Category: Technology

  • Mac users beware: AI-powered malware threats are on the rise

    Mac users beware: AI-powered malware threats are on the rise

    Apple devices are believed to be pretty secure, and that’s what the company will tell you. You might have seen the tagline “Privacy. That’s Apple.” in their promotions. 

    However, the tech landscape is changing, and even Apple products aren’t beyond cybercriminals’ reach. 

    A new report suggests Mac users will need to be more vigilant this year because AI advancements are helping hackers breach even the most secure systems. I have consistently reported on how Mac malware is targeting users, and experts now believe this will only get worse.

    STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

    A man working on his laptop   (Kurt “CyberGuy” Knutsson)

    The rise of cyberattacks on Apple devices

    Mac malware is not what it used to be. For years, the biggest threats were annoying adware and browser hijackers, more of a nuisance than a real danger. But that is changing fast. As highlighted by Malwarebytes, a new wave of information stealers is taking over, and they are far more dangerous, going after passwords, authentication cookies, credit card details and even cryptocurrency.

    This shift started in mid-2023 with the arrival of Atomic Stealer, also known as AMOS, a piece of malware that looked much more like something you would see on Windows than the typical Mac threats. AMOS was not just effective. It was easy to use and sold as a service  for $1,000 a month with a slick web-based control panel. That success led to the rise of even more dangerous variants.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    One of them, Poseidon, launched in mid-2024 and quickly became the dominant Mac stealer, responsible for 70% of infections. It can drain over 160 different cryptocurrency wallets, steal passwords from browsers and password managers and even grab VPN credentials.

    At the same time, cybercriminals have doubled down on malvertising, using fake ads on Google and Bing to trick users into downloading malware instead of real software. These campaigns are highly targeted, allowing attackers to pinpoint Mac users and serve fake downloads based on their searches. With AI now being used to create and execute many of these attacks, they are likely to increase in scale.

    woman on laptop

    A woman working on her laptop   (Kurt “CyberGuy” Knutsson)

    4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

    Things are worse for Android users

    While Mac malware is evolving, the situation on Android is even more alarming. Phishing attacks on the platform have reached staggering levels, with thousands of malicious apps designed to steal credentials and bypass security measures.

    So far in 2024, researchers have detected 22,800 phishing-capable apps, alongside 3,900 apps designed to read OTPs from notification bars and 5,200 apps capable of extracting OTPs from SMS messages. These numbers highlight how widespread and effective Android phishing malware has become.

    Just like phishing emails, phishing apps trick users into handing over their usernames, passwords and two-factor authentication codes. Once stolen, these credentials can be sold or used for fraud, identity theft or further cyberattacks. Because phishing apps require minimal code and fewer permissions than traditional malware, they are much easier to sneak onto app stores, including Google Play.

    Many phishing apps look like regular, fully functional software. Some impersonate games or utilities, while others appear as cracked versions of popular apps like TikTok, WhatsApp or Spotify. Some stay dormant for days to avoid detection before launching their attacks. Others rely on ad functionality to redirect users to phishing sites, making the malicious code harder to trace.

    Google Play Protect, which is built-in malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    woman working on desktop

    A woman working on a desktop and laptop computer   (Kurt “CyberGuy” Knutsson)

    MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

    5 tips to protect your devices from malware

    Follow these essential tips to safeguard your devices from the latest malware threats, including the notorious info stealer malware.

    1. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    2. Be cautious with downloads and links: Only download software from reputable sources such as the Mac App Store, Google Play Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages.

    3. Keep your software updated: Ensure that both macOS, Android and all installed applications are up to date. Apple and Android frequently release security patches and updates that address vulnerabilities. Enable automatic updates for macOS, Android and your apps to stay protected without having to manually check for updates. If you need more help, see my guide on keeping all your devices updated.

    4. Use strong and unique passwords: To protect your Mac from malware, it’s also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. A password manager can be incredibly helpful here. It generates and stores complex passwords for you, making them difficult for hackers to crack. 

    It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don’t have to remember them yourself. By reducing the number of passwords you need to recall, you’re less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed Password Managers of 2025 here.

    5. Use two-factor authentication (2FA): Enable 2FA for your important accounts, including your Apple ID, Google account, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password.

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

    Kurt’s key takeaways

    The days when Mac users could assume they were safe are long gone. Cybercriminals are evolving their tactics, with Mac malware shifting from simple adware to advanced information stealers. Android phishing apps are also becoming harder to detect and more widespread than ever. From stealing passwords and authentication cookies to intercepting OTPs and draining cryptocurrency wallets, these threats are growing in both sophistication and scale. No platform is immune, and as cybercriminals continue refining their techniques, users and organizations must stay ahead with strong security measures.

    CLICK HERE TO GET THE FOX NEWS APP

    Do you trust official app stores like the App Store and Google Play, or do you think they need to do more to prevent malware? Let us know by writing us at Cyberguy.com/Contact

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover

    Follow Kurt on his social channels

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com.  All rights reserved.

  • Inflatable tiny house with space for six is blowing up

    Inflatable tiny house with space for six is blowing up

    We’ve reported on many tiny houses, but none quite like this before. This housing concept is called the Esch 22 Space Station, also nicknamed E22SS PIU! 

    This mobile living space resembles a space station with its inflatable dome, which can inflate to triple its size. The brains behind this futuristic pad is an architectural firm called 2001, and it was developed for Esch-Alzette in Luxembourg, which is the country’s second-largest city. 

    Now, I’m not talking about just another cramped mobile tiny home here. This thing can not only grow in size but is transportable, and it’s even eco-friendly. Let’s dive in and see how this space-age dwelling actually works.

    STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

    Exterior of the Esch 22 Space Station   (2001)

    A mobile tiny house with a twist

    At its core, E22SS PIU! is a 6-person mobile tiny house that can be easily transported to various locations. In its compact form, it resembles a stainless steel trailer, containing essential amenities such as a bathroom, kitchen and dining space. However, the real magic happens when it reaches its destination.

    inflatable house 2

    Interior of the Esch 22 Space Station  (2001)

    BEST PRESIDENT’S DAY DEALS

    Unfolding and inflating

    Once parked, the E22SS PIU! undergoes a remarkable transformation. Two wings unfold from the trailer, creating a circular platform with a 29.53-foot diameter. This platform is then covered with cork, providing a stable and eco-friendly base. The final step in this metamorphosis is the inflation of a double-shell pneumatic dome on top of the platform.

    inflatable house 3

    A model of the exterior of the Esch 22 Space Station  (2001)

    This inflation process, which can be completed in as little as 15 minutes, turns the compact trailer into generous sleeping quarters capable of accommodating up to six people comfortably.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    inflatable house 4

    Sleeping quarters of the Esch 22 Space Station   (2001)

    UNSTOPPABLE OFF-ROAD TINY HOUSE CONQUERS ANY TERRAIN, ANYWHERE

    Innovative features and sustainability

    The E22SS PIU! incorporates several innovative features. A water recycling system ensures that wastewater from sinks and showers is repurposed for toilet flushing, promoting efficient water use. Accessibility has been carefully considered, with an elevator system ensuring the upper level is accessible to people with reduced mobility. 

    The use of cork for flooring adds an eco-friendly touch to the design, further emphasizing the project’s commitment to sustainability.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    inflatable house 5

    Diagram of the Esch 22 Space Station  (2001)

    BUILDING-IN-A-BOX TRANSFORMS INTO A PORTABLE TINY HOME IN MINUTES

    More than just a tiny home

    While the E22SS PIU! may not be a practical solution for everyday tiny living, it serves a greater purpose. Created as part of Esch’s Capital of Culture program, this project is designed to explore various contexts and environments within the city of Esch. It challenges our perceptions of resource usage in architecture and society, stimulating discussions about innovative housing solutions. 

    Phillippe Nathan, Founder of 2001, an architecture firm developing territories, buildings, spaces and ideas, tells CyberGuy, “E22SSPIU is not a solution, nor does it seek resolution. It is a provocation — an experimental construct that redefines collective living by destabilizing conventional relationships to resources: soil, water and energy. It resists fixity, embedding itself within shifting landscapes, absorbing and reflecting their logic. Less an answer, more a system in flux.”

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

    inflatable house 6

    Exterior of the Esch 22 Space at night Station  (2001)

    How to stay in the inflatable house in Luxembourg’s nature reserve

    What’s cool is that you can now stay in this unique inflatable house situated at the Ellergronn Nature Reserve. The spacious, inflatable structure is now available to rent. So, it’s your chance to explore the surrounding trails and immerse yourself in a blend of innovative design and natural beauty.

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    Kurt’s key takeaways

    The Esch 22 Space Station is a bold experiment in mobile architecture. By combining portability with expandability and sustainable features, it pushes the boundaries of what we consider possible in temporary living spaces. While it may not be a practical solution for everyday use, the E22SS PIU! serves as an important conversation starter about the future of housing, resource management and urban development.

    CLICK HERE TO GET THE FOX NEWS APP

    Would you feel comfortable staying in an inflatable tiny home like the E22SS PIU!? Why or why not? Let us know by writing us at Cyberguy.com/Contact

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover

    Follow Kurt on his social channels

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com.  All rights reserved.

  • How cyberscams are draining Americans wallets by the billions

    How cyberscams are draining Americans wallets by the billions

    Cyberscams have reached alarming levels in the U.S., with nearly 30% of Americans falling victim to fraudulent schemes in the past year alone. 

    The financial toll is staggering — scams cost Americans over $159 billion annually, with average individual losses now exceeding $3,500 per victim. This epidemic is not just a financial crisis but also a human rights issue, as many scams originate from forced labor operations in Southeast Asia. 

    With nearly 90% of Americans targeted by scam attempts and 40% receiving suspicious messages daily, the question remains: how can we protect ourselves and hold perpetrators accountable in an increasingly digital world?

    STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

    The word scam with data in the background   (Kurt “CyberGuy” Knutsson)

    The mechanics of “pig butchering”

    One of the most pervasive scams today is the so-called “pig butchering” scheme. Originating in China and spreading across Southeast Asia, this scam involves criminals building trust with victims through social media or messaging apps. Once trust is established, victims are lured into fraudulent cryptocurrency investment schemes. These scams are meticulously crafted to appear legitimate, often involving fake trading platforms and simulated profits. Victims are encouraged to invest more until they are “slaughtered,” losing their entire savings when the scammers vanish with their funds.

    9 WAYS SCAMMERS CAN USE YOUR PHONE NUMBER TO TRY TO TRICK YOU

    Forced labor behind these scam centers

    What makes these scams even more horrifying is their reliance on human trafficking. Criminal syndicates in countries like Myanmar, Cambodia and Laos force trafficked individuals to run these operations under threat of violence. These “scam centers” operate in lawless regions controlled by rebel groups or corrupt officials, making international intervention challenging. Survivors describe conditions akin to modern slavery, with physical abuse and even torture being common.

    cyberscam 2

    Illustration of a scam on a computer key. (Kurt “CyberGuy” Knutsson)

    BEST PRESIDENT’S DAY DEALS

    Why America is a prime target

    Cyberscams have taken hold in the U.S. for several reasons that make it particularly vulnerable. As an American, you’re likely connected to the digital world through social media platforms, messaging apps and other online tools. This high level of connectivity makes it easier for scammers to reach you directly, whether through a text message, email or social media chat. The sheer number of people online in the U.S. creates a vast pool of potential targets for cybercriminals.

