect yourself, ensure strong antivirus software is installed on all your devices. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Monitor your accounts: Given the scope of this breach, regular monitoring of your bank accounts, credit card statements and other financial accounts is critical. Look for unauthorized transactions or suspicious activity, and report any issues immediately to your bank or credit card provider.

5. Recognize and report a Social Security scam: If your Social Security number is exposed, you could become a target for related scams. Official communication regarding Social Security issues usually comes via mail, not phone calls or emails. Learn more about spotting and reporting scams by visiting the Social Security Administration’s scam information page.

6. Invest in identity theft protection: Data breaches happen every day, and most never make the headlines, but with an identity theft protection service, you’ll be notified if and when you are affected. An identity theft protection service can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. It can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

One of the best parts of using an identity theft protection service is that it might include identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft. 

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

The CHC breach may not be as large as the UnitedHealth attack, but with over a million individuals affected, it’s still a serious incident. Cybercriminals can exploit stolen data in various ways, from identity theft to targeted phishing scams. While CHC has taken steps to secure its systems, those impacted should remain vigilant. Be wary of unexpected emails, calls or messages requesting personal information, and consider monitoring financial and medical accounts for any suspicious activity.

Do you think these companies are doing enough to protect your data, and is the government doing enough to catch those behind cyberattacks? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels for the latest tech tips and tricks:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: Bill would ban DeepSeek

8 February 2025 at 07:30

IN TODAY’S NEWSLETTER:

- House reps unveil bill banning DeepSeek from US government devices over alleged ties to Chinese government
- Perplexity AI bids on TikTok, CEO says it's a win-win for Trump
- Donny Osmond adds AI version of himself as a teen to Las Vegas residency

'DEEPLY DISTURBING EVIDENCE': House lawmakers are introducing legislation Thursday to ban the Chinese AI DeepSeek from U.S. government devices, arguing that the software is "directly linked to the Chinese Communist Party" and poses a "five-alarm national security fire." 

AN AMERICAN TIKTOK: The CEO of AI startup Perplexity, Aravind Srinivas, confirmed his company’s bid for TikTok U.S. and said the deal checks all the boxes for investors and President Donald Trump, including an ownership stake for the U.S.

SEEING DOUBLE: Donny Osmond is bringing on a new co-star for his Las Vegas residency: himself.

'AI POWERHOUSE' : The White House is opening its artificial intelligence plan up to Americans to contribute policy ideas to the Trump administration to ensure that the United States is "the undeniable leader" in AI technology. 

PEDAL TO THE METAL: For a commander on the battlefield, a split second of decision advantage can determine the difference between victory and defeat. In every battlespace, AI is critical to enabling action at the speed of kinetic and non-kinetic conflict. It is already being successfully applied to rapid data processing, target recognition, combat simulation, countering drones and strategic decision-making for defense missions. And looking across current conflict zones and hot spots, we need its benefits faster than ever before, in environments from urban terrain to cyber, sea and space.

TAKING CHARGE: Sylvester Stallone is the latest celebrity embracing artificial intelligence. The "Rocky" star invested, along with several others, in Largo.ai, an AI-driven analytics platform for film, TV and advertising, raising $7.5 million in financing for the company.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Identify any mystery caller for free with this phone number lookup tool

8 February 2025 at 05:00

Got an unknown number that's been driving you nuts? 

We totally get it. 

Those random calls on your cellphone can be seriously frustrating. And now you can fight back with a simple, free solution. In just a few easy clicks, you'll go from feeling annoyed to being in total control, uncovering exactly who's behind that mysterious phone number.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

The TruePeopleSearch.com website works with both landline and cellphone numbers. It allows you to do a reverse phone lookup for any type of phone number, whether it's a cellphone or a landline. It's important to note that the availability and completeness of information can vary depending on the specific number and its associated public records. 

However, in most cases, with just a few simple steps, you'll go from "Who the heck is calling me?" to "Aha! Now I know exactly who this is." Note that you can also search by name, address and email, as well, but for our example, we'll use a phone number. 

AN ALARMING SPIKE IN SCAM CALLS ORIGINATING FROM ROBOCALLS

Grab your preferred device — be it a computer, smartphone or tablet. Any browser will do, so launch Chrome, Safari or whatever you're comfortable with. Type in truepeoplesearch.com in your browser's address bar. The layout might vary slightly depending on your device, but don't worry — the functionality remains the same.

