Normal view

There are new articles available, click to refresh the page.
Before yesterdayTechnology News Articles on Fox News

Big rigs deliver cargo with no humans at the wheel

3 February 2025 at 06:00

Are you ready to share the road with massive semi-trucks cruising down the highways next to you without a human driver? Well, that is one step closer, thanks to the groundbreaking partnership between Kodiak Robotics and Atlas Energy Solutions. These innovative companies have just pulled off something incredible. They successfully launched the first-ever commercial driverless trucking operation.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Kodiak Robotics has become the first company globally to deliver a driverless semi-truck to a customer while also being the first to generate ongoing revenue from driverless trucks. Atlas Energy Solutions, in turn, has made history as the first customer to launch a commercial delivery operation using driverless semi-trucks.

Don Burnette, founder and CEO of Kodiak Robotics, tells CyberGuy, "Through this partnership, we are providing a critical service to Atlas, helping them to provide freight service in one of America’s most difficult trucking environments."

YOU WON’T BELIEVE HOW FAR VOLVO'S NEW ELECTRIC SEMI-TRUCK GOES ON A SINGLE CHARGE

Atlas has successfully completed 100 loads of proppant sand deliveries using Kodiak RoboTrucks, establishing itself as the pioneer in making driverless deliveries with its own autonomous fleet. The operations span the 75,000 square mile Permian Basin in West Texas and Eastern New Mexico, showcasing the scalability and efficiency of the technology.

Burnette emphasized that "before launching driverless service, we completed our safety case – Kodiak’s comprehensive study that demonstrates the safety of our self-driving system – for work in the Permian Basin."

YOUR QUESTIONS ANSWERED - EXPLORING HYDROGEN-POWERED VEHICLES FOR THE FUTURE OF TRANSPORTATION

THE FUTURE OF TRUCKING ROLLS FORWARD IN SHELL'S EXPERIMENTAL BIG RIG

The high demand in the Permian Basin is driving rapid scaling of operations, enabling Kodiak to earn significant revenue from its RoboTrucks faster than any other autonomous truck company. This accelerated growth demonstrates the commercial viability of autonomous trucking technology.

"We are now working to extend the safety case to highways over the course of 2025," Burnette said. "This large-scale operation allows us to rapidly accumulate driverless experience, which will benefit our on-highway customers and contribute to the successful launch of our on-highway driverless operations. We believe we have a 12- to 18-month lead on launching driverless semi-trucks at scale."

TECH TURNING BIG RIGS, TRUCKS, EVEN TANKS INTO SELF-DRIVING VEHICLES

Concurrent with the RoboTruck operations, Atlas has launched the Dune Express, a 42-mile autonomous conveyor belt in the desert that delivers sand to the autonomous RoboTrucks. This integration of the RoboTrucks and the Dune Express is a key component of Atlas' strategy to automate its entire supply chain, promising increased efficiency and safety in industrial logistics.

The autonomous trucking industry stands on the brink of a transformative era, with pioneering companies like Kodiak Robotics leading the charge toward a more efficient and technologically advanced transportation landscape.

"We are encouraged by Transportation Secretary Sean Duffy’s strong commitment to creating a national regulatory framework for autonomous vehicles and are confident the new administration will ensure a clear path for innovators," Burnette said. "Ultimately, autonomous trucks will increase American competitiveness, reduce inflation, and help ensure U.S. technology leads in the 21st century. All indications suggest the industry expects the Trump administration to be favorable toward autonomous trucking. We are committed to maintaining American leadership in realizing this vision."

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The partnership between Kodiak Robotics and Atlas Energy Solutions represents a pivotal moment in the transportation industry. By successfully deploying autonomous trucks in commercial operations, they have proven the technology's readiness, as well as its economic viability. This breakthrough is likely to accelerate the adoption of autonomous trucking across various sectors, potentially reshaping the future of logistics and supply chain management.

Would you feel comfortable sharing the highway with a driverless semi-truck? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

China unveils the world’s fastest high-speed train with a top speed of 280 mph

2 February 2025 at 06:00

In a significant advancement for high-speed rail technology, China recently unveiled the CR450 bullet train prototype in Beijing. 

This state-of-the-art train is a testament to China's commitment to leading the world in railway innovation. 

With a test speed of 280 mph, the CR450 is poised to break records and set new standards in the area of high-speed travel.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

The CR450 is designed to operate at an impressive 248 mph, surpassing its predecessor, the CR400, which operates at 217 mph. This significant increase in speed is accompanied by a remarkable reduction in operational resistance by 22% and a weight decrease of 10%, thanks to the use of advanced materials, such as carbon fiber composites and magnesium alloys.

CALIFORNIA'S FIRST ELECTRIC TRAIN COULD BE WHAT’S COMING TO YOUR CITY

Equipped with over 4,000 sensors, the CR450 features intelligent monitoring systems that allow for real-time data collection on various operational parameters, including axle temperature and pressure. This technology enhances safety and efficiency, enabling the train to adapt to changing conditions autonomously.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

CHINA SETS WORLD RECORD FOR FASTEST HYPERLOOP TRAIN

Passenger comfort has not been overlooked. The CR450 includes noise reduction technologies that lower interior noise levels by two decibels compared to earlier models. Additionally, it offers more passenger space, expanding service areas by 4%. 

The design incorporates aerodynamic features aimed at minimizing air resistance, ensuring a smoother ride even at high speeds.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

MONSTER PLANE COULD REPLACE TRUCKS AND TRAINS

Safety remains a top priority with the CR450. It features a braking response time of approximately 1.7 seconds, allowing it to come to a complete stop from its operational speed within 21,325 feet, the same distance required by the CR400. Furthermore, an over-the-horizon system enhances emergency situation recognition capabilities.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

The China State Railway Group has announced plans for extensive line testing of the CR450 prototypes to refine technical specifications before entering commercial service. The goal is to integrate this advanced technology into China's already extensive high-speed rail network, which spans over 24,855 miles.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The unveiling of the CR450 bullet train marks an exciting chapter in high-speed rail travel. With its impressive speed, innovative technology and focus on passenger comfort, it promises to transform how we think about train travel. As China continues to lead in railway advancements, we can look forward to a future where traveling at unprecedented speeds becomes a reality for millions.

What are your thoughts on whether the U.S. should strive to keep pace with or surpass China's advancements in high-speed rail technology? Do you believe investing in high-speed rail is essential for the future of transportation in America? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Fox News AI Newsletter: Another Chinese company flexes AI muscle

1 February 2025 at 08:30

IN TODAY’S NEWSLETTER:

- Alibaba touts new AI model it says rivals DeepSeek, OpenAI, Meta's top offerings
- DeepSeek is the newest front in the AI competition between the US and China
- DeepSeek fallout: GOP Sen Josh Hawley seeks to cut off all US-China collaboration on AI development

HEATING UP: Chinese tech giant Alibaba is flexing its muscles in the global race for artificial intelligence dominance, claiming the latest version of its Qwen 2.5 can take on the top models from rivals both foreign and domestic.

NEWEST FRONT: OPINION: DeepSeek's release of a high-profile new AI model underscores a point we at OpenAI have been making for quite some time: the U.S. is in a competition with the Chinese Communist Party that will determine whether democratic AI wins over the Chinese Communist Party's authoritarian version of the technology. The U.S. must come out on top – and the stakes could not be higher.

DEEPSEEK DANGER: This week the U.S. tech sector was routed by the Chinese launch of DeepSeek, and Sen. Josh Hawley, R-Mo., is putting forth legislation to prevent that from happening again.

'NEXT WEAPON': Ask Sage founder Nicolas Chaillan addresses the emergence of the Chinese A.I. app DeepSeek, its threat to American A.I. dominance and his skepticism over the model.