    Additionally, the growing popularity of cryptocurrency in the U.S. has made it a prime medium for fraud. Cryptocurrency transactions are fast, anonymous and difficult to trace, which makes them ideal for scammers looking to steal funds without leaving a trail. Many scams are designed to exploit this lack of transparency, leaving victims with little chance of recovering their money once it’s gone.

    Another major issue is the lack of a centralized reporting system for cyberscams in the U.S. If you’ve ever been scammed or know someone who has, you might have noticed how confusing it can be to figure out where to report the crime — whether to the FBI, the Federal Trade Commission (FTC) or another agency. This fragmented system not only makes it harder for victims to seek help but also prevents authorities from gathering comprehensive data to tackle the problem effectively. These factors combined have made Americans some of the most targeted individuals in the world when it comes to cyberscams.

    person typing

    Illustration of a scammer at work. (Kurt “CyberGuy” Knutsson)

    FBI’S NEW WARNING ABOUT AI-DRIVEN SCAMS THAT ARE AFTER YOUR CASH

    Global solutions: Lessons from other nations

    Several countries have implemented innovative measures to combat cyberscams, offering valuable lessons for the U.S. Singapore, for instance, has introduced a mandatory SMS Sender ID Registry (SSIR) that requires organizations to register their alphanumeric Sender IDs. This system effectively blocks unregistered SMS senders, significantly reducing impersonation scams. In fact, cases involving scam SMSes in Singapore fell by 70% over three months after mandating the SSIR.

    Britain has taken a different approach by establishing a dedicated “159” hotline, allowing residents to instantly verify suspicious calls. This simple yet effective system provides a quick way for individuals to check the legitimacy of unexpected communications, potentially preventing many scams before they occur.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    Many nations have also implemented stricter authentication measures, such as biometric checks and in-app verifications, which have proven highly effective in reducing fraud. For example, Singapore has required facial verification for higher-risk transactions through Singpass since 2022, resulting in no further reports of malware-enabled scams involving unauthorized CPF withdrawals since its implementation in June 2023.

    Some countries are exploring ways to slow down cryptocurrency transactions or cap transfer amounts, which could significantly hinder scammers who rely on quick, anonymous transfers. These measures, combined with a coordinated global response involving major victim nations like the U.S. and China, could prove instrumental in dismantling criminal networks more effectively. By learning from these international examples and adapting them to the American context, the U.S. could significantly strengthen its defenses against the rising tide of cyberscams.

    cyberscam 4

    Illustration of scamming techniques. (Kurt “CyberGuy” Knutsson)

    Tips to protect yourself and your loved ones

    Recognizing red flags is essential to avoid falling victim to scams. Here are some important red flags to be aware of:

    • Unsolicited calls or emails: Be wary of anyone asking for personal or financial information. Legitimate organizations will not ask for sensitive information in this manner.
    • Urgent requests for payment: Scammers often demand immediate action to avoid scrutiny. Take a moment to verify the request through official channels before responding.
    • Unfamiliar contact information: Be cautious if the contact information provided does not match the official contact details of the company or organization.
    • Untraceable payment methods: Requests for payment via gift cards, cryptocurrency or wire transfers are major warning signs. Reputable companies will not ask for these types of payments.
    • Too good to be true offers: If an offer seems too good to be true, it likely is. Research and verify any claims before proceeding.

    10 ways to protect yourself from being scammed

    Protecting yourself and your loved ones from scams requires vigilance and awareness. Here are eight effective ways to safeguard against scammers:

    1. Verify before you act: Always verify the identity of the person or organization contacting you. Use official contact information to reach out directly and confirm the legitimacy of the request.

    2. Limit personal information sharing: Avoid sharing personal or financial information over the phone, email or online unless you are certain of the recipient’s identity and legitimacy.

    3. Use strong, unique passwords for all your accounts: A robust password should include a mix of uppercase and lowercase letters, numbers and symbols. Avoid reusing passwords across multiple platforms, and consider using a reputable password manager to store and generate complex passwords securely.

    4. Enable two-factor authentication (2FA) wherever possible: 2FA adds an extra layer of security by requiring a secondary verification method, such as a code sent to your phone or biometric authentication. This ensures that even if your password is compromised, unauthorized access remains highly unlikely.

    5. Keep your devices and software up to date: By regularly installing the latest updates and security patches, you can ensure your devices are equipped with the latest security features and bug fixes, reducing the risk of becoming a target for cyberattacks. Many cyberattacks exploit unpatched vulnerabilities, so enabling automatic updates for your operating system, apps and antivirus software can significantly reduce your risk. 

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    6. Invest in personal data removal services: Consider using a service that specializes in removing your personal information from the internet to reduce your exposure to potential scammers. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

    7. Monitor financial accounts: Regularly check your bank and credit card statements for any unusual or unauthorized transactions. Promptly report any suspicious activity.

    8. Be skeptical of unsolicited requests: Treat unexpected requests for money or personal information with caution. Scammers often create a sense of urgency to pressure you into acting quickly.

    9. Be vigilant against phishing attempts and use strong antivirus software: Avoid clicking on links or downloading attachments from unsolicited emails or messages. Ensure your devices are protected with strong antivirus software that can detect and block malicious activities. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    10. Report Suspected Scams: If you suspect you’ve encountered a scam, report it to your local authorities, the Federal Trade Commission (FTC), and any relevant financial institutions.

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    Kurt’s key takeaways

    The rise of cyberscams is not just an economic issue but a moral one that demands immediate action. With billions lost annually and countless lives disrupted, we cannot afford complacency in addressing this crisis. By learning from global best practices and fostering international collaboration, we can begin to dismantle these criminal networks. Be sure to follow the steps I outlined to keep yourself safe.

