Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Elon Musk needs H-1B workers because math education fails our students

3 February 2025 at 07:00

When entrepreneur Elon Musk made headlines with his vociferous comments supporting the H-1B visa program, the ensuing debate focused on the implications of his position on immigration. 

But this debate obscured the reason America even has such a program in the first place: its homegrown students are being poorly educated in math. 

According to federal law, the H-1B program gives visas to foreigners coming to perform services "in a specialty occupation." A specialty occupation is defined as requiring "theoretical and practical application of a body of highly specialized knowledge," plus higher education requirements. 

US 'REPORT CARD' SHOWS STUDENTS HAVE FALLEN BEHIND IN READING, BARELY BUDGED IN MATH: ‘THE NEWS IS NOT GOOD’

The program is annually capped at 65,000 regular H-1B visas, with another 20,000 for those foreigners who have earned advanced degrees from U.S. universities. 

Given Musk’s vehement support of the program, it is no surprise that a federal report states that in 2023, "computer-related occupations were the largest major occupational area, accounting for 65% of all beneficiaries [of the program]." In comparison, less than 1% of H-1B visas were given to foreigners in the social sciences. 

While much of the coverage of the H-1B debate focuses on the foreign-versus-American-worker angle, the real issue regarding H-1Bs is that the U.S. is failing to produce domestic workers with the requisite math skills required by Musk’s SpaceX and other high-tech companies. 

In 2024, a shocking 72% of eighth-grade students taking the National Assessment of Educational Progress math exam failed to score at the proficient level -- a full 6% increase over the 66% of eighth graders failing to achieve proficiency in 2019.

Why are American students doing so badly in math? The answer lies in the ineffective math instruction they are receiving. 

In the early 2010s, most states adopted the Common Core national education standards, which were touted as a cure for America’s math woes. Unfortunately, Common Core turned out to be bad medicine. 

Common Core confused many students by emphasizing indirect ways to arrive at the right answer instead of just learning straightforward mathematical operations. 

For example, in multiplying numbers, children are often asked to draw pictures instead of simply memorizing the multiplication tables. 

Michael Malione, a professional math tutor in California, said that his students were instructed by their public schools to draw and shade different areas of rectangles when multiplying fractions, rather than simply multiplying the numerators and multiplying the denominators to get the correct answer. Requiring students to learn math this way is both inefficient and ineffective. 

"We’re going to draw a picture every time we’re given 10 problems with fractional multiplication, when you could do them in your head?" Malione asks. "That’s insane." 

Malione sees students "who are completely lost and they’re not getting the step-by-step guidance early on." 

Given Malione’s experience, it is unsurprising that a federally funded study found that Common Core had significant negative effects on the math achievement of eighth graders. 

College math professors are shocked at students’ poor math skills. 

One college math instructor in the Silicon Valley lamented that the lack of algebra knowledge is "the number one deficiency and its chronic." He said, "we’re not producing the kinds of students and graduates that Silicon Valley needs."

CLICK HERE FOR MORE FOX NEWS OPINION 

Sugi Sorensen, a top engineer at famed Jet Propulsion Laboratory who also tutors students in math, urged a return to proven traditional math practices, which includes mastering the basic skills of addition, subtraction, multiplication, and division through "the memorization of math facts and procedures" so that students "can perform computations quickly, accurately, and effortlessly." 

Further, math topics should be sequential, "where new concepts are built upon previously learned ones in a structured, hierarchical manner," Sorensen said. 

Finally, Sorensen recommends that math operations such as long division "should be explicitly taught and practiced until mastery," with an emphasis on accuracy. 

America has nearly 50 million K-12 students. If schools use proven math instructional methods instead of failed progressive techniques, there would be less need for H-1B visas because there would be more than enough young Americans with the skills companies need. The tech titans at Trump's inauguration should lean on schools to do just that. It is time to make math great again. 

Lance Izumi is senior director of the Center for Education at the Pacific Research Institute. He is the author of the PRI book The Great Classroom Collapse: Teachers, Students, and Parents Expose the Collapse of Learning in America’s Schools. 

CLICK HERE TO READ MORE FROM LANCE IZUMI

Big rigs deliver cargo with no humans at the wheel

3 February 2025 at 06:00

Are you ready to share the road with massive semi-trucks cruising down the highways next to you without a human driver? Well, that is one step closer, thanks to the groundbreaking partnership between Kodiak Robotics and Atlas Energy Solutions. These innovative companies have just pulled off something incredible. They successfully launched the first-ever commercial driverless trucking operation.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Kodiak Robotics has become the first company globally to deliver a driverless semi-truck to a customer while also being the first to generate ongoing revenue from driverless trucks. Atlas Energy Solutions, in turn, has made history as the first customer to launch a commercial delivery operation using driverless semi-trucks.

Don Burnette, founder and CEO of Kodiak Robotics, tells CyberGuy, "Through this partnership, we are providing a critical service to Atlas, helping them to provide freight service in one of America’s most difficult trucking environments."

YOU WON’T BELIEVE HOW FAR VOLVO'S NEW ELECTRIC SEMI-TRUCK GOES ON A SINGLE CHARGE

Atlas has successfully completed 100 loads of proppant sand deliveries using Kodiak RoboTrucks, establishing itself as the pioneer in making driverless deliveries with its own autonomous fleet. The operations span the 75,000 square mile Permian Basin in West Texas and Eastern New Mexico, showcasing the scalability and efficiency of the technology.

Burnette emphasized that "before launching driverless service, we completed our safety case – Kodiak’s comprehensive study that demonstrates the safety of our self-driving system – for work in the Permian Basin."

YOUR QUESTIONS ANSWERED - EXPLORING HYDROGEN-POWERED VEHICLES FOR THE FUTURE OF TRANSPORTATION

THE FUTURE OF TRUCKING ROLLS FORWARD IN SHELL'S EXPERIMENTAL BIG RIG

The high demand in the Permian Basin is driving rapid scaling of operations, enabling Kodiak to earn significant revenue from its RoboTrucks faster than any other autonomous truck company. This accelerated growth demonstrates the commercial viability of autonomous trucking technology.

"We are now working to extend the safety case to highways over the course of 2025," Burnette said. "This large-scale operation allows us to rapidly accumulate driverless experience, which will benefit our on-highway customers and contribute to the successful launch of our on-highway driverless operations. We believe we have a 12- to 18-month lead on launching driverless semi-trucks at scale."

TECH TURNING BIG RIGS, TRUCKS, EVEN TANKS INTO SELF-DRIVING VEHICLES

Concurrent with the RoboTruck operations, Atlas has launched the Dune Express, a 42-mile autonomous conveyor belt in the desert that delivers sand to the autonomous RoboTrucks. This integration of the RoboTrucks and the Dune Express is a key component of Atlas' strategy to automate its entire supply chain, promising increased efficiency and safety in industrial logistics.

The autonomous trucking industry stands on the brink of a transformative era, with pioneering companies like Kodiak Robotics leading the charge toward a more efficient and technologically advanced transportation landscape.

"We are encouraged by Transportation Secretary Sean Duffy’s strong commitment to creating a national regulatory framework for autonomous vehicles and are confident the new administration will ensure a clear path for innovators," Burnette said. "Ultimately, autonomous trucks will increase American competitiveness, reduce inflation, and help ensure U.S. technology leads in the 21st century. All indications suggest the industry expects the Trump administration to be favorable toward autonomous trucking. We are committed to maintaining American leadership in realizing this vision."

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The partnership between Kodiak Robotics and Atlas Energy Solutions represents a pivotal moment in the transportation industry. By successfully deploying autonomous trucks in commercial operations, they have proven the technology's readiness, as well as its economic viability. This breakthrough is likely to accelerate the adoption of autonomous trucking across various sectors, potentially reshaping the future of logistics and supply chain management.

Would you feel comfortable sharing the highway with a driverless semi-truck? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Energy-saving scam uses Elon Musk’s name – Here’s the truth

2 February 2025 at 10:00

Elon Musk, known for leading companies like Tesla, SpaceX, Neuralink and xAI and buying and rebranding Twitter as X, often finds his name linked to innovation and futuristic ideas. But his reputation also makes him a prime target for scammers.

