Normal view

Before yesterdayMain stream

Never lose cell service again with this space-age satellite tech

9 February 2025 at 05:00

Imagine never being without a cell signal again, anywhere, any time on the planet. 

That's exactly what AST SpaceMobile is working to achieve. Founded in the heart of Texas in 2017, this innovative company is developing the world's first global cellular broadband network that can connect directly to your everyday smartphone, no special equipment required. 

Its mission? To ensure that no matter where you are around the globe — from remote mountain ranges to isolated islands — you'll never be out of touch again.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

AST SpaceMobile made history in April 2023 by completing the first two-way phone call via space on an unmodified cell phone. This milestone was achieved using its low Earth orbit satellite, Blue Walker 3 (BW3), which was launched aboard a SpaceX Falcon 9 rocket in September 2022.

IPHONE'S SATELLITE MESSAGING: A CRUCIAL LIFELINE DURING A STORM

Since its inception, AST SpaceMobile has made remarkable technological advancements. In September 2023, it achieved a 14-Mbps data stream on the BW3 satellite. A year later, in September 2024, the company launched five additional satellites, BlueBird 1 through 5. The ultimate goal is to establish a constellation of 168 satellites, offering speeds up to 120 Mbps.

IS YOUR PHONE READY FOR AN EMERGENCY? TURN ON THESE LIFESAVING SETTINGS

AST SpaceMobile has forged strategic partnerships with major telecom players across the globe. In the United States, it has partnered with AT&T and Verizon. Internationally, it has teamed up with Bell Canada, Rakuten, Vodafone and other telecommunications providers. These partnerships potentially give about 2.8 billion people worldwide access to its satellite network.

 BAD WEATHER? HOW TO GET SURVIVAL-READY IN ANY STORM

AST SpaceMobile's approach to satellite connectivity is uniquely innovative. It focuses solely on direct-to-cell service, distinguishing itself from other competitors. Its current BlueBird satellites unfold to approximately 700 square feet in space, with future satellites planned to be three times larger and offer ten times the data capacity. Impressively, 95% of its manufacturing process is completed in house in the United States.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

CELL PHONE BOOSTERS VS. MOBILE HOTSPOTS: WHAT’S THE DIFFERENCE AND HOW DO YOU CHOOSE?

While both AST SpaceMobile and Elon Musk's Starlink aim to provide global connectivity, their approaches significantly differ. AST SpaceMobile is built for direct-to-cell service, requiring no special equipment for users.

Starlink, primarily a data-focused service, has only recently launched modified satellites for direct-to-cell capabilities. AST's focus on unmodified smartphones gives it a unique advantage in accessibility.

Despite the promising technology, the company faces several challenges. The brightness of satellites like BW3 could potentially interfere with astronomical observations. There are concerns about possible interference with radio-quiet zones used for scientific research. The increasing number of satellites also contributes to growing space debris concerns.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

As of January 2025, AST SpaceMobile has not yet announced specific pricing for its services. However, given its partnerships with major carriers like AT&T and Verizon, it's likely that the service will be offered as an add-on to existing cellular plans. The company aims to provide coverage to remote areas and eliminate dead zones, suggesting that pricing may be competitive to attract a wide user base.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

AST SpaceMobile's innovative approach to global connectivity has the potential to revolutionize how we stay connected, especially in remote areas. While challenges remain, the benefits of ubiquitous communication, particularly in emergency situations, are compelling. As the company continues to expand its satellite network and partnerships, we may soon see a world where being "out of range" is a thing of the past.

If universal satellite connectivity could solve one major communication challenge in your life, what would it be? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Can I outsmart thieves with a hidden AirTag in RFID wallet?

4 January 2025 at 07:00

Apple AirTags can be a great way to outsmart car thieves, but there are some drawbacks to consider. A key limitation is that thieves who also have iPhones can usually detect a hidden AirTag in vehicles they are trying to steal. This makes hiding an AirTag tricky.

That’s why we were intrigued by Brian’s inquiry about using other ways to make Apple AirTags undetectable to car thieves or outsmarting them twice.