    CLICK HERE TO GET THE FOX NEWS APP

    What do you think should be done to tackle cyberscams more effectively? Should governments focus on stricter regulations or public education campaigns? Let us know by writing us at Cyberguy.com/Contact

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most-asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • AI Newsletter: Trump’s Stargate ambitions

    AI Newsletter: Trump’s Stargate ambitions

    Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.

    IN TODAY’S NEWSLETTER:

    • Massive AI Stargate Project under Trump admin reveals next steps
    • Elon Musk says he’ll drop $97B OpenAI purchase offer if ChatGPT maker stays a nonprofit
    • ‘The Simpsons’ star fears AI could rip off his work, but says there’s one thing it cannot recreate

    BREAKING GROUND: Stargate, the massive artificial intelligence (AI) infrastructure project recently unveiled by President Donald Trump, has begun production in Texas — with data center construction in other states expected to be announced in the coming months.

    ON ONE CONDITION: Elon Musk will withdraw his unsolicited bid of $97.4 billion to take over OpenAI if its board of directors stops the company’s conversion into a for-profit entity. 

    Elon Musk. (Anna Moneymaker/Getty Images)

    EXISTENTIAL THREAT: OPINION: Our socioeconomic system is facing an existential threat from AI. In our capitalist society, most people depend on jobs to sustain themselves. The U.S. government, in turn, relies heavily on taxing the income of individual workers for revenue.

    UNCHARTED TERRITORY: OpenAI CEO Sam Altman commended Vice President JD Vance’s artificial intelligence (AI) speech in Paris on Tuesday while laying out his vision for how people can take advantage of the rapidly evolving technology at the same conference.

    INHUMAN CARTOON: “The Simpsons” star Hank Azaria has voiced his fears over artificial intelligence in a new opinion piece.

    AI ROMANCE SCAMS: “Love is blind” takes on a more sinister meaning when so-called artificial intelligence (AI) becomes a tool for exploiting our deepest human emotions.

    Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.

    FOLLOW FOX NEWS ON SOCIAL MEDIA

    Facebook
    Instagram
    YouTube
    Twitter
    LinkedIn

    SIGN UP FOR OUR OTHER NEWSLETTERS

    Fox News First
    Fox News Opinion
    Fox News Lifestyle
    Fox News Health

    DOWNLOAD OUR APPS

    Fox News
    Fox Business
    Fox Weather
    Fox Sports
    Tubi

    WATCH FOX NEWS ONLINE

    Fox News Go

    STREAM FOX NATION

    Fox Nation

    Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

  • Hop in, no driver needed for this future ride-hailing robotaxi

    Hop in, no driver needed for this future ride-hailing robotaxi

    Automaker Zeekr and autonomous driving technology company Waymo have joined forces to create a groundbreaking autonomous vehicle designed specifically for ride-hailing services. 

    The result of this collaboration is the Zeekr RT, the world’s first mass-produced, purpose-built autonomous vehicle, which is now ready for delivery to Waymo for robotaxi testing. 

    This partnership combines Zeekr’s expertise in electric vehicle manufacturing with Waymo’s advanced self-driving technology.

    STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

    Exterior of the Zeekr RT. (Zeekr)

    The tech behind the Zeekr RT

    The Zeekr RT is equipped with an impressive array of 13 cameras, four lidar units, six radar sensors and external audio receivers, ensuring a 360-degree view of its surroundings. To maintain optimal performance in various weather conditions, the Zeekr RT features a specially designed system to keep its sensors clean. This custom-designed sensor-cleaning system includes tiny wipers and spray nozzles for windshield wiper fluid, specifically created by Waymo, to ensure clear visibility for the cameras and lidar sensors. The robotaxi’s advanced sensor suite provides overlapping fields of view all around the vehicle, functioning effectively both day and night.

    At the heart of the Zeekr RT’s autonomous capabilities is Nvidia’s Drive AGX Thor system-on-a-chip, making Zeekr the first automaker in the world to integrate this cutting-edge autonomous driving chipset. This powerful AI platform is capable of up to 2,500 teraflops of performance, unifying various intelligent functions such as automated driving, parking, occupant monitoring and infotainment into a single architecture.

    driverless ride 2

    Exterior of the Zeekr RT. (Zeekr)

    BEST PRESIDENT’S DAY DEALS

    Comfort meets innovation

    Inside, passengers will find a spacious cabin with a fully configurable interior, which can be tailored to meet the specific requirements of Waymo’s ride-hailing service. The Zeekr RT is built on Zeekr’s Sustainable Experience Architecture (SEA) platform and features an 800V ultra-fast charging e-powertrain, showcasing the latest advancements in electric vehicle technology.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    driverless ride 3

    Interior of the Zeekr RT. (Zeekr)

    ROBOTS TAKE THE WHEEL AS SAN FRANCISCO OPENS STREETS TO DRIVERLESS TAXIS

    From drawing board to reality

    The journey from concept to production has been swift and impressive. The Zeekr RT was designed and developed at Zeekr’s R&D facility, CEVT (China Europe Vehicle Technology Centre) in Gothenburg, Sweden. Waymo has been testing prototype versions of the Zeekr RT on public roads in San Francisco and Phoenix, with human safety drivers at the helm. Mass production of the Zeekr RT is set to begin later this year, with initial deliveries to Waymo for further testing and validation.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    driverless ride 4

    Exterior of the Zeekr RT. (Zeekr)

    ELECTRIC AIR TAXI AS QUIET AS A DISHWASHER POISED TO CHANGE AIR TRAVEL

    The road ahead

    As Waymo prepares to integrate the Zeekr RT into its commercial fleet, the future of autonomous ride-hailing services looks promising. Waymo plans to deploy these vehicles in its Waymo One service, which currently operates in select cities like Phoenix and San Francisco. After thorough testing, Waymo aims to operate these vehicles in fully driverless mode, marking a significant milestone in autonomous transportation. The introduction of a cost-effective and passenger-friendly vehicle could give Waymo a competitive edge in the growing robotaxi market.