REAL-LIFE TETRIS: In a groundbreaking development for warehouse automation, Ambi Robotics just launched AmbiStack, a multipurpose robotic system that promises to transform the way items are stacked onto pallets and into containers.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Apple's iOS vulnerability exposes iPhones to stealthy hacker attacks

1 February 2025 at 10:00

Generally, iPhones are considered more secure than Android devices. 

Apple’s closed ecosystem and strict App Store policies limit the risk of malware, and its centralized software updates ensure better security. In contrast, Android’s openness allows users to install apps from various sources, and updates are often rolled out at different times, making it more vulnerable to attacks. 

However, iPhones aren’t immune to security flaws. Hackers occasionally find ways to exploit them, as seen in Apple’s latest advisory. The company recently discovered that a vulnerability in iOS had been exploited for over a year. While a fix has now been released, reports suggest that hackers may have already targeted high-value individuals.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Apple has uncovered hackers exploiting a vulnerability in iOS that appears to have been lingering for more than a year. The vulnerability is a "zero-day" flaw, meaning criminals may have already exploited it, according to the latest security advisory from the company. Zero-day flaws like this are especially dangerous because they are exploited before developers can issue fixes. Apple confirmed this marks its first zero-day patch of 2025. The vulnerability affects iPhones dating back to 2018’s XS model, as well as newer iPads, Macs, and even the Vision Pro headset.

The vulnerability, tracked as CVE-2025-24085, resides in Apple’s Core Media framework, a software layer responsible for processing multimedia files. A "use after free" memory corruption error enabled hackers to manipulate the system into executing unstable code, granting them elevated privileges to bypass security protocols. Apple’s advisory suggests hackers weaponized the flaw through malicious apps disguised as legitimate media players. These apps likely abused the Core Media framework by triggering corrupted files, enabling attackers to infiltrate devices.

The attacks reportedly targeted iOS versions predating 17.2, released in December 2023, meaning the vulnerability may have been active since late 2022. Security experts speculate that hackers focused on high-value individuals — such as activists, executives or journalists — to avoid detection. The prolonged stealth of the campaign underscores the challenges of identifying sophisticated, narrowly tailored exploits.

This underscores the critical need for you to update your devices to iOS 17.2 or later, as these versions include essential fixes to safeguard against this actively exploited vulnerability.

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

In response, Apple has released fixes across its ecosystem, including iOS 18.3, macOS Sequoia, watchOS, tvOS and VisionOS. You should update your devices as soon as possible to stay protected. To install the update on your iPhone or iPad:

Pro Tip: I recommend you click Update Now and also turn on Automatic Updates to stay covered in the future.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

While Apple has patched this issue, it’s a reminder that staying on top of updates is key. Hackers are always looking for security gaps, so keeping your software up to date is one of the best ways to stay safe.

SCAMMERS FOUND A SNEAKY WAY TO BYPASS YOUR IPHONE'S SAFETY FEATURES

Protecting your iPhone requires proactive security measures. By following these seven essential steps, you can significantly reduce the risk of cyber threats and keep your personal information secure.

1. Keep your iPhone updated: I can’t say this enough. Updating your iPhone regularly is one of the most effective ways to protect it from security threats. Apple frequently releases updates that fix vulnerabilities, including critical zero-day flaws. 

2. Download apps only from the App Store: To minimize the risk of installing malware, only download apps from the official App Store. Apple’s strict app review process helps prevent malicious apps from being published, but some threats can still slip through. Always verify app details, check reviews and be cautious about app permissions before installation.

3. Enable lockdown mode for extra protection: For those of you who may be at higher risk, such as journalists or executives, Lockdown Mode provides an additional layer of security. This feature limits certain device functionalities to prevent sophisticated cyberattacks. It can be turned on via SettingsPrivacy & SecurityLockdown Mode and is especially useful for those concerned about targeted threats.

4. Enable message filtering: Use your device's built-in filtering options to sort messages from unknown senders. This feature allows you to automatically sort messages from unknown senders, easily filter unread messages and manage your message inbox more efficiently. Here are steps:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

5. Stay cautious of phishing attacks and install strong antivirus software: Phishing remains one of the most common tactics used by hackers. Be cautious when receiving unsolicited messages or emails on your iPhone, especially those with suspicious links or attachments. Always verify the sender before opening anything. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Review your security and privacy settings: Regularly reviewing your iPhone’s security settings can help you maintain strong protection. You should also review app permissions in Settings > Privacy & Security to restrict access to sensitive data, such as location or contacts. Enable Face ID or Touch ID for secure access and turn on two-factor authentication (2FA) for Apple ID and other accounts. 2FA adds an extra layer of security to your accounts by requiring a second form of verification, such as a text message or authentication app, in addition to your password. This significantly reduces the risk of unauthorized access, even if your password is compromised.

7. Invest in personal data removal services: By reducing your online footprint, you make it harder for cybercriminals to obtain your contact information, potentially preventing them from sending you deceptive phishing texts and emails in the first place. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

This iOS vulnerability is a serious reminder of the importance of staying up to date with software updates. If you’re using an iPhone from 2018 or later, make sure you’ve updated to iOS 17.2 or later as soon as possible. Hackers exploited a hidden flaw for over a year, using fake media apps to gain access to devices. While Apple has now patched the issue, the fact that it remained undetected for so long is concerning. 

Do you think companies like Apple are doing enough to protect you from cyber threats?  Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

World's first AI-designed, 3D-printed shoe wants to be the next Crocs

31 January 2025 at 15:00

Move over, Crocs. There's a new contender in the world of unconventional footwear. 

Syntilay, a startup with a sparkle in its eye and artificial intelligence on its mind, has just unveiled what it claims to be the world's first entirely AI-designed and 3D-printed shoe. 

This futuristic footwear is turning heads and raising eyebrows in equal measure.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Syntilay, whose name is derived from "scintillate" (meaning to sparkle), is the brainchild of 25-year-old entrepreneur Ben Weiss. The company's journey from concept to creation is as unique as the shoes themselves. Using Midjourney AI, they generated the basic shape, which was then sketched by an artist. This sketch was transformed into a 3D model using Vizcom AI, and finally, generative AI added the distinctive patterns and textures. 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Ben tells CyberGuy, "AI designing shoes is going to disrupt the category because of the incredible speed to go to market. New releases for traditionally made shoes take around 18 months for a model to release, with AI making them and 3D printing, that is now only a few months."

AI-POWERED ROBOT SINKS SEEMINGLY IMPOSSIBLE BASKETBALL HOOPS

One of Syntilay's standout features is its commitment to personalized comfort. Before you can slip your feet into these futuristic slides, you'll need to scan your feet using your smartphone. This ensures a custom fit for each customer, even accommodating those with different-sized feet. Available in five colors – blue, black, red, beige and orange – these shoes are priced at a not-so-modest $149.99 per pair.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

SHAPE-SHIFTING AI TRANSFORMER HOMES WILL LEAVE YOU WANTING ONE

While Syntilay is pushing the boundaries of shoe design, they've also got some serious old-school cred in their corner. Joe Foster, the co-founder of Reebok, is lending his expertise to the project. With Foster's experience in building a $4 billion shoe empire, Syntilay is hoping to make big strides in the footwear market. Syntilay's ambitions extend far beyond selling a few thousand pairs of quirky slides. 