In the past, fraudsters have used Musk’s name in cryptocurrency schemes. Now, a new scam is making the rounds. This time, scammers are promoting bogus "energy-saving" devices, falsely associating Musk with these products to gain credibility. These devices, which don’t work as advertised, are being marketed as revolutionary solutions, duping people into spending money on what is essentially a scam.

We received this email from Rick in Wilkesboro, North Carolina: "I’ve been receiving emails offering an energy-saving device developed by Elon Musk. It claims the device can reduce energy bills by 50%. I never attempted to contact anyone associated with Elon Musk, nor have I done any internet searches for such a device. Are these emails legit or another attempt by scammers hoping I click on their links?"

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Rick, it sounds like those emails are likely scams. There have been numerous reports of scammers using Elon Musk's name to promote fake energy-saving devices. These scams often claim that the device can drastically reduce energy bills, but there is no evidence that Elon Musk or any of his companies are involved in such products.

Let's dive into how this scam works and share some ways you can stay safe.

The Elon Musk energy-saving scam works by using flashy online ads, unsolicited emails and other deceptive tactics to lure victims. Scammers promote so-called "revolutionary" devices through social media, pop-ups, emails and even search engine ads, claiming the products are backed by Musk.

These ads often include fake customer reviews, exaggerated claims of slashing electricity bills by 50% or more and time-limited discounts to create urgency. Names of devices advertised in these scams include the Power Pro Save, Heunwa Power Save, Stop Watt, Miracle Watt, True Watt, Real Watt, Watt Rescue, Esaver Watt, Pro Power Save, Voltmod and more. 

Clicking on these ads leads you to sales websites designed to look legitimate. They feature fake logos, doctored before-and-after photos and bogus celebrity endorsements to build trust. The sites throw around pseudo-scientific jargon like "stabilizing electrical currents" or "rebalancing loads" to sound convincing. They also use tactics like showing inflated "regular" prices crossed out to make the current offer seem like a huge bargain.

If you look closely, though, the red flags are clear. These sites lack basic details like a company address, contact number or business registration information. Instead, they push you to place an order through an online form, demanding full payment upfront via credit card or PayPal.

After paying, customers might receive a cheap, non-functional plastic device, or sometimes nothing at all. These devices don’t reduce electricity usage. They might even waste more power. But by the time you realize it, the scammers have already pocketed your money.

DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX

Over the years, plenty of power-saving scams have promised to cut down or even eliminate your electricity bill by simply plugging in their devices. The reality is that there’s no device you can plug in that will actually reduce your electricity usage or lower your household bill.

These products often claim to "stabilize voltage" or "reduce power waste." While voltage stabilization can be useful in industrial settings, it doesn’t make much difference for typical home appliances. Most household appliances are already designed to run efficiently without the issues these devices claim to fix.

If you’re serious about saving on electricity, focus on practical solutions like upgrading to energy-efficient appliances, using smart home devices or adjusting your energy usage schedule.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

SNEAKY SCAMMERS DRAIN BANK ACCOUNT IN SINISTER PHONE PHISHING SCHEME

Too good to be true: Claims of reducing energy bills by 50% or more are often exaggerated and unrealistic.

Unsolicited emails: Receiving emails out of the blue, especially when you haven't shown interest in such products, is a common tactic used by scammers.

Use of celebrity names: Scammers frequently use well-known names like Elon Musk to lend credibility to their schemes.

Suspicious links: Be cautious of clicking on links in unsolicited emails. They can lead to phishing sites designed to steal your personal information. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

1. Verify the email: Phishing emails are a common tool scammers use to trick people into buying fake products or giving away personal information. These emails often look like they’re from legitimate sources, but they contain links that lead to fraudulent websites or prompt you to download malicious attachments. Always check the sender's email address and look for signs of a fake message, like poor grammar or urgent calls to action. 

2. Verify claims: If you're curious about a product, do some research from reputable sources before taking any action.

3. Do not click links: Avoid clicking on any links or downloading attachments from these emails. Instead, hover over the link to see its true destination. This can help you identify if it leads to a legitimate site or a malicious one.

4. Have strong antivirus software actively running on your devices: Ensure you have reliable antivirus software installed on your devices. Antivirus software helps protect your devices from malware, viruses and other security threats. Regularly update the software to ensure it can detect and remove the latest threats. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

5. Examine the website carefully: Scammers often create websites that look professional, but they’re easy to spot with a few simple checks. Look for missing or suspicious information, like the absence of a business address, phone number or business registration details. If there are fake testimonials or celebrity endorsements, that’s a red flag.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

6. Don’t fall for "too good to be true" deals: Scammers rely on offering deals that seem too good to pass up, like massive discounts or a "limited time offer." If an ad claims you can save 50% or more on a product, be skeptical. Real, quality products usually don’t come with such extreme savings, and high-tech devices like those promoted by scammers rarely live up to the hype. If it feels like too good a deal, it probably is.

7. Watch out for unusual payment methods: One of the easiest ways to spot a scam is by how the scammers ask you to pay. If a website asks for payment upfront via credit card or PayPal with no option to verify or ship the product first, it's a major red flag. Scammers take your money upfront and have no intention of sending you anything of value. Stick to reputable payment methods that offer buyer protection and avoid sites that ask for payment without proper verification.

8. Mark spam email as junk or spam: Most email providers have a feature that allows you to flag spam emails and move them to a separate folder. This can help you filter out spam emails from your inbox and also improve the spam detection of your email provider.

9. Do not share your email address publicly or with unknown sources: This can reduce the chances of your email address being collected by spammers. You can also use a disposable email or email alias for signing up for online services that you do not trust or need.

10. Use a personal data removal service: Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

YOUR EMAIL DIDN'T EXPIRE, IT'S JUST ANOTHER SNEAKY SCAM

Impersonation scams are a common way scammers steal your money. They often use well-known names like Elon Musk or big companies like Microsoft and Walmart to make you trust them, then trick you into giving away your financial details. To stay safe, avoid unsolicited emails or texts that promote products or offers. If you need to buy something, stick to trusted sellers like Amazon, Best Buy or other reputable platforms. Always double-check the legitimacy of any offer before making a purchase, especially if it comes from an unfamiliar source.

Have you ever encountered a scam using a well-known name or brand? What happened? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

China unveils the world’s fastest high-speed train with a top speed of 280 mph

2 February 2025 at 06:00

In a significant advancement for high-speed rail technology, China recently unveiled the CR450 bullet train prototype in Beijing. 

This state-of-the-art train is a testament to China's commitment to leading the world in railway innovation. 

With a test speed of 280 mph, the CR450 is poised to break records and set new standards in the area of high-speed travel.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

The CR450 is designed to operate at an impressive 248 mph, surpassing its predecessor, the CR400, which operates at 217 mph. This significant increase in speed is accompanied by a remarkable reduction in operational resistance by 22% and a weight decrease of 10%, thanks to the use of advanced materials, such as carbon fiber composites and magnesium alloys.

CALIFORNIA'S FIRST ELECTRIC TRAIN COULD BE WHAT’S COMING TO YOUR CITY

Equipped with over 4,000 sensors, the CR450 features intelligent monitoring systems that allow for real-time data collection on various operational parameters, including axle temperature and pressure. This technology enhances safety and efficiency, enabling the train to adapt to changing conditions autonomously.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

CHINA SETS WORLD RECORD FOR FASTEST HYPERLOOP TRAIN

Passenger comfort has not been overlooked. The CR450 includes noise reduction technologies that lower interior noise levels by two decibels compared to earlier models. Additionally, it offers more passenger space, expanding service areas by 4%. 