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    Kurt’s key takeaways

    The Zeekr RT is a pretty big deal in the world of self-driving cars. It’s cool to see car companies and tech firms teaming up like this. As these robotaxis hit the streets for testing, we’re getting a sneak peek at what city travel might look like in the near future. Sure, there are still some bumps in the road ahead, but the Zeekr RT is definitely pushing us closer to a world where calling a self-driving cab is as normal as ordering a pizza.

    CLICK HERE TO GET THE FOX NEWS APP

    Would you feel comfortable taking a ride in a driverless robotaxi? Let us know by writing us at Cyberguy.com/Contact

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most-asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • China launches center to train 100-plus humanoid robots simultaneously

    China launches center to train 100-plus humanoid robots simultaneously

    Shanghai has officially unveiled its first heterogeneous humanoid robot training center, marking a significant accomplishment in China’s robotics development. 

    The Humanoid Robot Kylin Training Ground represents an important step in the country’s technological advancement, showcasing China’s commitment to becoming a global leader in robotics and artificial intelligence.

    Humanoid robots being trained (Humanoid Robot Kylin Training Ground)

    State-of-the-art center pushes boundaries of robotic training

    The National and Local Co-Built Humanoid Robotics Innovation Center has launched a groundbreaking training facility that is revolutionizing the field of robotics. This cutting-edge complex, spanning over 53,800 square feet, is currently capable of training more than 100 humanoid robots at once. The facility features an impressive array of over a dozen specialized training scenarios, including welding, manufacturing and automotive testing.

    STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

    These advanced robots have showcased exceptional proficiency, with an average success rate exceeding 90% in various tasks. Their capabilities range from organizing desks and sorting items to operating complex equipment, demonstrating the potential for widespread application across multiple industries. This remarkable achievement underscores the rapid progress being made in the field of humanoid robotics and highlights China’s growing prominence in artificial intelligence and automation technologies.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    training robots 2

    Humanoid robots being trained (Humanoid Robot Kylin Training Ground)

    WAREHOUSE ROBOT USES AI TO PLAY REAL-LIFE TETRIS TO HANDLE MORE THAN EVER BEFORE 

    How the facility is helping China tackle tech challenges and aging population

    The training facility aligns with China’s broader strategy to address multiple challenges, including global tech competition and the complexities of an aging society. By 2027, the center aims to train 1,000 general-purpose robots simultaneously, with plans to collect 10 million high-quality physical data entries through collaborations with local robot manufacturers.

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    training robots 3

    Humanoid robots being trained (ShanghaiEye)

    WILLING TO PAY $175,000 FOR A LIFE-SIZE ROBOT FRIEND THAT REMEMBERS EVERYTHING ABOUT YOU?

    China’s next-gen robot ready to slither into the future

    The center is preparing to introduce the 2.0 version of its humanoid robot, “Deep Snake,” which will showcase advanced technologies like linear joint actuators. This means the robot will have smoother, more precise movements. Linear joint actuators are like advanced motors that allow the robot’s joints to move in a straight line, giving it more fluid and controlled motions. It’s a big step forward in making robots that can perform a wider range of tasks with greater accuracy and efficiency. These innovations are expected to enhance the versatility and performance of humanoid robots, further solidifying China’s leadership in the robotics industry.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    training robots 4

    Humanoid robot being trained (ShanghaiEye)

    ROBOTIC DOG HELPS THOSE FACING MENTAL HEALTH AND COGNITIVE CHALLENGES

    The potential and economic impact of the humanoid robot market

    The Chinese humanoid robot market is experiencing explosive growth, showcasing the country’s rapid advancement in this cutting-edge technology sector. In 2024, the market was valued at $379 million, demonstrating significant initial traction. Looking ahead, projections indicate a remarkable expansion to approximately $2.3 billion by 2025, based on current exchange rates. Even more impressive is the anticipated growth to about $11.8 billion by 2030, highlighting the immense potential of this industry. The development extends beyond industrial applications, with plans for the first World Humanoid Robot Sports Games and even a marathon-running robot named “Tiangong” set to compete in April.

    BEST PRESIDENT’S DAY DEALS

    training robots 5

    Humanoid robots being trained (ShanghaiEye)

    Kurt’s key takeaways

    China’s investment in the Humanoid Robot Kylin Training Ground is a strategic move to reshape industrial capabilities, address societal challenges and position the country at the forefront of global innovation. As the technology continues to evolve, the world will be watching closely to see how these advanced robots will transform various sectors and potentially redefine human-machine interaction.

    CLICK HERE TO GET THE FOX NEWS APP

    Do you think humanoid robots are the solution to tomorrow’s workforce challenges or the beginning of a technological transformation where humans are replaced? Let us know by writing us at Cyberguy.com/Contact.

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Screenshot-scanning malware discovered on Apple App Store in first-of-its-kind attack

    Screenshot-scanning malware discovered on Apple App Store in first-of-its-kind attack

    Every tech expert will tell you the App Store is safer than Google Play Store. Some might even claim it is impossible to download a malicious app from the App Store, but they are wrong. 

    While I admit the App Store is a secure and tightly controlled ecosystem, it cannot completely shield you. Security researchers have found that hackers are targeting several apps on the App Store to spread malware that steals information from screenshots saved on a device. 

    The issue also affects those downloading apps from the Google Play Store.

    STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

    A person holding an iPhone. (Kurt “CyberGuy” Knutsson )

    How the malware works and what makes it different

    According to researchers at Kaspersky, this malware campaign is more advanced than typical info stealers, both in how it works and how it spreads. Instead of relying on social engineering tricks to get users to grant permissions like most banking trojans or spyware, this malware hides inside seemingly legitimate apps and slips past Apple and Google’s security checks.

    One of its standout features is Optical Character Recognition. Instead of stealing stored files, it scans screenshots saved on the device, extracts text and sends the information to remote servers.