They're eyeing the $85.8 billion U.S. footwear market, with plans to open their platform to brands and content creators. This could potentially allow influencers and brands to design and sell their own AI-created footwear, tapping into a market that has traditionally been difficult for non-shoe companies to crack.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

TOP TECH STEALING THE SHOW AT CES 2025

In an age where environmental concerns are at the forefront, Syntilay is putting its best foot forward. The shoes are 100% recyclable, with customers able to return them at the end of their life to be transformed into new products. This closed-loop system could potentially revolutionize the footwear industry's approach to sustainability.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Whether Syntilay becomes the next Crocs or fades into obscurity remains to be seen. However, their innovative approach to design and manufacturing is undoubtedly pushing the boundaries of what's possible in footwear. As AI and 3D printing technologies continue to evolve, we may be witnessing the first steps towards a revolution in how we design, produce and consume fashion.

What do you think? Are AI-designed, 3D-printed shoes the future of footwear or just a passing fad? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Warehouse robot uses AI to play real-life Tetris to handle more than ever before

30 January 2025 at 06:00

In a groundbreaking development for warehouse automation, Ambi Robotics just launched AmbiStack, a multipurpose robotic system that promises to transform the way items are stacked onto pallets and into containers. 

This innovative solution tackles a fundamental challenge in logistics: maximizing space utilization and reducing shipping costs.

AmbiStack operates like a real-world 3D Tetris game, expertly arranging items to optimize space in containers and pallets. By minimizing wasted space, warehouses can significantly reduce shipping costs and improve overall efficiency.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

"Logistics companies are under continuous pressure to deliver items faster and for lower cost, which puts a lot of strain on operations to maintain reliability while rapidly adapting for the future," Jim Liefer, CEO of Ambi Robotics, also tells CyberGuy. 

"AmbiStack can be rapidly configured to automate the repetitive motions involved in a huge variety of stacking and palletizing applications, driving greater accuracy and efficiency, while future-proofing warehouse operations."

CHINA’S NEWEST HUMANOID ROBOT IS READY TO SERVE LIKE NEVER BEFORE

The rapid development and deployment of AmbiStack was made possible by PRIME-1, Ambi Robotics' new artificial intelligence foundation model for warehouse robots. This advanced AI enables AmbiStack to begin working efficiently from day one in production environments.

Ken Goldberg, co-founder and chief scientist at Ambi Robotics, tells CyberGuy, "The engineering team at Ambi Robotics used 4 years of proprietary warehouse data to train a state-of-the-art generative model for 3D warehouse operations; their experiments with real production systems confirm that PRIME-1 significantly outperforms their previous systems."

ROBOTS PERFORM LIKE HUMAN SURGEONS BY JUST WATCHING VIDEOS

Cost reduction and efficiency: AmbiStack addresses the pressing need for automated solutions that cut labor costs, reduce manual inefficiencies and tackle accuracy challenges.

Ergonomic improvements: The system alleviates the physical strain on workers by handling heavy lifting tasks.

Adaptive intelligence: Trained using Sim2Real reinforcement learning, AmbiStack can make real-time decisions, adapting to various scenarios and delivering a faster return on investment.

Tackling complex tasks: Stacking presents more challenges than sorting, making AmbiStack a significant advancement in robotic capabilities.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

CHINESE ROBOT LIFTS 35 POUNDS PER HAND

AmbiStack utilizes advanced vision systems and AI models trained on extensive data from parcel sorting experiences. The robot learns in a virtual environment, earning higher scores for better stacking performance with random items.

Jeff Mahler, co-founder and CTO of Ambi Robotics, tells CyberGuy, "AmbiStack represents an evolution of our AI-powered robotics, building on our technology in physical AI to add stacking as a fundamental new robot skill in AmbiOS. We’ve started the AI flywheel for stacking with Sim2Real reinforcement learning and performance will only improve as robots collect data from production environments. We are committed to advancing this capability to provide reliable systems that deliver a strong ROI for our customers."

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

The potential market for AmbiStack is vast, as efficient packing and stacking are crucial in logistics. By optimizing container usage, AmbiStack ensures that companies aren't "shipping air," leading to substantial cost savings in transportation.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

AmbiStack is designed to complement human workers, not replace them. It allows employees to focus on decision-making and strategic tasks while reducing physical strain and repetitive motions.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

By combining advanced AI with practical robotics, AmbiStack is addressing a long-standing challenge in logistics. As the industry continues to evolve, solutions like AmbiStack will play a crucial role in shaping the future of warehouse operations and supply chain efficiency.

Do you believe these technologies will ultimately complement human workers or gradually replace them entirely in logistics and warehouse operations? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: DeepSeek underscores US-China race for AI dominance, OpenAI says

29 January 2025 at 12:09

IN TODAY’S NEWSLETTER:

- DeepSeek is the newest front in the AI competition between the US and China

- Trump, OpenAI CEO weigh in on DeepSeek frenzy

- Willing to pay $175,000 for a life-size robot friend that remembers everything about you?

CRITICAL FIGHT: DeepSeek’s release of a high-profile new AI model underscores a point we at OpenAI have been making for quite some time: the U.S. is in a competition with the Chinese Communist Party that will determine whether democratic AI wins over the Chinese Communist Party's authoritarian version of the technology. The U.S. must come out on top–and the stakes could not be higher.

'WAKE-UP CALL': President Donald Trump and OpenAI CEO Sam Altman both joined in on the buzz surrounding Chinese artificial intelligence startup DeepSeek, which sent the technology sector into turmoil on Monday following its emergence as a potential rival to leading U.S.-based firms.

ROBOT FRIEND MELODY: In a world where loneliness is becoming increasingly prevalent, researchers have taken a bold step forward by introducing Melody, a life-sized artificial intelligence robot designed to combat this growing epidemic. 

AI RACE: China-based artificial intelligence startup DeepSeek's release of new AI models that rival those made by leading U.S. tech firms roiled markets on Monday and prompted concerns about U.S. firms losing their edge in the AI race to Chinese rivals.

ROBOTIC DOG COMPANION: U.S. robotics company Tombot has introduced "Jennie," an innovative AI-powered robotic pet designed to provide comfort and companionship to those facing cognitive health challenges.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

UnitedHealth cyberattack exposes 190 million in largest US healthcare data breach

29 January 2025 at 10:00

UnitedHealth’s Change Healthcare unit suffered a data breach in February 2024, the news of which surfaced Feb. 21. 

Initially reported to have affected around 100 million individuals, the U.S. health insurance giant has now revealed that the actual number is significantly higher: 190 million. This makes it the largest breach of medical data in U.S. history, affecting nearly half the country’s population. 

A breach of this magnitude can have devastating consequences for the American people as malicious actors could exploit the data for a range of attacks if it finds its way to the dark web.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

UnitedHealth confirmed on Friday, Jan. 24, 2025, that the ransomware attack on its Change Healthcare unit affected approximately 190 million people in the United States. The company had previously estimated the number of affected individuals to be around 100 million in its preliminary analysis filed with the Office for Civil Rights, a division of the U.S. Department of Health and Human Services that investigates data breaches.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

UnitedHealth stated that the majority of those impacted have already been notified, either directly or through substitute notice. The final tally of affected individuals will be confirmed and submitted to the Office for Civil Rights at a later date.

The company tells CyberGuy it is "not aware of any misuse of individuals’ information as a result of this incident and has not seen electronic medical record databases appear in the data during the analysis." However, UnitedHealth did not disclose when it became aware of the additional 90 million victims, how the revised figure was determined or what changes led to the updated number.

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

The cyberattack on Change Healthcare in February caused widespread disruptions across the U.S. healthcare sector, as the company took its systems offline to contain the breach. This shutdown impacted critical services such as claims processing, payments and data sharing, which many healthcare providers rely on.

The stolen data varied by individual but included a broad range of personal and sensitive information, such as names, addresses, dates of birth, phone numbers, email addresses and government ID numbers, including Social Security, driver’s license and passport details.