TOP 10 ROBOCALL HOTSPOTS IN AMERICA

Now, type in that perplexing phone number that's been nagging at you. Hit the search button and watch the magic unfold.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Prepare to be amazed by the wealth of information at your fingertips. Click the "View Details" button next to or under the actual search results, depending on your device. You might discover the person's name, age, date of birth, current address or previous addresses, as well as email addresses, relatives, friends, associates and more. It's astounding how much data a simple phone number can unlock.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Now, beware of Sponsored Links that might try to lure you into signing up for other services.

While TruePeopleSearch.com can be a helpful tool, not every phone number search will yield comprehensive results. The information available varies depending on several factors:

Always use this service responsibly, respect individual privacy and understand that results may be incomplete or vary significantly between different phone numbers.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

Try searching for your own phone number. You might be surprised at the amount of information that pops up. If you're uncomfortable with the information available about you, consider investing in a personal data removal service to have that information taken down. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

This free tool empowers you to take control of solving the mystery of who is calling you. No more wondering about unknown callers or potential spam. With just a few clicks, you can unmask the mystery and decide whether to answer, ignore or block that call.

How do you usually handle unknown callers? Have you ever used a reverse phone lookup tool before? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels for the latest tech tips and tricks:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Robot dog sprints into history books by breaking speed records

7 February 2025 at 11:00

A Chinese team has unveiled a groundbreaking quadruped robot that is pushing the boundaries of robotics and speed. 

The Black Panther 2.0, developed by Zhejiang University's humanoid innovation institute in collaboration with the Hangzhou-based startup Mirror Me, has achieved a remarkable feat by running approximately 100 meters in under 10 seconds.

The design of the Black Panther 2.0 draws inspiration from various animals, resulting in a highly efficient biomechanical structure. Its carbon-fiber shins are modeled after jerboa desert rodents, increasing stiffness by an impressive 135% while only adding 16% to its weight. 

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

The robot features spring-loaded knee joints that act as shock absorbers, mimicking the powerful movements of black panthers. Additionally, its "running shoes," inspired by cheetah claws, enhance grip performance by an astonishing 200%. Standing at 2 feet and 0.8 inches tall and weighing 83.8 pounds, this robot achieves a peak stride frequency of five times per second.

CHINESE TECH FIRM SHARES ROBOT TRAINING SECRETS WITH THE WORLD

The impressive performance of the Black Panther 2.0 is not solely due to its hardware; it also incorporates artificial intelligence and machine learning to adapt its gait in real time for specific situations. This technology allows the robot to coordinate its limb movements using the concept of Huygens' coupled pendulum principle, enabling it to maintain fluid motion on various terrains and pushing it closer to the agility of living organisms.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

GET FOX BUSINESS ON THE GO BY CLICKING HERE

In addition to breaking records, the Black Panther 2.0 has joined the prestigious "10-second club" for the 100-meter sprint, surpassing the previous record holder, HOUND, which was developed at Korea's Advanced Institute of Science and Technology. This achievement positions the robotic dog ahead of most human sprinters, although it still trails behind some of nature's fastest runners, like cheetahs, ostriches and wildebeests.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

NO TENNIS PARTNER? NO WORRIES WITH THIS AI ROBOT

The development of the Black Panther 2.0 opens up exciting possibilities for the future of robotics. Its high-power-density motor drivers suggest potential industrial applications, while its design invites further exploration into the differences between robotic and biological mobility. This technology could also be utilized in search and rescue operations or for exploring hazardous environments.

Would you feel comfortable having a robot like the Black Panther 2.0 working alongside you, or would its advanced capabilities make you nervous about potential job displacement or safety concerns? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter 

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Beware of fake Reddit solutions delivering dangerous malware

6 February 2025 at 09:00

Sometimes, when you need an answer to a complex life situation or a way to troubleshoot an error on your computer, regular articles on the web don’t help. Some issues are so niche that no one writes about them, and those who do often say nothing useful in 1,000 words. 

In these cases, adding Reddit to your search query can be a game changer. Nine times out of 10, someone on Reddit has faced the same issue, and there's probably a solution. 

But bad actors have caught on to this, too. They’re now mimicking Reddit to spread malware that can steal your personal information.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Hackers are distributing nearly 1,000 fake websites mimicking Reddit and WeTransfer to spread the Lumma Stealer malware. These sites are designed to trick you into downloading malicious software by imitating legitimate discussions and file-sharing services.

On these fake Reddit pages, attackers create a fabricated discussion where one user asks for help downloading a tool, another offers a WeTransfer link and a third expresses gratitude to make the exchange seem real. Clicking the link redirects victims to a counterfeit WeTransfer site, where the download button delivers the Lumma Stealer malware.

All these fake pages have the following things in common:

These fake websites were discovered by Sekoia researcher crep1x, who compiled a full list of the pages involved in the scheme. In total, 529 of these sites mimic Reddit, while 407 impersonate WeTransfer to trick users into downloading malware.