The design incorporates aerodynamic features aimed at minimizing air resistance, ensuring a smoother ride even at high speeds.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

MONSTER PLANE COULD REPLACE TRUCKS AND TRAINS

Safety remains a top priority with the CR450. It features a braking response time of approximately 1.7 seconds, allowing it to come to a complete stop from its operational speed within 21,325 feet, the same distance required by the CR400. Furthermore, an over-the-horizon system enhances emergency situation recognition capabilities.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

The China State Railway Group has announced plans for extensive line testing of the CR450 prototypes to refine technical specifications before entering commercial service. The goal is to integrate this advanced technology into China's already extensive high-speed rail network, which spans over 24,855 miles.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The unveiling of the CR450 bullet train marks an exciting chapter in high-speed rail travel. With its impressive speed, innovative technology and focus on passenger comfort, it promises to transform how we think about train travel. As China continues to lead in railway advancements, we can look forward to a future where traveling at unprecedented speeds becomes a reality for millions.

What are your thoughts on whether the U.S. should strive to keep pace with or surpass China's advancements in high-speed rail technology? Do you believe investing in high-speed rail is essential for the future of transportation in America? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Fox News AI Newsletter: Another Chinese company flexes AI muscle

1 February 2025 at 08:30

IN TODAY’S NEWSLETTER:

- Alibaba touts new AI model it says rivals DeepSeek, OpenAI, Meta's top offerings
- DeepSeek is the newest front in the AI competition between the US and China
- DeepSeek fallout: GOP Sen Josh Hawley seeks to cut off all US-China collaboration on AI development

HEATING UP: Chinese tech giant Alibaba is flexing its muscles in the global race for artificial intelligence dominance, claiming the latest version of its Qwen 2.5 can take on the top models from rivals both foreign and domestic.

NEWEST FRONT: OPINION: DeepSeek's release of a high-profile new AI model underscores a point we at OpenAI have been making for quite some time: the U.S. is in a competition with the Chinese Communist Party that will determine whether democratic AI wins over the Chinese Communist Party's authoritarian version of the technology. The U.S. must come out on top – and the stakes could not be higher.

DEEPSEEK DANGER: This week the U.S. tech sector was routed by the Chinese launch of DeepSeek, and Sen. Josh Hawley, R-Mo., is putting forth legislation to prevent that from happening again.

'NEXT WEAPON': Ask Sage founder Nicolas Chaillan addresses the emergence of the Chinese A.I. app DeepSeek, its threat to American A.I. dominance and his skepticism over the model.

REAL-LIFE TETRIS: In a groundbreaking development for warehouse automation, Ambi Robotics just launched AmbiStack, a multipurpose robotic system that promises to transform the way items are stacked onto pallets and into containers.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Apple's iOS vulnerability exposes iPhones to stealthy hacker attacks

1 February 2025 at 10:00

Generally, iPhones are considered more secure than Android devices. 

Apple’s closed ecosystem and strict App Store policies limit the risk of malware, and its centralized software updates ensure better security. In contrast, Android’s openness allows users to install apps from various sources, and updates are often rolled out at different times, making it more vulnerable to attacks. 

However, iPhones aren’t immune to security flaws. Hackers occasionally find ways to exploit them, as seen in Apple’s latest advisory. The company recently discovered that a vulnerability in iOS had been exploited for over a year. While a fix has now been released, reports suggest that hackers may have already targeted high-value individuals.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Apple has uncovered hackers exploiting a vulnerability in iOS that appears to have been lingering for more than a year. The vulnerability is a "zero-day" flaw, meaning criminals may have already exploited it, according to the latest security advisory from the company. Zero-day flaws like this are especially dangerous because they are exploited before developers can issue fixes. Apple confirmed this marks its first zero-day patch of 2025. The vulnerability affects iPhones dating back to 2018’s XS model, as well as newer iPads, Macs, and even the Vision Pro headset.

The vulnerability, tracked as CVE-2025-24085, resides in Apple’s Core Media framework, a software layer responsible for processing multimedia files. A "use after free" memory corruption error enabled hackers to manipulate the system into executing unstable code, granting them elevated privileges to bypass security protocols. Apple’s advisory suggests hackers weaponized the flaw through malicious apps disguised as legitimate media players. These apps likely abused the Core Media framework by triggering corrupted files, enabling attackers to infiltrate devices.

The attacks reportedly targeted iOS versions predating 17.2, released in December 2023, meaning the vulnerability may have been active since late 2022. Security experts speculate that hackers focused on high-value individuals — such as activists, executives or journalists — to avoid detection. The prolonged stealth of the campaign underscores the challenges of identifying sophisticated, narrowly tailored exploits.

This underscores the critical need for you to update your devices to iOS 17.2 or later, as these versions include essential fixes to safeguard against this actively exploited vulnerability.

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

In response, Apple has released fixes across its ecosystem, including iOS 18.3, macOS Sequoia, watchOS, tvOS and VisionOS. You should update your devices as soon as possible to stay protected. To install the update on your iPhone or iPad:

Pro Tip: I recommend you click Update Now and also turn on Automatic Updates to stay covered in the future.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

While Apple has patched this issue, it’s a reminder that staying on top of updates is key. Hackers are always looking for security gaps, so keeping your software up to date is one of the best ways to stay safe.

SCAMMERS FOUND A SNEAKY WAY TO BYPASS YOUR IPHONE'S SAFETY FEATURES

Protecting your iPhone requires proactive security measures. By following these seven essential steps, you can significantly reduce the risk of cyber threats and keep your personal information secure.

1. Keep your iPhone updated: I can’t say this enough. Updating your iPhone regularly is one of the most effective ways to protect it from security threats. Apple frequently releases updates that fix vulnerabilities, including critical zero-day flaws. 

2. Download apps only from the App Store: To minimize the risk of installing malware, only download apps from the official App Store. Apple’s strict app review process helps prevent malicious apps from being published, but some threats can still slip through. Always verify app details, check reviews and be cautious about app permissions before installation.

3. Enable lockdown mode for extra protection: For those of you who may be at higher risk, such as journalists or executives, Lockdown Mode provides an additional layer of security. This feature limits certain device functionalities to prevent sophisticated cyberattacks. It can be turned on via SettingsPrivacy & SecurityLockdown Mode and is especially useful for those concerned about targeted threats.

4. Enable message filtering: Use your device's built-in filtering options to sort messages from unknown senders. This feature allows you to automatically sort messages from unknown senders, easily filter unread messages and manage your message inbox more efficiently. Here are steps:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

5. Stay cautious of phishing attacks and install strong antivirus software: Phishing remains one of the most common tactics used by hackers. Be cautious when receiving unsolicited messages or emails on your iPhone, especially those with suspicious links or attachments. Always verify the sender before opening anything. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Review your security and privacy settings: Regularly reviewing your iPhone’s security settings can help you maintain strong protection. You should also review app permissions in Settings > Privacy & Security to restrict access to sensitive data, such as location or contacts. Enable Face ID or Touch ID for secure access and turn on two-factor authentication (2FA) for Apple ID and other accounts. 2FA adds an extra layer of security to your accounts by requiring a second form of verification, such as a text message or authentication app, in addition to your password. This significantly reduces the risk of unauthorized access, even if your password is compromised.

7. Invest in personal data removal services: By reducing your online footprint, you make it harder for cybercriminals to obtain your contact information, potentially preventing them from sending you deceptive phishing texts and emails in the first place. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

This iOS vulnerability is a serious reminder of the importance of staying up to date with software updates. If you’re using an iPhone from 2018 or later, make sure you’ve updated to iOS 17.2 or later as soon as possible. Hackers exploited a hidden flaw for over a year, using fake media apps to gain access to devices. While Apple has now patched the issue, the fact that it remained undetected for so long is concerning. 

Do you think companies like Apple are doing enough to protect you from cyber threats?  Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Wheeled wonder robot dog shows off crazy dance moves in all kinds of tough terrain

1 February 2025 at 06:00

Deep Robotics, a Chinese robotics firm, recently unveiled its latest innovation in quadruped robotics, the Lynx. 

This impressive robot dog combines the agility of legs with the speed of wheels, showcasing its exceptional flexibility. 