Plus, hackers may have accessed health-related information, including diagnoses, medications, test results, imaging records, care and treatment plans, and health insurance details. Financial and banking information tied to claims and payment data was also reportedly compromised.

The breach was the result of a ransomware attack carried out by ALPHV/BlackCat, a Russian-speaking ransomware and extortion group. The attack, a form of malware intrusion, locks victims out of their data unless a ransom is paid. ALPHV/BlackCat later took credit for the attack.

During a House hearing in April, Change Healthcare admitted that the breach was made possible due to inadequate security measures, specifically the absence of two-factor authentication to protect its systems.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

FROM TIKTOK TO TROUBLE: HOW YOUR ONLINE DATA CAN BE WEAPONIZED AGAINST YOU

1. Remove your personal information from the internet: The breach has exposed sensitive personal data, making it essential to reduce your online footprint. While no service can guarantee complete data removal, a reputable data removal service can significantly limit your exposure. These services systematically monitor and erase your personal information from numerous websites and data brokers. Check out my top picks for data removal services here.

2. Be wary of mailbox communications: With addresses among the compromised data, scammers may exploit this breach to send fraudulent letters. Be aware of mail claiming missed deliveries, account suspensions or security alerts. Always verify the authenticity of such communications before responding or taking action.

3. Be cautious of phishing attempts and use strong antivirus software: Scammers may use your compromised email or phone number to target you with phishing attacks. Be wary of messages asking for personal information or containing suspicious links. To protect yourself, ensure strong antivirus software is installed on all your devices. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Monitor your accounts: Given the scope of this breach, regular monitoring of your bank accounts, credit card statements and other financial accounts is critical. Look for unauthorized transactions or suspicious activity and immediately report any issues to your bank or credit card provider.

5. Recognize and report a Social Security scam: If your Social Security number is exposed, you could become a target for related scams. Official communication regarding Social Security issues usually comes via mail, not phone calls or emails. Learn more about spotting and reporting scams by visiting the Social Security Administration’s scam information page.

6. Invest in identity theft protection: Data breaches happen every day, and most never make the headlines, but with an identity theft protection service, you’ll be notified if and when you are affected. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

It’s surprising that a company of UnitedHealth’s scale failed to implement even basic cybersecurity measures when handling customer data. A breach affecting 190 million people – nearly half of the U.S. population – is staggering, leaving almost anyone at risk of becoming a target for hackers. While the company is still assessing the full extent of the breach, you can take precautions now by being cautious with any unknown links or unsolicited calls. Bad actors may use a variety of tactics to cause harm.

Do you think these companies are doing enough to protect your data, and is the government doing enough to catch those behind cyberattacks? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Don’t be so quick to click that Google Calendar invite. It could be a hacker’s trap

29 January 2025 at 06:00

A sophisticated phishing campaign exploiting Google Calendar has been uncovered by Check Point Software Technologies, raising alarms among cybersecurity experts. 

Cybercriminals are sending fake meeting invitations that appear legitimate, redirecting victims to phishing sites and mimicking Google's platforms to steal sensitive information. 

This emerging threat is particularly concerning given the widespread use of Google Calendar, which serves more than 500 million users globally in 41 languages. Researchers have identified nearly 4,000 phishing attempts in a matter of weeks, impersonating more than 300 reputable brands.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Hackers leverage the trust in Google's services to carry out their attacks. Victims receive seemingly authentic meeting invites via Google Calendar. Upon clicking links within these invites, they are taken to fake web pages that prompt them to input personal data. Once compromised, this information can be used for identity theft, financial fraud and unauthorized access to other accounts. Security experts warn that attackers are now using AI to craft highly convincing fake invitations, making it even harder to spot the fraud. Reacting to the findings from Check Point, a spokesperson for Google said:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

"We recommend users enable the 'Only If The Sender Is Known' setting in Google Calendar. This setting helps defend against this type of phishing by alerting the user when they receive an invitation from someone not in their contact list and/or they have not interacted with from their email address in the past."

ASK KURT: HOW TO NAVIGATE GOOGLE’S PRIVACY SETTINGS

Google has introduced the "known senders" feature in Google Calendar to combat sophisticated phishing attempts. This setting helps you filter out potentially malicious calendar invites. Here's how to enable it:

This ensures that only events from contacts, your organization or previous interactions are automatically added to your calendar.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

HOW ONE MAN GOT SCAMMED IN SECONDS USING GOOGLE

To further protect yourself from phishing scams, follow these steps.

Scrutinize unexpected invites carefully: Examine the sender's details, including their name, domain and email address, for any inconsistencies or signs of spoofing.

Avoid clicking suspicious links or downloading attachments from unknown sources: Threat actors often embed malicious links in calendar invites that can lead to phishing websites designed to steal your personal information.

Use strong antivirus software: This provides an additional defense mechanism against malware and can help detect potential phishing attempts before they cause damage. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Enable two-factor authentication (2FA) for your Gmail account: 2FA adds an extra layer of security that can prevent unauthorized access, even if your credentials are compromised.

Keep your security settings up to date: Regularly review and adjust your calendar and email settings to protect against evolving phishing tactics.

HOW A WRONG GOOGLE SEARCH CAN COMPROMISE YOUR DATA AND BRING LAW ENFORCEMENT CALLING

As phishing tactics evolve, cybercriminals are exploiting trusted platforms like Google Calendar to bypass traditional security measures. This underscores the importance of user vigilance and proactive security practices. By enabling the "known senders" setting and implementing additional security measures, you can significantly reduce the risk of falling victim to calendar-based phishing scams.

What digital security challenges have you encountered recently? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fake toll road texts sweep America as Chinese scammers target US drivers

28 January 2025 at 10:00

A new scam has come to light targeting residents across the United States with text messages that pretend to be from toll road operators. For many who receive these messages, it’s an easy and expensive trap to fall into.

The scam begins when people receive a message claiming they have unpaid tolls and may be charged fines. Scammers then ask for card details and a one-time password sent via SMS to steal their money. Security researchers believe that Chinese smishing groups are behind this scam, selling SMS-based phishing kits to thousands of scammers.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

As reported by KrebsOnSecurity, the scam begins with a text message claiming to be from a toll road operator, such as E-ZPass or SunPass. The message warns about unpaid tolls and the possibility of fines, forcing recipients to act quickly. Victims are directed to a fake website mimicking the toll operator’s site, where they are asked to provide sensitive information, including payment card details and one-time passwords. 

Security researchers have traced the scam to Chinese smishing groups known for creating and selling sophisticated SMS phishing kits. One such kit, "Lighthouse," makes it easy for scammers to spoof toll road operators in multiple states. These kits are designed to trick users into sharing financial information, which is then used to commit fraud. 

Reports of these phishing attacks have surfaced across the U.S., targeting users of toll systems like EZDriveMA in Massachusetts, SunPass in Florida and the North Texas Toll Authority in Texas. Similar scams have been reported in states including California, Colorado, Connecticut, Minnesota and Washington. The phishing pages are mobile-optimized and won’t load on non-mobile devices, making them even more deceptive.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Recent advancements in phishing kits include better deliverability through integration with Apple iMessage and Android’s RCS technology, bypassing traditional SMS spam filters. These methods increase the likelihood of victims receiving and engaging with fraudulent messages. The phishing sites are operated dynamically in real time by criminals, making them harder to detect and shut down. Even individuals who don’t own a vehicle have reported receiving these messages, indicating random targeting.

THAT APPLE ID DISABLED MESSAGE? IT'S A DANGEROUS SCAM

By staying vigilant and following the steps below, you can protect yourself from falling victim to toll scams. 