According to BleepingComputer, hackers may be driving traffic to these fake pages through methods like malicious ads (malvertising), search engine manipulation (SEO poisoning), harmful websites, direct messages on social media and other deceptive tactics.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

Hackers are using fake Reddit pages to spread Lumma Stealer, a powerful malware designed to steal personal data while staying under the radar. Once it infects a device, it can grab passwords stored in web browsers and session tokens, allowing attackers to hijack accounts without even needing a password.

But Reddit isn’t the only way this malware spreads. Hackers also push it through GitHub comments, deepfake websites and shady online ads. Once they steal login credentials, they often sell them on hacker forums, where others can use them for further attacks.

This type of malware has already played a role in major security breaches, including attacks on PowerSchoolHot Topic, CircleCI and Snowflake. It’s a growing threat, especially for companies that rely on password-based security.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

1. Be cautious with download links: Avoid downloading files from random Reddit discussions, social media messages or unfamiliar websites. If an unknown user shares the link or seems out of place in the context, it’s better to err on the side of caution. If the link is directing you to a file-sharing site like WeTransfer or Google Drive, double-check the URL for any signs of manipulation—like random characters added to the domain name.

2. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware originating from these Reddit discussions, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Verify website URLs: Fake websites often look convincing but have slight differences in their URLs. Check for misspellings, extra characters or unusual domains (e.g., ".org" or ".net" instead of the official ".com").

4. Use strong, unique passwords and enable 2FA: password manager can help generate and store strong passwords for each site. Meanwhile, enabling two-factor authentication (2FA) adds an extra layer of security, making it harder for attackers to hijack your accounts. Get more details about my best expert-reviewed Password Managers of 2025 here.

5. Keep your software updated: Regularly update your operating system, apps, browsers and other software on your PC or mobile devices. Updates often include patches for security vulnerabilities that hackers can exploit.

6. Watch out for malvertising and SEO traps: Hackers manipulate search engine results and run deceptive ads to trick users into visiting fake sites. Stick to official sources and avoid clicking on ads or search results that seem too good to be true. 

HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY

Hackers are getting sneakier, using fake Reddit and WeTransfer pages to spread dangerous malware like Lumma Stealer. These sites might look real, but they’re designed to steal your personal info. To stay safe, always double-check links and be cautious about downloading files from unfamiliar sources. Use strong, unique passwords, enable two-factor authentication and keep your software updated to stay one step ahead of cybercriminals.

Have you ever encountered a suspicious link on Reddit or social media? How did you handle it? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Smart windows take a page from nature's pinecone playbook

6 February 2025 at 05:00

Have you ever wondered how a pine cone knows when to open and close? It's not magic, it's science

Now, researchers have taken this cue from nature to create something pretty cool for our homes. 

Let's dive into how this revolutionary window technology works, keeping your home comfortable without using a single watt of electricity.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Pine cones have these amazing scales that respond to moisture. When it's damp, they close up tight. But when it's warm and dry, they open wide to release their seeds. This simple yet effective mechanism has inspired scientists to develop a smart window system that could change the way we think about energy efficiency in buildings.

SOLAR DEVICE TRANSFORMS USED TIRES TO HELP PURIFY WATER SO THAT ITS DRINKABLE

Scientists from Germany's universities of Stuttgart and Freiburg have developed what is known as the Solar Gate window facade system. It's like having tiny pinecones built right into your windows. These smart windows have special elements that curl up when it's cool and moist, letting in sunlight to warm your home. But when it's hot and dry, they flatten out to block the sun and keep things cool inside.

NEVER NEED AN EV CHARGING STATION AGAIN WITH THESE ROOFTOP SOLAR POWER PANELS

The Solar Gate system consists of a gridded array of pine-cone-scale-inspired self-bending elements housed between two panes of glass in an aluminum-frame window unit. Each element is ingeniously crafted with three distinct layers, each serving a unique purpose. The bottom layer is composed of a cellulose powder and a thermoplastic blend that swells when exposed to moisture. Above this lies a middle layer made of thermoplastic, which remains unaffected by moisture.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

The top layer consists of flexible biocomposite filaments that serve to hold the entire structure together. When exposed to moist air, the bottom layer expands, causing the element to curl upwards. Conversely, in dry conditions, it returns to its flattened state. This simple yet effective mechanism allows the window to respond automatically to changing weather conditions, providing optimal shading and light penetration as needed.