Emerging from Hangzhou's cutting-edge robotics landscape, the Lynx is pushing the boundaries of what autonomous mobile robots can achieve. With its groundbreaking design, the robot promises to revolutionize how we think about robotic mobility and terrain navigation.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

 A dance of versatility

The Lynx demonstrates its remarkable capabilities by performing a series of jaw-dropping maneuvers. From dancing and gliding across ice to powering through deep snow and even executing leaps and flips, this mid-sized quadruped on wheels proves its unmatched adaptability to various terrains.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

CHINA’S NEWEST HUMANOID ROBOT IS READY TO SERVE LIKE NEVER BEFORE 

What sets the Lynx apart is its unique wheeled-leg hybrid design. This innovative construction allows the robot to lock its wheels, enabling it to switch seamlessly between walking and climbing like a standard four-legged robot. This dual-mode locomotion combines the speed and efficiency of wheeled systems with the versatility of walking robots, making it ideal for navigating uneven and rugged surfaces.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

AI-POWERED ROBOT SINKS SEEMINGLY IMPOSSIBLE BASKETBALL HOOPS

The Lynx features an extraordinary range of capabilities that set it apart in the world of quadruped robotics. Its remarkable leg design allows it to climb impressive 8.7-inch steps and confidently navigate challenging 45-degree slopes with unparalleled stability and precision.

The robot features a robust IP54 protection rating, which means it can operate effectively in virtually any weather condition, from dusty construction sites to wet outdoor environments. Engineers have designed the Lynx with practical functionality in mind, ensuring it can withstand harsh external conditions without compromising performance.

Battery performance is another standout feature, with a solid three-hour operational time and innovative hot-swappable battery technology. This means users can quickly swap batteries in the field, extending mission duration and reducing potential downtime during critical operations.

High-performance video transmission ensures operators receive crystal-clear, real-time visual feedback, allowing for precise remote navigation and monitoring. The intuitive user interface further enhances the user experience, making complex robotic control feel surprisingly straightforward and accessible.

Priced at $17,999, the Lynx represents a significant but justifiable investment in cutting-edge robotic technology, offering capabilities that could transform how we approach challenging terrain and complex operational scenarios.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

NO TENNIS PARTNER? NO WORRIES WITH THIS AI ROBOT

The Lynx is part of Deep Robotics' "AI+" initiative, which is building on the company's expertise in legged robotics. It joins a lineup of innovative quadrupeds, including the Lite3, X20 and X30, each designed for specific applications ranging from emergency rescue to scientific exploration in hazardous environments.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The Lynx combines the best of both wheeled and legged locomotion. Its ability to navigate complex terrains with ease opens up new possibilities for applications in search and rescue, industrial inspection and scientific research. As AI continues to advance, we can expect even more impressive capabilities from future iterations of these robotic dogs.

So, what's your gut reaction? Are these robot dogs the most impressive technological breakthrough you've seen recently, or do they make you feel just a little bit unsettled? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

World's first AI-designed, 3D-printed shoe wants to be the next Crocs

31 January 2025 at 15:00

Move over, Crocs. There's a new contender in the world of unconventional footwear. 

Syntilay, a startup with a sparkle in its eye and artificial intelligence on its mind, has just unveiled what it claims to be the world's first entirely AI-designed and 3D-printed shoe. 

This futuristic footwear is turning heads and raising eyebrows in equal measure.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Syntilay, whose name is derived from "scintillate" (meaning to sparkle), is the brainchild of 25-year-old entrepreneur Ben Weiss. The company's journey from concept to creation is as unique as the shoes themselves. Using Midjourney AI, they generated the basic shape, which was then sketched by an artist. This sketch was transformed into a 3D model using Vizcom AI, and finally, generative AI added the distinctive patterns and textures. 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Ben tells CyberGuy, "AI designing shoes is going to disrupt the category because of the incredible speed to go to market. New releases for traditionally made shoes take around 18 months for a model to release, with AI making them and 3D printing, that is now only a few months."

AI-POWERED ROBOT SINKS SEEMINGLY IMPOSSIBLE BASKETBALL HOOPS

One of Syntilay's standout features is its commitment to personalized comfort. Before you can slip your feet into these futuristic slides, you'll need to scan your feet using your smartphone. This ensures a custom fit for each customer, even accommodating those with different-sized feet. Available in five colors – blue, black, red, beige and orange – these shoes are priced at a not-so-modest $149.99 per pair.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

SHAPE-SHIFTING AI TRANSFORMER HOMES WILL LEAVE YOU WANTING ONE

While Syntilay is pushing the boundaries of shoe design, they've also got some serious old-school cred in their corner. Joe Foster, the co-founder of Reebok, is lending his expertise to the project. With Foster's experience in building a $4 billion shoe empire, Syntilay is hoping to make big strides in the footwear market. Syntilay's ambitions extend far beyond selling a few thousand pairs of quirky slides. 

They're eyeing the $85.8 billion U.S. footwear market, with plans to open their platform to brands and content creators. This could potentially allow influencers and brands to design and sell their own AI-created footwear, tapping into a market that has traditionally been difficult for non-shoe companies to crack.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

TOP TECH STEALING THE SHOW AT CES 2025

In an age where environmental concerns are at the forefront, Syntilay is putting its best foot forward. The shoes are 100% recyclable, with customers able to return them at the end of their life to be transformed into new products. This closed-loop system could potentially revolutionize the footwear industry's approach to sustainability.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Whether Syntilay becomes the next Crocs or fades into obscurity remains to be seen. However, their innovative approach to design and manufacturing is undoubtedly pushing the boundaries of what's possible in footwear. As AI and 3D printing technologies continue to evolve, we may be witnessing the first steps towards a revolution in how we design, produce and consume fashion.

What do you think? Are AI-designed, 3D-printed shoes the future of footwear or just a passing fad? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Bill Gates surprised by Silicon Valley's rightward turn, says he'll do his 'best' to work with Trump

30 January 2025 at 09:28

Billionaire Microsoft founder Bill Gates revealed he was surprised by Silicon Valley's shift to the right during an interview published Thursday.

"I always thought of Silicon Valley as being left of center," Gates told the New York Times. "The fact that now there is a significant right-of-center group is a surprise to me."

Gates, who backed former Vice President Kamala Harris in the 2024 election, met with President Donald Trump after he won and said the president was receptive to the issues he brought up.

He added, "I will engage this administration just like I did the first Trump administration as best I can."

BILL GATES SAYS ULTRA-WEALTHY WOULD ‘HAVE A THIRD AS MUCH’ IF HE CREATED TAX SYSTEM

The Times reported that Gates gave $50 million to Future Forward, the "principle outside funding group" that supported Harris.

"Incredible things happened because of sharing information on the internet," Gates said, before addressing Facebook and Twitter's roles in society. "You see ills that I have to say I did not predict."

Gates spoke to the Wall Street Journal about his meeting with the president, and said he left the meeting impressed.

"I felt like he was energized and looking forward to helping to drive innovation," Gates told WSJ. "I was frankly impressed with how well he showed a lot of interest in the issues I brought up."

CLICK HERE FOR MORE COVERAGE OF MEDIA AND CULTURE

The big tech CEO presence at Trump's inauguration surprised members of the press, as MSNBC host Rachel Maddow questioned, "How is this happening? Why are people with tons of money up on the dais with Cabinet nominees and family members?"

Apple CEO Tim Cook was seated next to Trump's pick for Homeland Security, Kristi Noem. Amazon, owned by Jeff Bezos, and Meta, donated a million dollars to Trump's inaugural events. 

Vice President JD Vance said during an interview on Sunday that big tech was still on notice.

"We believe fundamentally that Big Tech does have too much power, and there are two ways they can go about this. They can either respect Americans' constitutional rights — they can stop engaging in censorship, and if they don't, you can be absolutely sure that Donald Trump's leadership is not going to look too kindly on them," Vance told CBS News' Margaret Brennan.

Brennan pressed Vance on whether they still planned on breaking up big tech.

How to organize, protect and streamline your inbox with an email alias

30 January 2025 at 10:00

Almost everything you do online asks for your email. If you have been using the same one for a while, chances are hundreds or even thousands of services have it. They send promotional messages, social media alerts, newsletters and more, turning your inbox into complete chaos. You can tame this madness using an email alias.