1) Verify directly with toll operators: If you receive a message about unpaid tolls or fines, do not click on any links. Instead, visit the official website of your toll operator or contact their customer service directly to verify the claim.

2) Install strong antivirus software: The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Do not share personal information: Never provide sensitive details like payment card information, Social Security numbers or one-time passwords via text or unverified websites. Legitimate toll operators will not request such information through SMS.

4) Enable two-factor authentication (2FA): Use 2FA for your accounts whenever possible. This adds an extra layer of protection by requiring two forms of verification, reducing the risk of unauthorized access even if some details are compromised.

5) Be wary of urgency in messages: Scammers often create a sense of urgency, claiming immediate action is required to avoid penalties. Take a moment to assess the situation and verify the legitimacy of the message through official channels.

6) Report suspicious messages: If you suspect a phishing attempt, report it to the Federal Trade Commission or the FBI's Internet Crime Complaint Center. Include details like the sender’s phone number and any links in the message. Additionally, inform your mobile carrier to help block similar scams.

7) Use a personal data removal service: Employ a reputable data removal service to reduce your online footprint and minimize the risk of scammers obtaining your personal information. These services can help remove your data from various data broker sites, making it harder for scammers to target you with personalized scams. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

It’s deeply concerning how these scams are becoming increasingly sophisticated and widespread. It’s no longer just about random phishing attempts. These are carefully crafted schemes designed to exploit our trust in systems we rely on daily. The fact that scammers can impersonate toll road operators so convincingly is alarming, and it shows how vulnerable we are to such attacks. It frustrates me to think of how many people may fall victim to these tactics, losing their hard-earned money.

Have you recently received a suspicious text message claiming to be from a toll road operator or any other service? How did you react? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

How to share a YouTube video starting at a specific time

28 January 2025 at 06:00

Ever watched a YouTube video and thought, "I need to share this exact moment with my friends?" Well, you're in luck. Sharing specific moments from YouTube videos is actually pretty easy. Whether you're on a computer, iPhone or Android device, I'm here to show you how easy it is to do just that.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

YOUTUBE’S 5 MOST OVERLOOKED USEFUL FEATURES

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

YouTube has recently introduced a new, simplified method for sharing video timestamps on Android.

Settings may vary depending on your Android phone’s manufacturer. 

These updated steps make sharing timestamps much simpler, as you no longer need to use Chrome or request the desktop site. For those using older versions of the YouTube app or Android OS or if the update isn't yet available on your device, here are the previous steps:

Settings may vary depending on your Android phone’s manufacturer. 

Both methods allow you to share specific moments in YouTube videos on your Android, but the new process is more streamlined and user-friendly.

TOP ANDROID PHONES OF 2025

Sharing specific parts of a YouTube video has never been easier. Whether you’re on a computer, iPhone or Android device, these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.

Now that you know the steps to share an exact moment, follow our guide and share a specific part of our video with your friends right away. Don't forget to let us know their reactions by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Scammers find sneaky way to bypass your iPhone's safety features

27 January 2025 at 06:00

In an alarming development, cybercriminals have devised a new method to circumvent Apple's built-in phishing protection for iMessage, potentially exposing you to malicious links and scams. This sophisticated tactic exploits a security feature designed to protect you, turning it into a vulnerability that could lead to significant personal and financial risks.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Apple's iMessage automatically disables links in messages from unknown senders as a security measure. However, cybercriminals have found a way to exploit this protection. By instructing you to reply to the message, often with a simple "Y," the attackers can re-enable previously disabled links. This seemingly innocuous action not only activates the links but also signals to the scammers that they've found an engaged target for future attacks.

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

Apple defines social engineering as a targeted attack that employs impersonation, deception, and manipulation to gain access to personal data. Scammers often pose as representatives of trusted companies, using sophisticated tactics to persuade individuals to disclose sensitive information, such as passwords and financial details. Here are some of those sneaky tactics:

The messages typically end with instructions like: "(Please reply Y, then exit the SMS, re-open the SMS activation link, or copy the link to open in Safari)."

THE ONE SIMPLE TRICK TO HELP KEEP OUT CYBER CREEPS ON IPHONE

This new tactic is part of a broader trend of smishing (SMS phishing) attacks targeting mobile users. With the increasing reliance on smartphones for various activities, including financial transactions and personal communications, these attacks pose a significant threat to users' security and privacy.

DOES MY IPHONE NEED ANTIVIRUS PROTECTION?

To safeguard against these sophisticated phishing attempts, consider the following steps.

1) Never reply to suspicious messages: Avoid responding to texts from unknown senders, especially those asking you to reply to activate links. Additionally, make sure to delete suspicious text messages and block the sender to prevent further attempts. Since the sender is not in your contact list, you can click Report Junk at the bottom of the text. Then click Delete and Report Junk. This will report the conversation as junk by sending it to your wireless carrier and Apple using your phone number.

2) Verify sender identity: Contact organizations directly through official channels if you're unsure about a message's legitimacy.

3) Be skeptical of urgency: Scammers often use urgent language to prompt quick, thoughtless actions.

4) Enable message filtering: Use your device's built-in filtering options to sort messages from unknown senders. Here are the steps:

This feature allows you to automatically sort messages from unknown senders, easily filter unread messages and manage your message inbox more efficiently.

5) Use two-factor authentication (2FA): 2FA adds an extra layer of security to your accounts by requiring a second form of verification, such as a text message or authentication app, in addition to your password. This significantly reduces the risk of unauthorized access, even if your password is compromised.

6) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

7) Invest in personal data removal services: By reducing your online footprint, you make it harder for cybercriminals to obtain your contact information, potentially preventing them from sending you these deceptive iMessage phishing texts in the first place. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

If you suspect you've fallen victim to a smishing attack:

One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

This latest trick targeting iMessage users serves as a reminder that even seemingly secure systems can be vulnerable to social engineering. By remaining cautious and following best practices for digital security, you can significantly reduce your risk of falling victim to these sophisticated phishing attempts.

What other cybersecurity challenges have you encountered with your mobile devices, and what questions do you have for us? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Biggest Wi-Fi mistakes you can make on a plane

26 January 2025 at 20:49

When my husband and I were on the very long flight last year, he leaned over and asked, "I want to check our Morgan Stanley account. Do you think it’s OK to do it using the plane’s Wi-Fi?"

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

How did we live without Wi-Fi on a plane? Oh, yeah, we read magazines! Sorry to be the bearer of bad news, but Wi-Fi isn’t as protected as we hope. Fear not. I’ve got some tips on protecting yourself and surfing safely in the skies.

10 TECH UPGRADES TO SAVE YOUR TIME, PRIVACY AND MONEY THIS YEAR

Hackers use all kinds of sneaky tactics to hijack your privacy in flight. One thing in their favor: VPNs are more likely to drop in and out in the air than on the ground. (More on that below.)

Without that layer of protection, cybercriminals using the same airline Wi-Fi can easily tap into your devices, access your information and spread malware.

"S" for security: Only visit encrypted websites — the ones that start with "HTTPS" (that "S" is important!). In general, this blocks a hacker from viewing your activity on a given site, like the password or credit card number you typed in.

Beware of AirDrop: Keyloggers keep track of every single thing you type, and criminals love to pass them along using Apple’s AirDrop feature. Don’t accept drops from strangers in flight. Steps here to disable or limit AirDrop if you need help.

Name game: Crooks can create fake Wi-Fi networks with almost identical names to the airline’s. If you’re not careful, you could plug into a copycat network instead of the legit one.

THE NSA SAYS DO THESE 5 THINGS WITH YOUR PHONE RIGHT NOW

Is your home connection locked down? Do this check twice a year.