    Once installed, the malware operates stealthily, often activating only after a period of dormancy to avoid raising suspicion. It employs encrypted communication channels to send stolen data back to its operators, making it difficult to trace. Plus, it spreads through deceptive updates or hidden code within app dependencies, an approach that helps it evade initial security screenings by app store review teams.

    The infection vectors vary between Apple and Google’s ecosystems. On iOS, the malware is often embedded within apps that initially pass Apple’s rigorous review process but later introduce harmful functionality through updates. On Android, the malware can exploit sideloading options, but even official Google Play apps have been found to carry these malicious payloads, sometimes hidden within SDKs (software development kits) supplied by third-party developers.

    Messaging app

    Messaging app in the App Store designed to lure victims.

    THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

    What’s being stolen, and who’s responsible?

    The scope of stolen information is alarming. This malware primarily targets crypto wallet recovery phrases but is also capable of exfiltrating login credentials, payment details, personal messages, location data and even biometric identifiers. Some versions are designed to harvest authentication tokens, allowing attackers to access accounts even if users change their passwords.

    The apps serving as malware carriers include ComeCome, ChatAi, WeTink, AnyGPT and more. These range from productivity tools to entertainment and utility apps. In some cases, malicious developers create these apps with full knowledge of the malware’s purpose. In others, the issue appears to be a supply chain vulnerability, where legitimate developers unknowingly integrate compromised SDKs or third-party services that introduce malicious code into their applications.

    We reached out to Apple for a comment but did not hear back before our deadline. 

    App Store

    Messaging app in the App Store designed to lure victims. (Kaspersky)

    Apple’s response to screenshot-scanning malware discovered in App Store

    Apple has removed the 11 iOS apps mentioned in Kaspersky’s report from the App Store. Furthermore, they discovered that these 11 apps shared code signatures with 89 other iOS apps, all of which had been previously rejected or removed for violating Apple’s policies, resulting in the termination of their developer accounts.

    Apps requesting access to user data such as Photos, Camera or Location must provide relevant functionality or face rejection. They must also clearly explain their data usage when prompting users for permission. iOS privacy features ensure users always control whether their location information is shared with an app. Also, starting in iOS 14, the PhotoKit API — which allows apps to request access to a user’s Photos library — added additional controls to let users select only specific photos or videos to share with an app instead of providing access to their entire library. 

    The App Store Review Guidelines mandate that developers are responsible for ensuring their entire app, including ad networks, analytics services and third-party SDKs, complies with the guidelines. Developers must carefully review and choose these components. Apps must also accurately represent their privacy practices, including those of the SDKs they use, in their privacy labels.

    In 2023, the App Store rejected over 1.7 million app submissions for failing to meet its stringent privacy, security and content standards. It also rejected 248,000 app submissions found to be spam, copycats or misleading and prevented 84,000 potentially fraudulent apps from reaching users.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    What Google is doing to stop malware 

    A Google spokesperson tells CyberGuy: 

    “All of the identified apps have been removed from Google Play and the developers have been banned. Android users are automatically protected from known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services.”

    However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices. Here’s why:

    What Google Play Protect can do:

    • Scans apps from the Google Play Store for known threats.
    • Warns you if an app behaves suspiciously.
    • Detects apps from unverified sources (sideloaded APKs).
    • Can disable or remove harmful apps.

    What Google Play Protect can’t do:

    • It does not provide real-time protection against advanced threats like spyware, ransomware or phishing attacks.
    • It does not scan files, downloads or links outside of Play Store apps.
    • It may miss malware from third-party app stores or sideloaded apps.
    • It lacks features like VPN protection, anti-theft tools and privacy monitoring.
    password

    Image of a person typing in their password on screen. (Kurt “CyberGuy” Knutsson)

    HOW SCAMMERS USE YOUR PERSONAL DATA FOR FINANCIAL SCAMS AND HOW TO STOP THEM

    5 ways users can protect themselves from such malware

    1. Use strong antivirus software: Installing strong antivirus software can add an extra layer of protection by scanning apps for malware, blocking suspicious activity and alerting you to potential threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    2. Stick to trusted developers and well-known apps: Even though malware has been found in official app stores, users can still minimize their risk by downloading apps from reputable developers with a long track record. Before installing an app, check its developer history, read multiple reviews and look at the permissions it requests. If an app from an unknown developer suddenly gains popularity but lacks a strong review history, approach it with caution.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    3. Review app permissions carefully: Many malicious apps disguise themselves as legitimate tools but request excessive permissions that go beyond their stated purpose. For example, a simple calculator app should not need access to your contacts, messages or location. If an app asks for permissions that seem unnecessary, consider it a red flag and either deny those permissions or avoid installing the app altogether. Go to your phone settings and check app permissions on your iPhone and Android

    4. Keep your device and apps updated: Cybercriminals exploit vulnerabilities in outdated software to distribute malware. Always keep your operating system and apps updated to the latest versions, as these updates often contain critical security patches. Enabling automatic updates ensures that you stay protected without having to manually check for new versions.

    5. Be wary of apps that promise too much: Many malware-infected apps lure users by offering features that seem too good to be true — such as free premium services, extreme battery optimizations or AI-powered functionality that appears unrealistic. If an app’s claims sound exaggerated or its download numbers skyrocket overnight with questionable reviews, it’s best to avoid it. Stick to apps with a transparent development team and verifiable functionalities. 

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

    Kurt’s key takeaway

    The new malware campaign highlights the need for stricter vetting processes, continuous monitoring of app behavior post-approval and greater transparency from app stores regarding security risks. While Apple and Google have removed the malicious apps upon detection, the fact that they made it onto the platform in the first place exposes a gap in the existing security framework. As cybercriminals refine their methods, app stores must evolve just as quickly or risk losing the trust of the very users they claim to protect.