SOLAR-POWERED BLIMP COULD BRING HIGH SPEED INTERNET TO YOUR AREA

The Solar Gate system underwent rigorous real-world testing to prove its effectiveness. In a comprehensive year-long study, researchers installed 424 Solar Gate elements in the south-facing skylight of a research building at the University of Freiburg. The results of this extensive trial were nothing short of impressive.

During the cool, wet winter months, the elements responded by curling upwards, allowing ample sunlight to penetrate the building. This natural response effectively warmed and illuminated the interior spaces, reducing the need for artificial heating and lighting. Conversely, as the seasons changed and brought warmer, drier summer conditions, the elements automatically flattened out.

This flattening action served to block excess sunlight, effectively keeping the building's interior cool and comfortable without the need for energy-intensive air conditioning. The test demonstrated the system's ability to autonomously adapt to changing weather conditions, providing optimal comfort and energy efficiency throughout the year.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

5 BEST PORTABLE CHARGERS FOR ANY OCCASION 

This innovative approach to building technology has far-reaching implications beyond just window systems. Researchers have already begun exploring similar biomimetic principles in a variety of applications. For instance, studies have investigated the development of shading systems using wooden slats that can open and close in response to environmental conditions.

In the realm of textiles, scientists are working on "smart" clothing fabrics that can adapt to ambient temperature, providing optimal comfort for wearers. Perhaps most intriguingly, these principles are even being applied to the field of robotics, with researchers developing tiny mobile robots that can respond to environmental stimuli in ways inspired by natural mechanisms. As we continue to draw inspiration from nature's ingenious designs, the potential for creating more sustainable and responsive technologies seems boundless.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Nature never ceases to amaze us with its ingenious solutions, and the Solar Gate window system is a brilliant example of how we can harness these natural wonders. By mimicking the pinecone, scientists have created a game-changing technology that could revolutionize how we approach energy efficiency in our buildings. It's exciting to think about a future where our homes and offices adapt to the environment just like living organisms do. Who knew that the key to smarter buildings was hiding in our forests all along?

Would you feel comfortable having windows that automatically open and close based on moisture and temperature — without any electrical controls? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: AI takes big step forward with 3D-printed shoe

5 February 2025 at 10:56

IN TODAY’S NEWSLETTER:

- World's first AI-designed, 3D-printed shoe wants to be the next Crocs

- Trump's AI czar flags report questioning DeepSeek's cost of developing AI models

- Wheeled wonder robot dog shows off crazy dance moves in all kinds of tough terrain

INNOVATIVE STEP FORWARD: Syntilay, a startup with a sparkle in its eye and artificial intelligence on its mind, has just unveiled what it claims to be the world's first entirely AI-designed and 3D-printed shoe.

SETTING THE RECORD STRAIGHT: President Donald Trump's artificial intelligence czar, David Sacks, is pointing to evidence that China's DeepSeek AI startup spent a lot more money developing its models than has been reported.

ROBOT’S GOT MOVES: Deep Robotics, a Chinese robotics firm, recently unveiled its latest innovation in quadruped robotics, the Lynx.

SPUTNIK MOMENT: If you care about national security, artificial intelligence (AI) or the index funds in your retirement account, you have likely heard of DeepSeek. Chinese AI model DeepSeek’s release late January caused a $969 billion stock market selloff and prompted responses from AI leaders like President Donald Trump, NVIDIA, venture capitalist Marc Andreessen and OpenAI CEO Sam Altman.

AUTONOMOUS BIG RIGS: Are you ready to share the road with massive semi-trucks cruising down the highways next to you without a human driver? Well, that is one step closer, thanks to the groundbreaking partnership between Kodiak Robotics and Atlas Energy Solutions. These innovative companies have just pulled off something incredible. They successfully launched the first-ever commercial driverless trucking operation.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

How to minimize your digital footprint when you travel

5 February 2025 at 09:00

Those of us old enough to remember traveling before the age of smartphones and mobile internet know we have it pretty good these days. You can find the best flights using comparison sites, choose among hundreds of hotels on a single booking site, get tickets sent to your phone rather than picking them up in person, check in online, order a ride and you’re off. 

All this, of course, comes with downsides and trade-offs. 

Most people’s biggest concerns are "getting hacked," which, when you get down to it, really means "being robbed in ways I don’t quite understand." But that’s one of those risks that, although very real, is unlikely to happen if you take the usual precautions. 

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

In a time when personal information is said to be worth more than oil, bad actors are often interested in getting their hands on your personal data as much as your money. And a "bad actor" need not be some guy with his hood up, hunched over a laptop in the back of a coffee shop. 