I know you’re not going to skip the Wi-Fi altogether. That’s OK, just be smart about it.

Update everything: Before you hit the road, make sure your phone, computer, tablet, smartwatch and any other connected devices are running the latest software. Steps here for Windows, Mac, iPhone and Android. Updates often include critical security patches that protect against the new threats. Don’t forget to update your apps, too.

Add a layer of security: A Virtual Private Network (VPN) encrypts your internet connection. Before accessing anything sensitive, like your email, online banking or shopping accounts, turn on your VPN. Double-check its status to ensure it’s actively protecting your connection. It should display as "connected" or "secured."

Verify names. If you notice multiple Wi-Fi networks with similar names, check with the airline staff and confirm which is the right one.

Use 2FA: For any account tied to financial information or personal details, two-factor authentication is a must. This adds an extra layer of security by requiring a second verification step, like a code sent to your phone or email, after entering your password. Set this up for all accounts with ties to your finances to reduce the risk of unauthorized access.

Secure your devices. Invest in antivirus and malware-protection software, and keep your devices physically secure. Avoid leaving your phone, tablet or laptop unattended, even for a moment. 

THE STEP I TAKE TO CLEAR MY INBOX EVERY JANUARY

Stop looky loos. Get a privacy screen for your laptop to prevent nearby shoulder snooping.

Bonus: Don’t post pics of your boarding pass or other travel docs

You’re excited, waiting for the plane. What’s the harm in posting a pic of your boarding pass? A whole lot. Boarding passes display your full legal name, ticket number and passenger name record. That six-digit code plus your last name gives anyone access to your booking information online.

The same goes for your license, passport, visa or other identification documents. Thieves keep an eye out for any detail they can use.

Keep these photos on your phone before vacation. Scroll to No. 3. You’ll thank me if something goes missing.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

Don’t let this credit card fraud nightmare happen to you

26 January 2025 at 10:00

Credit card fraud has been on the rise in recent years.

The Federal Trade Commission’s most recent database indicates that 416,582 cases of credit card fraud were reported in 2024, making it one of the most common forms of identity theft. You know you've been a victim of this fraud when you notice unauthorized transactions on your credit card bill. 

These transactions are usually below $100 to avoid detection. However, sometimes they can exceed $1,000. One such incident happened with Martin from Martinsville, Virginia, when he was randomly charged $1,095 in Hong Kong.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

"Hello, I recently received a fraud alert from my credit card company that said that there was a $1,095 charge on my credit card in Hong Kong. I use my iPad and Safari browser to buy online. Can you please explain how this could happen? By the way, my credit card company canceled my credit card and will send me a new Mastercard in the mail, and I’m not responsible for the charges on my credit card. What can I do in the future to prevent this from happening again?"

I'm sorry to hear about the fraudulent charge on your credit card, Martin. It’s good that your credit card company is handling it and that you’re not responsible for the charges. For future reference, I'll be discussing how this could have happened and how to stay safe.

Credit card fraud can happen in several ways, often without you even realizing it. One common method is when fraudsters get hold of your card information through data breaches at online stores or banks, which means your details get leaked without your knowledge. 

Another sneaky tactic is phishing, where scammers trick you into giving away your card info by posing as legitimate companies via emails or fake websites. 

There’s also the risk of "card skimming," where devices at ATMs or gas stations secretly capture your card details when you swipe it. In some cases, fraudsters might also exploit weak security on public Wi-Fi networks or compromised apps to access your information while you’re shopping online.

OUTSMART THE SCAMMERS: HOW THE SNEAKY CEO APPLE GIFT CARD SCAM ALMOST GOT ME  

A report from Security.org reveals that 52 million Americans experienced credit card fraud in 2023, a figure even higher than the one reported by the FTC. With four out of five American adults owning at least one credit card, the report found that three in five cardholders have faced unauthorized charges — an estimated 128 million victims. Even more concerning, 75% of these victims reported having their credit card information stolen more than once. 

The typical unauthorized transaction is around $100, which adds up to approximately $5 billion in criminal purchases each year. Interestingly, most unauthorized transactions involve credit cards that weren’t physically lost or stolen, highlighting the growing risks of online fraud and data breaches.

THE BEST BALANCE TRANSFER CREDIT CARDS 2025

Data breaches are one of the main ways credit card fraud happens. Hackers often get unauthorized access to sensitive information stored by businesses or institutions. When a retailer, financial institution or online store experiences a data breach, the hackers usually go after the payment systems where customer credit card details are kept.

If these systems aren’t properly secured, hackers can grab things like credit card numbers, expiration dates and sometimes even security codes. Once they have that info, they can either use it themselves or sell it to others.

But it’s not just credit card information at risk. Data breaches can also expose personal details like names, email addresses and phone numbers. Scammers can then use this stolen info to launch phishing attacks, pretending to be trusted companies and tricking you into giving away more sensitive information.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

This is why identity theft monitoring is so important. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY

1. Notify your credit card issuer immediately: If you notice fraudulent charges on your credit card, start by calling the number on the back of your credit card. From there, you should get more detailed information on what to do next.

2. Monitor your statements regularly: One of the best ways to catch credit card fraud early is to keep an eye on your statements. Review your transactions regularly to spot any unfamiliar charges. The sooner you notice something suspicious, the quicker you can report it to your credit card company and prevent further damage.

3. Regularly check your credit report: In addition to monitoring your credit card statements, periodically review your credit report to catch any unauthorized accounts opened in your name.

4. Use strong, unique passwords: Always use strong, unique passwords for your online accounts, especially those that store payment details. Avoid using easily guessable information, and consider using a password manager to store and generate secure passwords. This reduces the chances of fraudsters accessing your accounts.

5. Use credit card alerts: Set up transaction alerts with your credit card company. This way, you’ll receive a notification via email or text for every transaction made with your card. If you receive an alert for a purchase you didn’t make, you can take immediate action to report it and prevent further charges.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

6. Be Cautious with public Wi-Fi: Avoid making purchases or entering sensitive information when connected to public Wi-Fi networks because they’re often not secure. If you need to make an online purchase while on the go, consider using a VPN (Virtual Private Network) to encrypt your connection and keep your credit card details safe from hackers. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices 

7. Don't store credit card info on browsers and websites: Storing your credit card information on browsers or websites can make it convenient, but it also exposes you to a higher risk of fraud. If your browser or the website’s security gets compromised, hackers could gain access to your saved card details. To stay safe, avoid saving your credit card information and manually enter it each time you make a purchase. If a site offers to save your details for future use, think twice before accepting. It's better to take the extra step to enter your information each time, ensuring your data stays secure.

8. Use EMV chip technology: When making in-person purchases, always use the chip reader instead of swiping your card. Chip technology provides an extra layer of security against fraud.

9. Be wary of phishing attempts and have strong antivirus software: Be cautious of unsolicited emails, texts or phone calls asking for your credit card information. Legitimate companies typically don't request sensitive information through these channels. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

10. Keep your card in sight: When using your card in restaurants or stores, try to keep it within view. This reduces the risk of someone copying your card details.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

It's clear that credit card fraud is more prevalent than ever, affecting millions of Americans each year. The good news is that there are effective steps to protect yourself from becoming a victim. By staying vigilant and employing best practices — like monitoring your statements and using strong passwords — you can significantly reduce your risk. Remember, awareness and proactive measures are your best defenses against credit card fraud.

Have you or someone you know ever experienced credit card fraud, and how did it impact you? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Crooks can't steal this motorcycle that hides in plain sight

26 January 2025 at 06:00

Imagine walking down a busy city street surrounded by the usual urban clutter — graffiti-covered walls, chained bicycles and various pieces of street furniture. 