    CLICK HERE TO GET THE FOX NEWS APP

    Do you think app stores should take more responsibility for malware slipping through? Let us know by writing us at Cyberguy.com/Contact

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most-asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • 0,000 apocalypse SUV comes with its own gas mask

    $750,000 apocalypse SUV comes with its own gas mask

    Rezvani Motors, an innovative American automotive manufacturer, has redefined the luxury SUV market with its extraordinary Vengeance. 

    This vehicle represents a groundbreaking fusion of military-inspired design and high-end luxury transportation. 

    Designed by digital artist Milen Ivanov, known for his work in video game vehicle design, the Vengeance breaks conventional automotive boundaries with its aggressive styling and comprehensive security features.

    GET EXPERT SECURITY ALERTS, MUST-KNOW TECH TIPS, AND THE LATEST DIGITAL TRENDS — STRAIGHT TO YOUR INBOX. SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

    Military-inspired Vengeance SUV. (Rezvani Motors)

    Impressive specifications

    The Vengeance represents a unique fusion of a luxury SUV and military-grade transportation. This remarkable machine is built on GM’s T1 platform, sharing fundamental architecture with the Cadillac Escalade. It measures an imposing 18 feet long and weighs approximately 6,200 pounds. Potential owners can choose between two powerful engine configurations. 

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    The gasoline variant delivers 420 horsepower from a 6.2L V8 engine. The diesel option provides a robust 277 horsepower through a Duramax 3.0L Turbo-Diesel engine. Standard amenities include a sophisticated 19-speaker audio system. The vehicle offers tri-zone climate control for maximum passenger comfort. NFC phone pairing comes standard in the base model. Magnetic ride control ensures a smooth driving experience across various terrains.

    apocalypse SUV 2

    Interior of military-inspired Vengeance SUV. (Rezvani Motors)

    TESLA’S CYBERTRUCK GETS A MILITARY MAKEOVER WITH A TACTICAL TWIST

    Military-grade protection

    The Vengeance offers an unprecedented level of personal security through its comprehensive Military Package. Bulletproof glass and B6-rated armor provide significant protection against potential threats. Two military-grade gas masks are included to protect against chemical warfare, tear gas and other potential airborne threats. 

    The package also provides two bulletproof vests designed to meet professional security standards. A matching bulletproof helmet accompanies the protective gear, ensuring complete personal safety. Rezvani further enhances the package with a professional-grade first aid kit and a specialized hypothermia prevention kit. Optional features include smoke screens, thermal night-vision and electromagnetic pulse protection. Buyers can even add pepper spray dispensers and electrified door handles.

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

    apocalypse SUV 3

    Gas masks inside military inspired Vengeance SUV. (Rezvani Motors)

    360° THROWABLE TACTICAL CAMERAS ARE CHANGING THE GAME FOR THE MILITARY AND LAW ENFORCEMENT

    Target market

    The Vengeance targets ultra-high-net-worth individuals and those requiring exceptional personal security. Diplomats in volatile regions might find particular value in its defensive capabilities. Celebrities seeking maximum protection will appreciate its comprehensive security features.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    apocalypse SUV 4

    Exterior of military inspired Vengeance SUV. (Rezvani Motors)

    EXPLORING HYDROGEN-POWERED VEHICLES FOR THE FUTURE OF TRANSPORTATION

    Pricing and positioning

    The base model starts at $285,000, with fully equipped versions approaching $750,000. This pricing positions the Vengeance as an exclusive statement of luxury and preparedness. The vehicle represents more than transportation; it’s a comprehensive personal security solution.

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    apocalypse suv 5

    Military-inspired Vengeance SUV. (Rezvani Motors)

    Kurt’s key takeaways

    The Rezvani Vengeance transcends traditional automotive boundaries. It combines luxury, performance and unparalleled security in a single extraordinary package. While most buyers may never utilize its full defensive capabilities, the Vengeance remains an impressive technological vehicle that will definitely have you ready for just about anything.

    If money were no object, would you spend $750,000 on a vehicle like this to be prepared for the worst? Let us know by writing us at Cyberguy.com/Contact

    CLICK HERE TO GET THE FOX NEWS APP

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most-asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Fox News AI Newsletter: VP calls for ideology-free AI

    Fox News AI Newsletter: VP calls for ideology-free AI

    Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.

    IN TODAY’S NEWSLETTER:

    – Vance tells world leaders AI must be ‘free from ideological bias,’ American tech won’t be censorship tool

    – Altman says Musk ‘trying to slow us down,’ OpenAI not for sale

    – Top translation apps for travelers

    Vice President JD Vance will attend an AI summit in Paris, France, a French official said anonymously. (AP Photo/Alex Brandon)

    FREE FROM BIAS: Vice President JD Vance told world leaders in Paris on Tuesday that the United States intends to remain the dominant force in artificial intelligence and warned that the European Union’s far tougher regulatory approach to the technology could cripple it.

    ‘TRYING TO SLOW US DOWN’: OpenAI CEO Sam Altman said Elon Musk is “probably just trying to slow us down” with his bid to purchase the company, insisting on Tuesday that it is not for sale. 

    ‘MASS SURVEILLANCE’: OpenAI CEO Sam Altman predicts that artificial general intelligence will lead to lower costs for many goods, but has also warned that AI could be leveraged by authoritarian governments aiming to control people.

    Top translation apps for travelers

    A man using a translation app on his cellphone (Kurt “CyberGuy” Knutsson)

    TRANSLATED TRUTH: Whether you have an iPhone or an Android, these apps have got you covered with features like live speech translation, text input and even AI-powered sign and menu translation.

    CONDOLEEZZA RICE, AMY ZEGART: DeepSeek’s new AI model is causing deep consternation from Silicon Valley to Washington. Few would have predicted that a little-known Chinese startup with a couple of hundred homegrown engineers would be able to release a frontier AI model rivaling the capabilities of America’s best and biggest tech companies – reportedly at a fraction of the cost and computational power.