An email alias helps declutter your inbox by organizing emails based on their purpose. For example, you can create specific aliases for shopping, newsletters or work and set up filters to sort these messages into separate folders automatically. 

Aliases also help manage spam. If an alias starts receiving too many unwanted messages, you can disable it without affecting your main email.

Let’s dive into how to create an email alias on different platforms, including Gmail, Outlook and iCloud. 

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Gmail doesn’t allow you to create a completely separate alias, but it offers workarounds using "+ addressing" or by adding dots to your existing email address. However, these methods don’t prevent an unscrupulous sender from seeing your primary address, so exercise caution when using them with untrusted correspondents. Follow the steps below to get started.

Use your existing Gmail address and add a "+" followed by any keyword before "@gmail.com."

Example: If your email is yourname@gmail.com, you can use:

No additional setup is needed, just start using this alias when signing up for services or sharing your email.

Gmail ignores dots (.) in email addresses, so you can create variations of your email:

Example: If your email is yourname@gmail.com, you can use:

All variations will deliver emails to your main inbox automatically.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Outlook.com allows you to create additional email addresses (aliases) that are linked to your primary account. Emails sent to an alias will arrive in your primary inbox, and you can send messages using the alias as well.

If your primary email is johnsmith@outlook.com, you can create an alias like john.smith123@outlook.com. Emails sent to john.smith123@outlook.com will still go to johnsmith@outlook.com, but you can choose to send emails using either address.

Steps to create an alias:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Once added, you can send emails using your alias by selecting it in the From field when composing a new message.

Important limitations to note:

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

Apple allows you to create up to three email aliases through iCloud. These aliases can be used for specific purposes, helping you manage your inbox effectively. Here’s how to create one:

It's important to note that you can still create up to three email aliases through iCloud. Remember that while these aliases provide some flexibility, they do not create separate Apple IDs or completely hide your primary iCloud email address.

BEWARE OF ENCRYPTED PDFS AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

While many email providers offer basic alias functionality, most have significant limitations. Gmail's "+" addressing and dot tricks, Outlook's linked aliases and Apple's iCloud aliases all provide some flexibility, but they often fall short of true privacy protection.

For those of you seeking comprehensive email privacy and robust alias management, my No. 1 pick for private and secure email platforms contains no ads, no tracking and powerful privacy features like password-protected email and unlimited disposable email addresses. See my review of the best secure and private email services here.

Protecting your inbox from scammers requires a combination of smart practices and proactive tools. Using email aliases is an effective first step. By creating specific aliases for different activities, such as shopping, subscriptions or work, you can track where spam is coming from and deactivate problematic aliases as needed. Below are some other steps to take.

1. Avoid sharing your primary email address publicly on forums, social media or other platforms to minimize exposure. Most email providers offer robust spam filters, so ensure they are enabled and customize them as needed

GET FOX BUSINESS ON THE GO BY CLICKING HERE

2. Invest in personal data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

3. Enable two-factor authentication on all your email accounts to add an extra layer of security.

4. Be cautious of suspicious links and attachments. Never click on links or download attachments from unknown senders, as these could be phishing attempts.

5. Use strong antivirus software to protect against potential malware that might come through spam emails. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Regularly update your email password and make it strong and unique, avoiding common words or easily guessable combinations. Consider using a password manager to generate and store complex passwords.

These steps will provide a more comprehensive approach to protecting your inbox from scammers and reducing unwanted emails.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Taking charge of your inbox doesn’t have to be overwhelming. By implementing the tips and tools mentioned above, you’ll create a more secure, efficient and manageable email experience. Whether you’re battling spam or organizing your digital life, email aliases and secure services are great things to put into place.

Which email platform do you use most often, and how do you organize your messages there? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Warehouse robot uses AI to play real-life Tetris to handle more than ever before

30 January 2025 at 06:00

In a groundbreaking development for warehouse automation, Ambi Robotics just launched AmbiStack, a multipurpose robotic system that promises to transform the way items are stacked onto pallets and into containers. 

This innovative solution tackles a fundamental challenge in logistics: maximizing space utilization and reducing shipping costs.

AmbiStack operates like a real-world 3D Tetris game, expertly arranging items to optimize space in containers and pallets. By minimizing wasted space, warehouses can significantly reduce shipping costs and improve overall efficiency.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

"Logistics companies are under continuous pressure to deliver items faster and for lower cost, which puts a lot of strain on operations to maintain reliability while rapidly adapting for the future," Jim Liefer, CEO of Ambi Robotics, also tells CyberGuy. 

"AmbiStack can be rapidly configured to automate the repetitive motions involved in a huge variety of stacking and palletizing applications, driving greater accuracy and efficiency, while future-proofing warehouse operations."

CHINA’S NEWEST HUMANOID ROBOT IS READY TO SERVE LIKE NEVER BEFORE

The rapid development and deployment of AmbiStack was made possible by PRIME-1, Ambi Robotics' new artificial intelligence foundation model for warehouse robots. This advanced AI enables AmbiStack to begin working efficiently from day one in production environments.

Ken Goldberg, co-founder and chief scientist at Ambi Robotics, tells CyberGuy, "The engineering team at Ambi Robotics used 4 years of proprietary warehouse data to train a state-of-the-art generative model for 3D warehouse operations; their experiments with real production systems confirm that PRIME-1 significantly outperforms their previous systems."

ROBOTS PERFORM LIKE HUMAN SURGEONS BY JUST WATCHING VIDEOS

Cost reduction and efficiency: AmbiStack addresses the pressing need for automated solutions that cut labor costs, reduce manual inefficiencies and tackle accuracy challenges.

Ergonomic improvements: The system alleviates the physical strain on workers by handling heavy lifting tasks.

Adaptive intelligence: Trained using Sim2Real reinforcement learning, AmbiStack can make real-time decisions, adapting to various scenarios and delivering a faster return on investment.

Tackling complex tasks: Stacking presents more challenges than sorting, making AmbiStack a significant advancement in robotic capabilities.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

CHINESE ROBOT LIFTS 35 POUNDS PER HAND

AmbiStack utilizes advanced vision systems and AI models trained on extensive data from parcel sorting experiences. The robot learns in a virtual environment, earning higher scores for better stacking performance with random items.

Jeff Mahler, co-founder and CTO of Ambi Robotics, tells CyberGuy, "AmbiStack represents an evolution of our AI-powered robotics, building on our technology in physical AI to add stacking as a fundamental new robot skill in AmbiOS. We’ve started the AI flywheel for stacking with Sim2Real reinforcement learning and performance will only improve as robots collect data from production environments. We are committed to advancing this capability to provide reliable systems that deliver a strong ROI for our customers."

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

The potential market for AmbiStack is vast, as efficient packing and stacking are crucial in logistics. By optimizing container usage, AmbiStack ensures that companies aren't "shipping air," leading to substantial cost savings in transportation.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

AmbiStack is designed to complement human workers, not replace them. It allows employees to focus on decision-making and strategic tasks while reducing physical strain and repetitive motions.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

By combining advanced AI with practical robotics, AmbiStack is addressing a long-standing challenge in logistics. As the industry continues to evolve, solutions like AmbiStack will play a crucial role in shaping the future of warehouse operations and supply chain efficiency.

Do you believe these technologies will ultimately complement human workers or gradually replace them entirely in logistics and warehouse operations? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: DeepSeek underscores US-China race for AI dominance, OpenAI says

29 January 2025 at 12:09

IN TODAY’S NEWSLETTER:

- DeepSeek is the newest front in the AI competition between the US and China

- Trump, OpenAI CEO weigh in on DeepSeek frenzy

- Willing to pay $175,000 for a life-size robot friend that remembers everything about you?

CRITICAL FIGHT: DeepSeek’s release of a high-profile new AI model underscores a point we at OpenAI have been making for quite some time: the U.S. is in a competition with the Chinese Communist Party that will determine whether democratic AI wins over the Chinese Communist Party's authoritarian version of the technology. The U.S. must come out on top–and the stakes could not be higher.