Among these familiar sights, you might pass by what appears to be a nondescript telecom signal box

But with the push of a button, this unassuming object transforms into a fully functional motorcycle. Welcome to the world of the Nomoto, a revolutionary concept by designer Joey Ruiter that challenges our perception of urban transportation.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

The Nomoto, short for "No moto here, buddy," is a remarkable electric motorcycle concept that blurs the line between vehicle and urban infrastructure. When parked, it looks like nothing more than a graffiti-covered metal box, seamlessly blending into its surroundings. 

This camouflage serves a dual purpose. It's an artistic statement about urban design and a practical solution to bike theft.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

WHO CAME UP WITH THIS CRAZY BUT COOL ELECTRIC MONOWHEEL?

The genius of the Nomoto lies in its transformation. At the touch of a button, the seemingly immobile box rises up on wheels, ready to ride. The design eliminates the need for a kickstand because the bodywork lowers itself to sit flush with the ground when parked. 

A drop-down cover reveals the handlebars, while flip-up covers on the front and rear boxes provide small storage areas. While the Nomoto's primary appeal is its unique aesthetic, it's not just for show. The bike is a fully functional electric scooter, albeit a basic one. It features stealthy headlight and brake light arrangements, though it appears to lack mirrors and indicators.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Joey Ruiter is no stranger to pushing the boundaries of design. Known for his minimalistic approach, Ruiter strips products down to their essence, reimagining ordinary objects in extraordinary ways.

His portfolio includes a 215-horsepower watercraft and the Snoped, an upright single-track snow bike with stark, boxy bodywork. Ruiter's work often polarizes opinion, and he wouldn't have it any other way. 

"I don't mind if somebody doesn't like my work," he says. "I think the polarization makes it fun." 

The Nomoto embodies this philosophy, challenging our expectations of what a motorcycle should look like and how it should function in an urban environment.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

A PEDAL-ELECTRIC HYBRID THAT'S HALF BIKE, HALF CAR

The Nomoto represents a bold reimagining of urban transportation. It's a testament to the power of creative design to solve practical problems while challenging our perceptions. While it may never see mass production, the Nomoto serves as an inspiring example of how thinking outside the box — or, in this case, inside a very unusual box — can lead to innovative solutions for city living.

Would you feel comfortable riding a motorcycle that looks completely invisible when parked, trading traditional motorcycle aesthetics for ultimate urban stealth? Let us know what you think by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Allstate sued for allegedly tracking and selling 45M Americans' location data

25 January 2025 at 10:00

Nowadays, almost every app you download asks for location permissions, meaning it wants to track where you are and your movements. For an app like Google Maps, requesting location access makes perfect sense. It's also reasonable for apps like Uber or DoorDash, which rely on location for their services. 

However, many apps that have nothing to do with location still ask for it, and we often grant these permissions without thinking twice. When you give an app access to your location, that data is stored and, in some cases, might even be sold. According to Texas Attorney General Ken Paxton, this practice is not uncommon. 

A recent lawsuit filed by Paxton alleges that the insurance company Allstate collected and sold the location data of 45 million Americans' smartphones.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

In a press release, Paxton announced that he had sued Allstate and its subsidiary, Arity, for unlawfully collecting, using and selling data about the location and movements of Texans' cellphones. The data was gathered through secretly embedded software in mobile apps, such as Life360. "Allstate and other insurers then used the covertly obtained data to justify raising Texans’ insurance rates," the press release stated.

The insurance provider allegedly collected trillions of miles' worth of location data from more than 45 million Americans nationwide. The data was reportedly used to build the "world’s largest driving behavior database." When customers sought a quote or renewed their coverage, Allstate and other insurance companies allegedly used the database to justify raising car insurance premiums.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Paxton claims the actions violated the Texas Data Privacy and Security Act. The lawsuit alleges customers were not clearly informed their data was being collected and did not consent to the practice.

"Our investigation revealed that Allstate and Arity paid mobile apps millions of dollars to install Allstate’s tracking software," said Paxton. "The personal data of millions of Americans was sold to insurance companies without their knowledge or consent in violation of the law. Texans deserve better and we will hold all these companies accountable."

We reached out to Allstate and Arity for comments. A rep for the Allstate Corporation provided CyberGuy with this statement: "Arity helps consumers get the most accurate auto insurance price after they consent in a simple and transparent way that fully complies with all laws and regulations."

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Car manufacturers have also been accused of selling similar data to insurance companies. Last year, Paxton sued General Motors for allegedly collecting and selling the private driving data of more than 1.5 million Texans to insurance companies without their knowledge or consent. In addition to insurance companies, data brokers are frequent buyers of customer data. Critics say these brokers fail to adequately protect the information, leaving it vulnerable to hackers. Earlier this month, hackers claimed to have breached Gravy Analytics, a major location data broker and the parent company of Venntel, which is known for selling smartphone location data to U.S. government agencies.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

1. Avoid installing the insurance company’s app: Many insurance companies encourage users to download their apps to "simplify" claims, payments or policy management. However, these apps often collect and track your location data under the guise of improving their services. If the app is not absolutely essential, manage your account through the company’s website or contact customer service directly instead.

2. Don’t give location permissions unnecessarily: When an app requests location access, ask yourself whether it genuinely needs this information to function. For example, a weather app may need approximate location data, but a flashlight app does not.  Always choose "Deny" or "Allow only while using the app" unless absolutely necessary. Most modern devices also allow you to provide an approximate location rather than a precise one, which is a safer option when location access is unavoidable.

3. Review and manage app permissions regularly: Over time, you may forget which apps have been granted permissions. Regularly go through your device’s app settings to check and adjust permissions. On most devices, you can access this under settingsprivacyapp permissions (specific steps vary by operating system). Revoke access for any apps that don’t need it or seem suspicious.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

4. Turn off location services when not in use: Keep location services off when you don’t need them. This reduces the chances of apps or devices tracking you passively in the background. For tasks like mapping or food delivery, turn location services on temporarily, then turn them off when you’re done. For added security, avoid connecting to public Wi-Fi networks, which can also be used to track your location indirectly.

5. Use privacy-focused tools and apps: Invest in tools designed to safeguard your privacy. Virtual private networks (VPNs) can mask your location online and prevent unwanted tracking while browsing.  VPNs will also protect you from those who want to track and identify your potential location and the websites that you visit. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices

BEWARE OF ENCRYPTED PDFS AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

If Allstate is indeed unlawfully collecting and selling people’s location data, Attorney General Paxton is right to hold them accountable by filing a lawsuit. In an era where cybercriminals exploit every opportunity to scam individuals, companies that fail to protect customer data are unacceptable and should face consequences. Data has become the new oil, and everyone seems eager to exploit it — often at the expense of ordinary people. Businesses that prioritize profits over privacy erode trust and put consumers at risk, making it crucial to enforce strict accountability for such practices.

Do you think companies like Allstate should be required to make their data practices crystal clear to customers? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: Musk vs. Altman

25 January 2025 at 08:00

IN TODAY'S NEWSLETTER:

- Musk casts doubt on Trump-backed Stargate project: 'They don't actually have the money'
- Elon Musk biographer offers big prediction for Trump term
- AI abortion training has arrived: New tech tools navigate the blurry line between healthcare and politics
-Trump’s AI deal fueling early cancer detection: Oracle’s Larry Ellison
-Microsoft CEO says AI is the ‘most important’ export of American services

EMPTY COFFERS?: Business magnate and X CEO Elon Musk has cast doubt on whether there is enough funding available to follow through on a massive $500 billion artificial intelligence (AI) infrastructure project announced by President Donald Trump on Tuesday.