    SPEEDY ROBOT DOG: A Chinese team has unveiled a groundbreaking quadruped robot that is pushing the boundaries of robotics and speed.

    robot dog 2

    Black Panther 2.0  (Mirror Me)

    Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.

    FOLLOW FOX NEWS ON SOCIAL MEDIA

    Facebook
    Instagram
    YouTube
    Twitter
    LinkedIn

    SIGN UP FOR OUR OTHER NEWSLETTERS

    Fox News First
    Fox News Opinion
    Fox News Lifestyle
    Fox News Health

    DOWNLOAD OUR APPS

    Fox News
    Fox Business
    Fox Weather
    Fox Sports
    Tubi

    WATCH FOX NEWS ONLINE

    Fox News Go

    STREAM FOX NATION

    Fox Nation

    Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

  • How to spot a hidden GPS tracker on your car

    How to spot a hidden GPS tracker on your car

    The latest stats say 80% of stalking victims are tracked using tech. One of the most popular ways to do it? GPS trackers, like an AirTag. They’re small enough to slip into a bag, pocket or your car undetected.

    “Kim, this doesn’t impact me.” I wish that was true. Maybe you have an ex or friend who won’t buzz off, or maybe you met a stranger at a bar or store who was acting creepy. You’re at risk. Did you drive across the U.S. border? Yep, crooks are targeting tourists, too.

    Win an iPhone 16 Pro with Apple Intelligence ($999 value). 

    No purchase necessary. Enter to win now!

    The good news is your phone can alert you when an unknown tracker is with you. If all else fails, good old-fashioned sleuthing works, too. I’ll show you how.

    THE BIGGEST WI-FI MISTAKE YOU DIDN’T KNOW YOU WERE MAKING

    The clock is ticking

    An AirTag starts beeping only after 24 hours away from its owner. That gives the stalker plenty of time to reach you, especially if they’re local. If a carjacker tags your ride, they could learn your routine and follow you home before you even know what’s going on.

    The rumor mill says Apple’s AirTags 2, coming later this year, will have antistalking tech. With the most current AirTags, tech-savvy stalkers can rip out the built-in speaker so you won’t get alert, but the new ones should make it harder.

    For now, you need to do everything you can to stay safe.

    Apple AirTags, don’t come with antistalking tech quite yet. Other GPS trackers come with similar issues. Read more to see what you can do to protect yourself. (Melina Mara/The Washington Post via Getty Images)

    RELATED: AirTags aren’t just for creeps. I always toss one in my luggage.

    On your iPhone, make sure a few settings are enabled:

    • Open Settings > Privacy & Security > Location Services. From there, toggle on Location Services and Find My iPhone. Then, head to System Services and turn on Significant Locations.
    • Next, go to Settings > Bluetooth and toggle on Bluetooth.
    • Go to Settings > Notifications > Tracking Notifications and toggle on Allow Notifications.
    • Now, open your Find My app and tap Items at the bottom of the screen. Tap on Identify Found Item.

    5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER

    On Android, the process is similar as long as your phone is running Android 6.0 or newer. If it’s not, you really need a new phone!

    • Open Settings > Location and toggle on Use location, Wi-Fi scanning or Bluetooth scanning. Turn on Bluetooth by going to Settings > Bluetooth and toggling on Bluetooth.
    • To make sure alerts are enabled, go to Settings > Safety & Emergency > Find Unknown Tracker Alerts. Toggle on Allow Alerts.

    The alerts aren’t foolproof

    It’s not just ripping out the speakers. Older tracking devices might not set off an alert, and savvy creeps can reconfigure new trackers to follow you undetected for months. 

    Hacker

    Bad actors can easily use GPS trackers against you. Here’s how to check for these unwanted devices’ presence in your car and get rid of any you find. (iStock)

    That’s why it’s important to check your car now and then, even if you don’t hear that telltale beep. First, grab a flashlight and a mirror.

    • Start outside your car. Check spots where the tracker could be magnetically attached, like the wheel wells; grill; underside; bumpers; around the exhaust pipe, roof or hood; and the engine and battery terminals.
    • Inside your car, check the seat crevices and pockets, dashboard, steering wheel, glove compartment, and trunk. Look under the spare tire and dashboard on the driver’s side, too, inside the onboard diagnostics port.

    If you don’t find anything but still feel uneasy, try a bug detector. This well-rated option ($37) works for cars, homes, bags or whatever.

    Small hidden cameras are popular with creeps now, too. Here’s my guide on spotting cameras in a rental, dressing room, private space at the gym or anywhere else you expect privacy.

    I’M A TECH EXPERT: 10 AI PROMPTS YOU’LL USE ALL THE TIME

    ‘I found a tracker. What now?’

    Don’t smash it or disable it. You want to give the police all the info they need to catch whoever planted it. 

    First, hold your iPhone or NFC device to the white side of the AirTag. Tap that notification that pops up to see info about its owner. Jot down the serial number and phone number so you can share them with the cops.

    Apple AirTag

    Resist the temptation to destroy unwanted trackers if you find them – police need them to get valuable information on your stalker. ( James D. Morgan/Getty Images)

    Now, make an aluminum foil envelope. Wrap the tracker inside, making sure there are no gaps or holes. This will block any signals, so the person who installed it will just think it’s out of range. Take the foil-wrapped tracker to a police station. They’ll know how to pin down who put it there.

    Are you being stalked or just paranoid? It’s a fine line. Read this if you can’t shake that “someone’s watching” feeling.

    I’ve heard too many stories from stalking victims. I don’t want you or a loved one to be another. Share this with folks in your life.

    CLICK HERE TO GET THE FOX NEWS APP

    Get tech-smarter on your schedule

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.