'WAKE-UP CALL': President Donald Trump and OpenAI CEO Sam Altman both joined in on the buzz surrounding Chinese artificial intelligence startup DeepSeek, which sent the technology sector into turmoil on Monday following its emergence as a potential rival to leading U.S.-based firms.

ROBOT FRIEND MELODY: In a world where loneliness is becoming increasingly prevalent, researchers have taken a bold step forward by introducing Melody, a life-sized artificial intelligence robot designed to combat this growing epidemic. 

AI RACE: China-based artificial intelligence startup DeepSeek's release of new AI models that rival those made by leading U.S. tech firms roiled markets on Monday and prompted concerns about U.S. firms losing their edge in the AI race to Chinese rivals.

ROBOTIC DOG COMPANION: U.S. robotics company Tombot has introduced "Jennie," an innovative AI-powered robotic pet designed to provide comfort and companionship to those facing cognitive health challenges.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

UnitedHealth cyberattack exposes 190 million in largest US healthcare data breach

29 January 2025 at 10:00

UnitedHealth’s Change Healthcare unit suffered a data breach in February 2024, the news of which surfaced Feb. 21. 

Initially reported to have affected around 100 million individuals, the U.S. health insurance giant has now revealed that the actual number is significantly higher: 190 million. This makes it the largest breach of medical data in U.S. history, affecting nearly half the country’s population. 

A breach of this magnitude can have devastating consequences for the American people as malicious actors could exploit the data for a range of attacks if it finds its way to the dark web.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

UnitedHealth confirmed on Friday, Jan. 24, 2025, that the ransomware attack on its Change Healthcare unit affected approximately 190 million people in the United States. The company had previously estimated the number of affected individuals to be around 100 million in its preliminary analysis filed with the Office for Civil Rights, a division of the U.S. Department of Health and Human Services that investigates data breaches.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

UnitedHealth stated that the majority of those impacted have already been notified, either directly or through substitute notice. The final tally of affected individuals will be confirmed and submitted to the Office for Civil Rights at a later date.

The company tells CyberGuy it is "not aware of any misuse of individuals’ information as a result of this incident and has not seen electronic medical record databases appear in the data during the analysis." However, UnitedHealth did not disclose when it became aware of the additional 90 million victims, how the revised figure was determined or what changes led to the updated number.

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

The cyberattack on Change Healthcare in February caused widespread disruptions across the U.S. healthcare sector, as the company took its systems offline to contain the breach. This shutdown impacted critical services such as claims processing, payments and data sharing, which many healthcare providers rely on.

The stolen data varied by individual but included a broad range of personal and sensitive information, such as names, addresses, dates of birth, phone numbers, email addresses and government ID numbers, including Social Security, driver’s license and passport details.

Plus, hackers may have accessed health-related information, including diagnoses, medications, test results, imaging records, care and treatment plans, and health insurance details. Financial and banking information tied to claims and payment data was also reportedly compromised.

The breach was the result of a ransomware attack carried out by ALPHV/BlackCat, a Russian-speaking ransomware and extortion group. The attack, a form of malware intrusion, locks victims out of their data unless a ransom is paid. ALPHV/BlackCat later took credit for the attack.

During a House hearing in April, Change Healthcare admitted that the breach was made possible due to inadequate security measures, specifically the absence of two-factor authentication to protect its systems.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

FROM TIKTOK TO TROUBLE: HOW YOUR ONLINE DATA CAN BE WEAPONIZED AGAINST YOU

1. Remove your personal information from the internet: The breach has exposed sensitive personal data, making it essential to reduce your online footprint. While no service can guarantee complete data removal, a reputable data removal service can significantly limit your exposure. These services systematically monitor and erase your personal information from numerous websites and data brokers. Check out my top picks for data removal services here.

2. Be wary of mailbox communications: With addresses among the compromised data, scammers may exploit this breach to send fraudulent letters. Be aware of mail claiming missed deliveries, account suspensions or security alerts. Always verify the authenticity of such communications before responding or taking action.

3. Be cautious of phishing attempts and use strong antivirus software: Scammers may use your compromised email or phone number to target you with phishing attacks. Be wary of messages asking for personal information or containing suspicious links. To protect yourself, ensure strong antivirus software is installed on all your devices. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Monitor your accounts: Given the scope of this breach, regular monitoring of your bank accounts, credit card statements and other financial accounts is critical. Look for unauthorized transactions or suspicious activity and immediately report any issues to your bank or credit card provider.

5. Recognize and report a Social Security scam: If your Social Security number is exposed, you could become a target for related scams. Official communication regarding Social Security issues usually comes via mail, not phone calls or emails. Learn more about spotting and reporting scams by visiting the Social Security Administration’s scam information page.

6. Invest in identity theft protection: Data breaches happen every day, and most never make the headlines, but with an identity theft protection service, you’ll be notified if and when you are affected. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

It’s surprising that a company of UnitedHealth’s scale failed to implement even basic cybersecurity measures when handling customer data. A breach affecting 190 million people – nearly half of the U.S. population – is staggering, leaving almost anyone at risk of becoming a target for hackers. While the company is still assessing the full extent of the breach, you can take precautions now by being cautious with any unknown links or unsolicited calls. Bad actors may use a variety of tactics to cause harm.

Do you think these companies are doing enough to protect your data, and is the government doing enough to catch those behind cyberattacks? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Don’t be so quick to click that Google Calendar invite. It could be a hacker’s trap

29 January 2025 at 06:00

A sophisticated phishing campaign exploiting Google Calendar has been uncovered by Check Point Software Technologies, raising alarms among cybersecurity experts. 

Cybercriminals are sending fake meeting invitations that appear legitimate, redirecting victims to phishing sites and mimicking Google's platforms to steal sensitive information. 

This emerging threat is particularly concerning given the widespread use of Google Calendar, which serves more than 500 million users globally in 41 languages. Researchers have identified nearly 4,000 phishing attempts in a matter of weeks, impersonating more than 300 reputable brands.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Hackers leverage the trust in Google's services to carry out their attacks. Victims receive seemingly authentic meeting invites via Google Calendar. Upon clicking links within these invites, they are taken to fake web pages that prompt them to input personal data. Once compromised, this information can be used for identity theft, financial fraud and unauthorized access to other accounts. Security experts warn that attackers are now using AI to craft highly convincing fake invitations, making it even harder to spot the fraud. Reacting to the findings from Check Point, a spokesperson for Google said:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

"We recommend users enable the 'Only If The Sender Is Known' setting in Google Calendar. This setting helps defend against this type of phishing by alerting the user when they receive an invitation from someone not in their contact list and/or they have not interacted with from their email address in the past."

ASK KURT: HOW TO NAVIGATE GOOGLE’S PRIVACY SETTINGS

Google has introduced the "known senders" feature in Google Calendar to combat sophisticated phishing attempts. This setting helps you filter out potentially malicious calendar invites. Here's how to enable it:

This ensures that only events from contacts, your organization or previous interactions are automatically added to your calendar.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

HOW ONE MAN GOT SCAMMED IN SECONDS USING GOOGLE

To further protect yourself from phishing scams, follow these steps.

Scrutinize unexpected invites carefully: Examine the sender's details, including their name, domain and email address, for any inconsistencies or signs of spoofing.

Avoid clicking suspicious links or downloading attachments from unknown sources: Threat actors often embed malicious links in calendar invites that can lead to phishing websites designed to steal your personal information.

Use strong antivirus software: This provides an additional defense mechanism against malware and can help detect potential phishing attempts before they cause damage. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Enable two-factor authentication (2FA) for your Gmail account: 2FA adds an extra layer of security that can prevent unauthorized access, even if your credentials are compromised.

Keep your security settings up to date: Regularly review and adjust your calendar and email settings to protect against evolving phishing tactics.