In 2024, for example, ClassAction.org reported on suspicions of major cruise lines illegally sharing consumers’ data with Facebook. Cruise lines RoyalCaribbean.com, CelebrityCruises.com, Princess.com and HollandAmerica.com are suspected of collecting personal information through the sneaky "Meta tracking pixel" and sending it to Facebook without users’ consent. 

Booking.com, a site most of us have used at one time or another, has also had its fair share of problems. The website has been battling waves of hacking attacks aimed at defrauding its customers; it’s faced accusations of not doing enough to protect its customers and has even been fined for failing to disclose a data breach on time. 

Data gathered from these kinds of incidents often ends up circulating online, being added to what was already out there before, just waiting for someone or some company to make use of it.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

THE BEST TRAVEL GEAR FOR 2025

Avoiding cruise lines and booking sites altogether is hardly a practical solution when you need to book a cruise or accommodation. Here are some things you can do to dramatically reduce the risk when booking flights, cruises, vehicles and accommodation.

1. Invest in personal data removal services: While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

2. Use personal security caution: Don't sign in to anything using your social media accounts. Sign in with your email instead and be sure to use an email address you've set aside just for these kinds of situations.

3. Do your homework online: Do an online search for the booking website, cruise line or travel agency in question, keeping an eye out for any recent reports of scams or other issues.

4. Check company reputation carefully: Check ClassAction.org, the Better Business Bureau and Trustpilot specifically. This will help you gain comprehensive insights into a company's track record, customer experiences and potential issues.

5. Verify communication legitimacy: Whenever you receive a call, email or text message from a booking service, confirm that it's really them by first checking your account directly and then contacting the company through official, publicly listed channels (not social media).

BEST TRAVEL ADAPTERS OF 2025

Here are some of the "usual precautions" that can protect you from "getting hacked" while traveling.

1. Update all your apps and operating systems before heading off: All those security patches are that much more important while you're traveling. You'll want to download and install all pending updates at least 24-48 hours before your departure, ensuring you have the latest security protections and giving yourself time to troubleshoot any potential update-related issues that might arise. 

2. Lock everything down: Use strong, unique passwords and a reliable password manager to keep track of them.

3. Turn on two-factor authentication where available: Prioritize using authenticator apps over SMS-based codes. This provides a more secure second layer of verification, as authenticator apps are less vulnerable to SIM swapping attacks and interception compared to text message-based authentication. Choose reputable authenticator apps, which generate time-based one-time passwords that change frequently and are tied directly to your device.

4. Keep location services turned off: NFC, Bluetooth and Wi-Fi should also be turned off while you’re not using them. That’ll make your battery last longer as a side benefit.

5. Go dark: Don’t publicly share news of your trip until you’re back. Avoid posting about your vacation on social media or keeping a blog about your adventures, as this information can be used by criminals to piece together a snapshot of your life.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

6. Limit social media use: Scammers and hackers often exploit social media to gather personal information and target travelers. To stay secure, avoid sharing trip details publicly and use a privacy-focused messaging app like Signal to stay in touch with family and friends.

7. Use privacy-focused browsers: You should consider using browsers like Brave or Firefox with privacy extensions. Enabling "do not track" settings and utilizing private/incognito mode can provide an extra layer of digital protection.

8. Disable automatic Wi-Fi and Bluetooth connections: Disable settings that automatically connect to networks and manually select and verify networks before connecting. This prevents your device from inadvertently joining potentially unsecured networks.

9. Use encrypted messaging and email: Protect your private communications by using services that offer end-to-end encryption for both messaging and email. These platforms ensure your data remains secure from unauthorized access, with features like encryption for non-users, multifactor authentication and tracking protection. See my review of the best secure and private email services here.

10. Travel with minimal digital gear: Consider bringing a "travel-only" phone or laptop with minimal personal data.

11. Be cautious of public charging stations: Avoid using public USB charging ports that could potentially compromise your device. Instead, carry a portable phone charger with you.

12. Monitor your accounts: Set up transaction alerts on financial accounts and use credit cards with strong fraud protection. Regularly check your accounts while traveling to quickly detect any suspicious activity.

13. Bring your own internet access with you: Find a local or international SIM, a mobile hot spot and a trusted VPN (virtual private network) service for those times you can’t help but use public Wi-Fi. Using a VPN can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

5 WAYS TO SECURELY ACCESS WI-FI ON YOUR PHONE WHILE TRAVELING

There’s plenty of good advice out there when it comes to avoiding public Wi-Fi and protecting your documents while traveling. To really stay safe, though, it’s important to start thinking about your data privacy and data security before even booking your trip. It doesn’t take much when all is said and done, but it could make a huge difference to how you remember your trip for years to come.

When was the last time technology made your travel more stressful instead of easier? What happened? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

❌
❌