"If an AirTag is put in an RFID wallet and hidden in a car, can the AirTag be located by a thief using a locator? I know the AirTag will function in the wallet, but will it be undetectable by the thief?" — Brian, LaSalle, Illinois

Below are reasons why using an RFID wallet might end up leaving you outsmarted instead.

I’M GIVING AWAY THE LATEST AND GREATEST AIRPODS PRO 2

Some thieves use RFID readers, which use radio waves, to scan and read data such as credit cards in wallets. The function of RFID wallets and bags is to protect items or devices from these radio waves by blocking them.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Apple AirTags use different technology, so even if it was placed in an RFID-blocking wallet or bag, it could still be detected by a thief with an iPhone or locator. Unlike the radio waves used to scan for credit cards and other data, Apple AirTags use Bluetooth and Ultra-Wideband (UWB) technology. Neither technology can be shielded by RFID-blocking material because those materials cannot block Bluetooth and UWB signals.

DO EMF BLOCKERS REALLY PROTECT US?

Faraday bags, on the other hand, use electromagnetic shielding and can successfully block Apple AirTag signals, such as Bluetooth and Wi-Fi signals, from being detected by thieves. The only issue with putting an Apple AirTag in a Faraday bag to hide in your car is that if the car thief cannot read or locate the signal it emits, you cannot either.

While the Apple AirTag may go undetected when in a Faraday bag, you will likely not be able to use FindMy or any other tracking methods to locate it either, because those methods require signals pinged from the AirTag to other iPhones and Apple Devices to track location.

BEST CAR ACCESSORIES

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

While Apple AirTags offer some benefits, there are other technologies and methods to consider for enhancing car security. For example, GPS trackers provide real-time location data without the risk of being detected by a nearby iPhone. Additionally, physical deterrents like steering wheel locks and alarm systems can act as effective safeguards. Combining multiple layers of security can better protect your vehicle against theft. Check out how to prevent your car from being stolen.

HOW TO OUTSMART CAR THIEVES WITH THESE SMART AIRTAG TACTICS

While Apple AirTags can be a useful device to help you keep track of your vehicle, whether it is lost or stolen, it does not replace the reliability of a GPS system installed in your vehicle if you are trying to outsmart car thieves. Because car thieves might be able to locate an Apple AirTag hidden in your vehicle, it may not provide the layer of protection you hope for. Though the technology in RFID wallets will not block signals from an Apple AirTag, which will make them detectable to locators and scanners, Faraday bags will. Unfortunately, you will end up outsmarting yourself in trying to outsmart car thieves if you use a Faraday bag because you will then not be able to track the Apple AirTags either. If you are looking for the optimal way to outsmart car thieves, the Apple AirTags might not be the answer you are looking for.

What personal experiences have you had with technology aiding in theft prevention? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

The biggest Wi-Fi mistake you didn’t know you were making

31 December 2024 at 16:14

You’ve got dinner in the oven, you’re looking for extra glasses, and your cousin’s kid screams (again), "What’s the Wi-Fi password?" You’re juggling a hundred things at once, and the last thing you want to do is to spell out your password.

Here’s the good news: You can slap a printout on the fridge, and everyone can scan it with their phones to connect. But first, I’ll show you how to create a separate network so you don’t need to worry about little Billy getting into your personal stuff on your devices and computers.

SCAMMERS ARE TARGETING TEENS WITH THESE NASTY TRICKS

I share smart tech news and tips you can use every single day. Join 600K readers who get The Current.

Be my guest

When guests connect to your main Wi-Fi, they can potentially access devices like smart TVs, printers, and even your laptop or phone if file sharing is enabled. Worse, if their device is compromised, your whole network could be at risk. A guest network keeps everyone happy while keeping your private life private.

Most modern routers let you set up a guest network without having to be a tech guru. Warning: This will take you a few minutes, but it’s totally doable.

RELATED: Is your internet slo-o-o-w? Let’s fix that.

Step 1: Log into your router’s admin console. You’ll need your IP address. You can usually find this on a sticker on the bottom or side of your router. Seeing 192.168.1.1 or 192.168.0.1 is common.