HOW A WRONG GOOGLE SEARCH CAN COMPROMISE YOUR DATA AND BRING LAW ENFORCEMENT CALLING

As phishing tactics evolve, cybercriminals are exploiting trusted platforms like Google Calendar to bypass traditional security measures. This underscores the importance of user vigilance and proactive security practices. By enabling the "known senders" setting and implementing additional security measures, you can significantly reduce the risk of falling victim to calendar-based phishing scams.

What digital security challenges have you encountered recently? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fake toll road texts sweep America as Chinese scammers target US drivers

28 January 2025 at 10:00

A new scam has come to light targeting residents across the United States with text messages that pretend to be from toll road operators. For many who receive these messages, it’s an easy and expensive trap to fall into.

The scam begins when people receive a message claiming they have unpaid tolls and may be charged fines. Scammers then ask for card details and a one-time password sent via SMS to steal their money. Security researchers believe that Chinese smishing groups are behind this scam, selling SMS-based phishing kits to thousands of scammers.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

As reported by KrebsOnSecurity, the scam begins with a text message claiming to be from a toll road operator, such as E-ZPass or SunPass. The message warns about unpaid tolls and the possibility of fines, forcing recipients to act quickly. Victims are directed to a fake website mimicking the toll operator’s site, where they are asked to provide sensitive information, including payment card details and one-time passwords. 

Security researchers have traced the scam to Chinese smishing groups known for creating and selling sophisticated SMS phishing kits. One such kit, "Lighthouse," makes it easy for scammers to spoof toll road operators in multiple states. These kits are designed to trick users into sharing financial information, which is then used to commit fraud. 

Reports of these phishing attacks have surfaced across the U.S., targeting users of toll systems like EZDriveMA in Massachusetts, SunPass in Florida and the North Texas Toll Authority in Texas. Similar scams have been reported in states including California, Colorado, Connecticut, Minnesota and Washington. The phishing pages are mobile-optimized and won’t load on non-mobile devices, making them even more deceptive.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Recent advancements in phishing kits include better deliverability through integration with Apple iMessage and Android’s RCS technology, bypassing traditional SMS spam filters. These methods increase the likelihood of victims receiving and engaging with fraudulent messages. The phishing sites are operated dynamically in real time by criminals, making them harder to detect and shut down. Even individuals who don’t own a vehicle have reported receiving these messages, indicating random targeting.

THAT APPLE ID DISABLED MESSAGE? IT'S A DANGEROUS SCAM

By staying vigilant and following the steps below, you can protect yourself from falling victim to toll scams. 

1) Verify directly with toll operators: If you receive a message about unpaid tolls or fines, do not click on any links. Instead, visit the official website of your toll operator or contact their customer service directly to verify the claim.

2) Install strong antivirus software: The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Do not share personal information: Never provide sensitive details like payment card information, Social Security numbers or one-time passwords via text or unverified websites. Legitimate toll operators will not request such information through SMS.

4) Enable two-factor authentication (2FA): Use 2FA for your accounts whenever possible. This adds an extra layer of protection by requiring two forms of verification, reducing the risk of unauthorized access even if some details are compromised.

5) Be wary of urgency in messages: Scammers often create a sense of urgency, claiming immediate action is required to avoid penalties. Take a moment to assess the situation and verify the legitimacy of the message through official channels.

6) Report suspicious messages: If you suspect a phishing attempt, report it to the Federal Trade Commission or the FBI's Internet Crime Complaint Center. Include details like the sender’s phone number and any links in the message. Additionally, inform your mobile carrier to help block similar scams.

7) Use a personal data removal service: Employ a reputable data removal service to reduce your online footprint and minimize the risk of scammers obtaining your personal information. These services can help remove your data from various data broker sites, making it harder for scammers to target you with personalized scams. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

It’s deeply concerning how these scams are becoming increasingly sophisticated and widespread. It’s no longer just about random phishing attempts. These are carefully crafted schemes designed to exploit our trust in systems we rely on daily. The fact that scammers can impersonate toll road operators so convincingly is alarming, and it shows how vulnerable we are to such attacks. It frustrates me to think of how many people may fall victim to these tactics, losing their hard-earned money.

Have you recently received a suspicious text message claiming to be from a toll road operator or any other service? How did you react? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

How to share a YouTube video starting at a specific time

28 January 2025 at 06:00

Ever watched a YouTube video and thought, "I need to share this exact moment with my friends?" Well, you're in luck. Sharing specific moments from YouTube videos is actually pretty easy. Whether you're on a computer, iPhone or Android device, I'm here to show you how easy it is to do just that.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

YOUTUBE’S 5 MOST OVERLOOKED USEFUL FEATURES

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

YouTube has recently introduced a new, simplified method for sharing video timestamps on Android.

Settings may vary depending on your Android phone’s manufacturer. 

These updated steps make sharing timestamps much simpler, as you no longer need to use Chrome or request the desktop site. For those using older versions of the YouTube app or Android OS or if the update isn't yet available on your device, here are the previous steps:

Settings may vary depending on your Android phone’s manufacturer. 

Both methods allow you to share specific moments in YouTube videos on your Android, but the new process is more streamlined and user-friendly.

TOP ANDROID PHONES OF 2025

Sharing specific parts of a YouTube video has never been easier. Whether you’re on a computer, iPhone or Android device, these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.

Now that you know the steps to share an exact moment, follow our guide and share a specific part of our video with your friends right away. Don't forget to let us know their reactions by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Outsmart hackers who are out to steal your identity

27 January 2025 at 10:00

Did you know that identity theft happens every 22 seconds? This means that, by the time you finish reading this sentence, someone has likely had their identity stolen. At best, identity theft will steal away your time and patience. But more often, identity theft leads to severe consequences, like losing control over your financial accounts, having your credit score affected or even losing lifelong savings.

However, you don't have to be a statistic. By understanding how identity thieves operate and implementing smart protection strategies, you can make your personal data a fortress that's too challenging for cybercriminals to breach. Drawing from the Federal Trade Commission's (FTC) latest Identity Theft Awareness Week insights, I'll walk you through expert-backed strategies to shield your most valuable asset: your identity.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

With so much of our lives having moved online, identity thieves are having an easier time than ever. Your most important accounts – banking, credit, Social Security – are all digital. Thieves don’t need to know much about you to steal your identity, just a few pieces of personal information can be enough. According to the Bureau of Justice Statistics, 24 million Americans reported identity theft in the past 12 months. In their lifetime, 1 in 3 Americans (more than 110 million people) have experienced identity theft. Here’s the part many people don’t realize: You might have already been a target. Maybe your identity was stolen, and the thieves failed, or maybe your good online habits saved you without you even knowing, which brings us to the next lesson: prevention.

THINK YOU'RE SAFE? IDENTITY THEFT COULD WIPE OUT YOUR ENTIRE LIFE’S SAVINGS

You don’t need to spend a fortune to guard against identity theft. While professional services can be helpful, most of what you need comes down to better habits and awareness. Here are some simple steps you can take today:

1) Check your accounts regularly: Review your bank, credit card and Social Security accounts for transactions you didn’t make, failed login attempts and password reset requests you didn’t initiate.

2) Keep an eye on your mail: Look for letters regarding accounts you didn’t open, notices of data breaches and transaction summaries that don’t match your records.

3) Monitor your email inbox: Be alert for password reset emails you didn’t request, confirmation of new accounts you didn’t open, receipts for purchases you didn’t make.

4) Use two-factor authentication (2FA): 2FA adds extra layers of security to your accounts. Even if a thief has your password, they won’t be able to log in without a second step, like a code sent via text message or app-based verification. While logging in might take an extra moment, it’s worth it; 2FA dramatically increases account security.

5) Check your credit report annually: Visit AnnualCreditReport.com to get your free credit report once a year. Use it to spot suspicious activity early. If you see something unusual, take action right away.

6) Use strong passwords: Use complex passwords and a password manager to secure your online accounts. Strong passwords are your first line of defense against cyber threats.

7) Stop oversharing: Limit the personal information you share on social media and other platforms. It’s a treasure trove for cybercriminals who use it to craft convincing fraud campaigns targeted specifically at you.