ON THE BRINK: Walter Isaacson, author of "Elon Musk," discusses the Trump administration’s collaboration with tech giants to drive AI innovation and technological advancement on "America’s Newsroom."

CONTROVERSIAL TECH: Artificial intelligence (AI) tools are now available for future medical professionals at one Texas university to navigate the complexities of pregnancy and abortion—a development that further blurs the line between technology, politics and healthcare.

FUELING CANCER VACCINES: Oracle founder Larry Ellison said the massive artificial intelligence (AI) infrastructure project dubbed Stargate is helping to fuel the development of a cancer vaccine.

'MOST IMPORTANT' EXPORT: Microsoft vice chair and president Brad Smith breaks down how the company plans to invest in artificial intelligence during an appearance on ‘Mornings with Maria.’

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Willing to pay $175,000 for a life-size robot friend that remembers everything about you?

25 January 2025 at 06:00

In a world where loneliness is becoming increasingly prevalent, researchers have taken a bold step forward by introducing Melody, a life-sized artificial intelligence robot designed to combat this growing epidemic. 

However, Melody is not just another gadget; she represents a significant move toward creating robots that closely resemble humans in both appearance and interaction.

Realbotix, the innovative tech firm responsible for Melody's creation, aims to produce robots that are not only visually indistinguishable from humans but also capable of meaningful interactions.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

According to CEO Andrew Kiguel, "Melody was created with the intention of having robots that are easy to travel with and modify for various forms of personal interaction." This focus on adaptability allows Melody to serve multiple roles, from educational tools to companions in entertainment.

Melody boasts an impressive array of features that enhance her functionality and user experience:

Realistic movements: Equipped with advanced motor technology, Melody can execute fluid and natural movements, enhancing her ability to engage in lifelike interactions.

CHINA’S NEWEST HUMANOID ROBOT IS READY TO SERVE LIKE NEVER BEFORE

Eye tracking and object recognition: With micro-cameras embedded in her eyes, she can maintain eye contact and recognize objects, making conversations feel more genuine.

Modular design: Her components can be easily disassembled and reassembled, allowing for portability and customization according to user needs.

Open-source compatibility: Melody's design supports integration with various AI platforms, including Realbotix's proprietary companionship AI, making her versatile for different applications.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Realbotix emphasizes that Melody's primary purpose lies in fostering connection rather than intimacy. Her role as an engaging companion is designed to enhance human experiences through interaction and fun. However, she can engage in adult conversations if desired. The company envisions Melody as a versatile solution for addressing loneliness, with potential applications across multiple domains such as education, healthcare and personal companionship.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

With a price tag of $175,000, Melody is positioned as a premium product aimed at those seeking a unique blend of companionship and technology. This investment speaks to the growing market for humanoid robots designed for personal interaction, reflecting a shift in how we view relationships in an increasingly digital world.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

One look at Melody, and you might think she is designed for something else entirely. As technology evolves, so too does our understanding of companionship. Melody represents not just a technological advancement but also a cultural shift towards accepting robots as part of our social fabric. With her ability to remember personal interactions and adapt to individual preferences, she challenges our perceptions of connection in the modern age.

What do you think about the rise of humanoid robots like Melody? Are they the solution to loneliness or just another gadget? Let us know what you think by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

The sickening truth: Healthcare data breaches reach all-time high

23 January 2025 at 10:00

If your healthcare data hasn't been breached in 2024, then you either don't know it yet or should consider yourself very lucky. 

That's because 2024 was a nightmare year for healthcare institutions and patients in the U.S. A total of 184,111,469 records were breached. That's 53% of the 2024 population of the United States. 

This staggering figure represents a significant increase from previous years, setting a new and alarming record in healthcare data breaches. 

The healthcare sector faced unprecedented challenges in cybersecurity, with attacks becoming more frequent, sophisticated and damaging than ever before.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Being admitted to a hospital is stressful enough. It caused additional stress for the 100 million clients of Change Healthcare, whose data was exposed following a breach orchestrated by the BlackCat ransomware group. Not only did the breach expose sensitive health information, but it also caused widespread disruptions in claims processing. Patients and providers across the country faced chaos as the breach impacted their ability to access and pay for healthcare services.

The second significant breach occurred at Kaiser Foundation Health Plan, where the personal data of 13.4 million individuals was compromised. This breach involved unauthorized access and the use of tracking technologies that transmitted user interactions to third parties. 

HACKERS CLAIM MASSIVE BREACH OF COMPANY THAT TRACKS AND SELLS AMERICANS' LOCATION DATA

You’ll receive a notification letter, although be aware that it may take months before it reaches you (as was the case for victims of the Ascension Health data breach). The consequences are real and can be very painful. Medical identity theft directly affects patients' health and safety. It happens when criminals use stolen personal health information to obtain medical services or medications under another person’s name. It can result in incorrect medical records being created that can include inaccurate diagnoses, allergies or treatments. 

And as you may have guessed, it can also result in financial repercussions, such as patients getting fraudulent claims and bills for services they did not receive. Resolving these issues with insurers and healthcare providers takes time and mental strength. And you’re probably not in a hurry to see your breached healthcare provider ever again. That’s normal. A study has shown that up to 54% of patients consider switching providers after a data breach.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

ARE DATA BROKERS ENDANGERING YOUR RETIREMENT SECURITY?

Sensitive health information can easily be combined with personal identifiers from data brokers, creating comprehensive profiles that criminals can exploit. As a reminder, data brokers are companies that specialize in collecting, processing and selling personal information from various sources, including public records, online activities and social media. 

They aggregate this data to create detailed consumer profiles that can be sold to marketers, insurance companies and other entities for various purposes. The more detailed the profile, the higher the chance of identity theft and potential discrimination in employment and insurance. Employers might make hiring decisions based on perceived health risks, while insurers could deny coverage or increase premiums.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

You can’t prevent a data breach, but you can minimize its consequences by reducing your digital footprint overall.

1. Set your social media to private: Restrict access to your personal information and limit what strangers can see about your life and potentially your health status. Ensure your privacy settings are robust and regularly updated to prevent unauthorized data collection.

2. Remove your personal data from data brokers’ databases: Either by searching for your name on people search sites and requesting removals, one by one, or by using a data removal service. Data removal services automate data removal for you and let you track where exactly your data has been found and whether it was removed, not only on people search sites, which are public data brokers, but also on hidden, private databases where you can’t look yourself up (and these are the worst).

Once your data is removed, data removal services monitor data brokers for your data and remove it again as needed (because it has a tendency to be re-listed after a while). This way, you prevent data broker companies from compiling a full profile on you and selling it to the first bidder, whether that’s a hacker, a marketing agency or an insurance company. Check out my top picks for data removal services here.

3. Delete all unused apps on your phone: Unused applications can be hidden gateways for data leakage and potential security vulnerabilities. Regularly audit and remove apps that you no longer use or need.

4. Check the permissions of the ones you want to keep: Review each app's access to your personal data, location and device features to ensure you're not inadvertently sharing more information than necessary. Be particularly cautious with health and fitness tracking applications.

5. Use a VPN (virtual private network) when browsing: Encrypt your online activities and mask your digital location to add an extra layer of anonymity and protection. A reliable VPN can help shield your personal information from potential interceptors and data miners. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

The reality of healthcare data breaches is daunting, but it’s not entirely out of your control. While you can’t prevent breaches from happening, you can take steps to minimize the risks and protect your personal information. Think of it as adding locks to your digital doors: set your social media to private, use a VPN and clean up unused apps. Remember, the less information you leave out there, the harder it is for bad actors to exploit it. Stay vigilant and don’t let your data become someone else’s advantage.

How do you feel about the growing risks to your personal information, and what steps have you taken to protect your data? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

❌
❌