If you don’t see yours …

Step 2: Open your browser, type http:// and paste in your IP address. Hit Enter to open a login page. For the credentials, try the username admin and the word password for the password. If the defaults are different, they’re likely printed on your router. You can also check this site that lists default passwords for almost every router in use.

Step 3: Look for a setting called Guest Network or Guest Wi-Fi. Give it a different name (aka SSID) than your main network, along with a strong, unique password.

TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE

If you have snoops in the family … When family and friends connect to your Wi-Fi guest network, you can block them from accessing your files or devices on your primary network. Turn off the local access setting.

Sorry, but dedicated snoops won’t stop at one closed door. Here’s a sign someone is poking around.

While you’re at it, a quick security check

Before you finish, take these extra steps to lock things down:

BIOMETRIC DATA: IS IT SAFE TO HAND IT OVER TO ANY COMPANY THAT ASKS?

Your network is a bigger target than you realize.

Now for the fun part

Create a QR code that automatically connects guests to your new guest network — no hassle, no drama. With the free site QIFI.org, all you need is three pieces of info:

Hit Generate and your QR code is ready. Print some copies of it to hang around the house, or do what I did: Order this custom sign that looks classy. Now, when someone asks for the Wi-Fi password, you can just point.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

How to restore deleted text messages on Android

30 December 2024 at 05:00

We've all been here before. All of us have, at one point or another, accidentally deleted an important text. Gloria, from Chepachet, Rhode Island, reached out to us with this question:

"I accidentally deleted a text message; how can I get it back on my Android phone?"

We’re sorry to hear that you’ve accidentally deleted a text message. The ability to recover it depends on several factors, including your phone model, whether a backup was made and the specific messaging app you’re using. Here are some general methods you can try. (iPhone users, follow these tips.)

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

If you have an Android-based phone or a Google account, you may use Google Messages as your primary platform for text messages. Here's how to check if your message was archived within Google Messages.

Settings may vary depending on your Android phone’s manufacturer. 

ACTIVATE AUTO-REPLY FOR TEXT MESSAGES ON ANDROID

Settings may vary depending on your Android phone’s manufacturer. 

If you are using a Samsung-based smartphone, your text messages can be stored in the Samsung OS's Recycle Bin for up to 30 days. If you are using a Samsung smartphone, here's how to check the built-in recycling bin app to see if your messages are in there:

GET QUICK ACCESS TO YOUR FAVORITE APPS WITH SAMSUNG GALAXY'S EDGE PANELS

If you don’t have a backup and your messages are permanently deleted, you might still have a chance to recover them using a third-party Android data recovery app. You can find Kurt’s picks for data recovery software here. Different apps will have different features, so be sure to pay close attention to which third-party recovery solution is the right one for your needs.

If you’ve backed up your phone to Google Drive, you may be able to restore your backup to recover the deleted text messages. Please note that restoring a backup might overwrite the existing data on your phone. Here's how to check and see if you have a Google Drive backup for your smartphone:

Settings may vary depending on your Android phone’s manufacturer. 

7 THINGS GOOGLE JUST ANNOUNCED THAT ARE WORTH KEEPING AN EYE ON

Gloria, hopefully, we were able to help you restore the missing Android message. Regularly backing up your data to prevent future data loss is always a good idea. If you have an Android smartphone, I strongly recommend using Google Drive to back up your phone; that way, you can always access the backup within your Google account. If you can't find your deleted messages in your phone's trash bin or recycling bin, don't panic. You can still most likely get any deleted data back with a third-party program, but check any program's features before paying.

Have you ever experienced significant data loss? What lessons did you learn from that experience? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Are your smart home cameras spying on you? Study reveals shocking data grabs

29 December 2024 at 07:00

Smart home cameras have become a necessity. You already know they help keep an eye on what’s happening indoors and outdoors, even when you’re not home. 

But while these cameras are undeniably useful, they also pose a privacy risk. A new study highlights outdoor security camera apps as some of the biggest collectors of user data. 