10 SIGNS YOUR IDENTITY HAS BEEN COMPROMISED

Nearly half of Americans don’t know how to respond if they fall victim to identity theft. Acting quickly can make a huge difference. Here’s what to do:

1) Contact the affected institution: Contact the company immediately if you notice something unusual, like a suspicious charge or an unfamiliar account. They’ll guide you through securing your account.

2) Change your passwords: Update the password for the affected account and any others using the same credentials. Use strong, unique passwords for each account to avoid further risks.

3) Report the theft to the FTC: Visit IdentityTheft.gov to report identity theft and get personalized recovery steps.

4) Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

Data breaches often start with personal information that’s readily available online. People search sites and data brokers collect and sell this information, including your name, address, phone number and more. Can you get your data removed? Yes, but it’s tricky. These companies don’t make it easy, and managing removal requests for hundreds of sites can be overwhelming. 

Instead, consider using a personal data removal service. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

CELLPHONE NIGHTMARE LEADS TO PORTED NUMBERS, IDENTITY THEFT, FIGHT FOR RECOVERY

Look, identity theft is scary, but you're not helpless. By staying smart and proactive, you can dramatically reduce your risks. Think of protecting your identity like locking your front door: It's just good common sense in today's digital world. At the end of the day, a little awareness goes a long way, and you've already taken the first step by reading this article. Now, take what you've learned and apply it to keep you safe from cybercriminals.

What situation have you found yourself in where you felt vulnerable to identity theft or needed help protecting your personal information? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Scammers find sneaky way to bypass your iPhone's safety features

27 January 2025 at 06:00

In an alarming development, cybercriminals have devised a new method to circumvent Apple's built-in phishing protection for iMessage, potentially exposing you to malicious links and scams. This sophisticated tactic exploits a security feature designed to protect you, turning it into a vulnerability that could lead to significant personal and financial risks.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Apple's iMessage automatically disables links in messages from unknown senders as a security measure. However, cybercriminals have found a way to exploit this protection. By instructing you to reply to the message, often with a simple "Y," the attackers can re-enable previously disabled links. This seemingly innocuous action not only activates the links but also signals to the scammers that they've found an engaged target for future attacks.

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

Apple defines social engineering as a targeted attack that employs impersonation, deception, and manipulation to gain access to personal data. Scammers often pose as representatives of trusted companies, using sophisticated tactics to persuade individuals to disclose sensitive information, such as passwords and financial details. Here are some of those sneaky tactics:

The messages typically end with instructions like: "(Please reply Y, then exit the SMS, re-open the SMS activation link, or copy the link to open in Safari)."

THE ONE SIMPLE TRICK TO HELP KEEP OUT CYBER CREEPS ON IPHONE

This new tactic is part of a broader trend of smishing (SMS phishing) attacks targeting mobile users. With the increasing reliance on smartphones for various activities, including financial transactions and personal communications, these attacks pose a significant threat to users' security and privacy.

DOES MY IPHONE NEED ANTIVIRUS PROTECTION?

To safeguard against these sophisticated phishing attempts, consider the following steps.

1) Never reply to suspicious messages: Avoid responding to texts from unknown senders, especially those asking you to reply to activate links. Additionally, make sure to delete suspicious text messages and block the sender to prevent further attempts. Since the sender is not in your contact list, you can click Report Junk at the bottom of the text. Then click Delete and Report Junk. This will report the conversation as junk by sending it to your wireless carrier and Apple using your phone number.

2) Verify sender identity: Contact organizations directly through official channels if you're unsure about a message's legitimacy.

3) Be skeptical of urgency: Scammers often use urgent language to prompt quick, thoughtless actions.

4) Enable message filtering: Use your device's built-in filtering options to sort messages from unknown senders. Here are the steps:

This feature allows you to automatically sort messages from unknown senders, easily filter unread messages and manage your message inbox more efficiently.

5) Use two-factor authentication (2FA): 2FA adds an extra layer of security to your accounts by requiring a second form of verification, such as a text message or authentication app, in addition to your password. This significantly reduces the risk of unauthorized access, even if your password is compromised.

6) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

7) Invest in personal data removal services: By reducing your online footprint, you make it harder for cybercriminals to obtain your contact information, potentially preventing them from sending you these deceptive iMessage phishing texts in the first place. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

If you suspect you've fallen victim to a smishing attack:

One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

This latest trick targeting iMessage users serves as a reminder that even seemingly secure systems can be vulnerable to social engineering. By remaining cautious and following best practices for digital security, you can significantly reduce your risk of falling victim to these sophisticated phishing attempts.

What other cybersecurity challenges have you encountered with your mobile devices, and what questions do you have for us? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Biggest Wi-Fi mistakes you can make on a plane

26 January 2025 at 20:49

When my husband and I were on the very long flight last year, he leaned over and asked, "I want to check our Morgan Stanley account. Do you think it’s OK to do it using the plane’s Wi-Fi?"

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

How did we live without Wi-Fi on a plane? Oh, yeah, we read magazines! Sorry to be the bearer of bad news, but Wi-Fi isn’t as protected as we hope. Fear not. I’ve got some tips on protecting yourself and surfing safely in the skies.

10 TECH UPGRADES TO SAVE YOUR TIME, PRIVACY AND MONEY THIS YEAR

Hackers use all kinds of sneaky tactics to hijack your privacy in flight. One thing in their favor: VPNs are more likely to drop in and out in the air than on the ground. (More on that below.)

Without that layer of protection, cybercriminals using the same airline Wi-Fi can easily tap into your devices, access your information and spread malware.

"S" for security: Only visit encrypted websites — the ones that start with "HTTPS" (that "S" is important!). In general, this blocks a hacker from viewing your activity on a given site, like the password or credit card number you typed in.

Beware of AirDrop: Keyloggers keep track of every single thing you type, and criminals love to pass them along using Apple’s AirDrop feature. Don’t accept drops from strangers in flight. Steps here to disable or limit AirDrop if you need help.

Name game: Crooks can create fake Wi-Fi networks with almost identical names to the airline’s. If you’re not careful, you could plug into a copycat network instead of the legit one.

THE NSA SAYS DO THESE 5 THINGS WITH YOUR PHONE RIGHT NOW

Is your home connection locked down? Do this check twice a year.

I know you’re not going to skip the Wi-Fi altogether. That’s OK, just be smart about it.

Update everything: Before you hit the road, make sure your phone, computer, tablet, smartwatch and any other connected devices are running the latest software. Steps here for Windows, Mac, iPhone and Android. Updates often include critical security patches that protect against the new threats. Don’t forget to update your apps, too.

Add a layer of security: A Virtual Private Network (VPN) encrypts your internet connection. Before accessing anything sensitive, like your email, online banking or shopping accounts, turn on your VPN. Double-check its status to ensure it’s actively protecting your connection. It should display as "connected" or "secured."

Verify names. If you notice multiple Wi-Fi networks with similar names, check with the airline staff and confirm which is the right one.

Use 2FA: For any account tied to financial information or personal details, two-factor authentication is a must. This adds an extra layer of security by requiring a second verification step, like a code sent to your phone or email, after entering your password. Set this up for all accounts with ties to your finances to reduce the risk of unauthorized access.

Secure your devices. Invest in antivirus and malware-protection software, and keep your devices physically secure. Avoid leaving your phone, tablet or laptop unattended, even for a moment. 

THE STEP I TAKE TO CLEAR MY INBOX EVERY JANUARY

Stop looky loos. Get a privacy screen for your laptop to prevent nearby shoulder snooping.

Bonus: Don’t post pics of your boarding pass or other travel docs

You’re excited, waiting for the plane. What’s the harm in posting a pic of your boarding pass? A whole lot. Boarding passes display your full legal name, ticket number and passenger name record. That six-digit code plus your last name gives anyone access to your booking information online.

The same goes for your license, passport, visa or other identification documents. Thieves keep an eye out for any detail they can use.

Keep these photos on your phone before vacation. Scroll to No. 3. You’ll thank me if something goes missing.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

❌
❌