This includes sensitive personal information like email addresses, phone numbers, payment details, precise location and more.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

According to a study conducted by Surfshark, outdoor security camera apps are some of the top offenders when it comes to collecting user data. These apps gather 12 data points on average, including sensitive details like email addresses, phone numbers, payment information and precise location. That’s 50% more than what other smart home devices typically collect. What’s even worse is that these apps often connect up to seven of these data points directly to your identity.

Indoor security camera apps are slightly less data-hungry but still raise privacy concerns. They collect an average of nine data points, with six typically tied to users' identities. Commonly collected data includes email addresses, phone numbers, user IDs, device IDs, purchase histories and audio data. While this information can help improve the user experience, it also increases the risk of privacy violations.

One of the biggest concerns with both outdoor and indoor security camera apps is the kind of data they collect. Many of these apps gather personal info like your name, email, phone number and physical address. Some apps, such as Arlo, Deep Sentinel, and D-Link, even grab data about your contacts, which can be accessed outside of the app. This data isn’t actually necessary for the apps to do their job.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Among the apps that collect the most data, Deep Sentinel and Lorex stand out for outdoor security cameras, each collecting 18 out of a possible 32 data points. Nest Labs, which leads the pack for indoor cameras, collects 17 data points, with Ring and Arlo each gathering 15.

The absence of regulations and standards for smart home devices creates significant privacy risks. Without clear guidelines, users are vulnerable to data breaches, cyberattacks and even physical harm. Some apps track users for targeted ads or share data with third parties and data brokers. While outdoor security cameras typically avoid tracking, indoor cameras like Nooie and Canary Connect engage in user tracking, further complicating privacy concerns.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

1. Limit data sharing: Look for smart home camera apps that allow you to control what data is shared. Many apps offer settings that let you disable certain data collection features, like location tracking or audio recording. Customizing these settings can significantly reduce your risk of exposing personal information.

2. Regularly review and update privacy settings: Smart home cameras often receive software updates that may change privacy settings. It’s important to regularly review the app’s privacy settings to make sure they align with your preferences. Disable features that aren’t essential, such as sharing data with third-party apps or advertisers.

3. Use strong passwords and two-factor authentication (2FA): Make sure your camera’s app and associated accounts are protected by strong, unique passwords. Consider using a password manager to generate and store complex passwords.

4. Enable two-factor authentication (2FA) wherever possible: This adds an extra layer of security in case your account information is compromised.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

5. Be mindful of camera placement: If your camera is collecting sensitive data like audio or images of people in your home, be mindful of where you place it. Avoid positioning cameras in private areas like bedrooms or bathrooms. This reduces the amount of potentially sensitive data the camera can capture.

6. Consider using local storage instead of cloud services: Some cameras offer local storage options, where footage is stored directly on a device like a hard drive or SD card, rather than in the cloud. This keeps your data more secure since it’s not accessible via the internet and is less likely to be exposed during a data breach.

7. Use a VPN: Encrypt your internet connection with a VPN to safeguard data transmitted from your smart home devices. This is an easy yet powerful way to add an extra layer of protection to your network. Using a VPN (Virtual Private Network) service can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices

8. Regularly review privacy policies: Stay informed about how your devices and apps collect, store and share your data. Ensure that you are aware of any changes to privacy terms that may affect your information.

9. Consider home security systems with enhanced physical security features, but be aware that, like all smart devices, they collect a variety of user data, including personal information, device data and location tracking. To minimize privacy risks, here are some tips for adjusting the settings within most security system apps:

By actively managing these settings and using a VPN, you can significantly reduce your exposure to potential privacy risks associated with your smart home system. Check out my picks for best security systems.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

The rapid rise of IoT tech has changed the way we live and interact. But without proper rules in place, companies might put profits over user safety. This can lead to devices with security holes and weaknesses. A lot of smart home cameras are collecting more data than they really need and aren't clear about what they’re doing with it. It could be sold to third-party companies or used to target you with ads.

Do you feel comfortable with the amount of data your smart home devices collect? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com.  All rights reserved.

❌
❌