Category: Technology

  • Huge healthcare data breach exposes over 1 million Americans’ sensitive information

    Huge healthcare data breach exposes over 1 million Americans’ sensitive information

    The healthcare industry has recently been a major target for hackers. You might remember the 2024 Ascension attack, which led to significant disruptions. 

    The Change Healthcare breach was also on a massive scale. UnitedHealth initially claimed that 100 million Americans were affected, but later raised that number to 190 million. 

    There have been countless other incidents, and now you can add another to the list. Community Health Center, Inc. (CHC), a Connecticut-based federally qualified health center, has disclosed a data breach following a criminal cyberattack on its systems. 

    The attack has affected over a million people in the U.S.

    GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

    A healthcare professional working on her laptop. (Kurt “CyberGuy” Knutsson)

    What You Need to Know

    Community Health Center, Inc. (CHC) detected a data breach on Jan. 2 after identifying unusual activity within its computer systems. An investigation confirmed that a skilled hacker had accessed and extracted data but did not delete or lock any information. If CHC’s claims are accurate, this is a positive outcome, as hackers often deploy ransomware, a type of attack in which they lock systems and demand payment before restoring access.

    In a regulatory filing with the Maine Attorney General’s Office, CHC said that 1,060,936 people were affected by the data breach. The type of information compromised varies depending on an individual’s relationship with CHC. Patient data that may have been accessed includes names, dates of birth, addresses, phone numbers, email addresses, diagnoses, treatment details, test results, Social Security numbers and health insurance information.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    For individuals who are not regular CHC patients but received COVID-19 services at a CHC clinic, the breached data may include names, dates of birth, phone numbers, email addresses, addresses, gender, race, ethnicity and insurance details if provided. Additional information, such as test dates, results and vaccine details, including type, dose and administration date, may also have been affected. In rare cases, Social Security numbers were also included in the breach.

    The organization did not disclose how the hackers gained access to the data or whether proper cybersecurity measures were in place at the time of the breach. While CHC has assured that its systems are no longer at risk, the same cannot be said for its patients, who may now be targets of various cyberattacks.

    healthcare worker

    A healthcare worker looking at information on his phone. (Kurt “CyberGuy” Knutsson)

    THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

    CHC’s response

    CHC said the hacker’s access was terminated within hours, and daily operations were not disrupted. To strengthen cybersecurity, CHC claims it has implemented advanced monitoring software and reinforced system protections. The organization said there is no evidence at this time that the compromised data has been misused.

    The health center is offering free identity theft protection services for all patients and COVID-19 service recipients whose Social Security numbers were involved in the breach. The organization is also encouraging individuals whose Social Security numbers were not affected to take additional steps to protect their information.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    hacker

    Illustration of a hacker at work. (Kurt “CyberGuy” Knutsson)

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

    6 ways to protect yourself from Change Healthcare data breach

    1. Remove your personal information from the internet: The breach has exposed sensitive personal data, making it essential to reduce your online footprint. While no service can guarantee complete data removal, a reputable data removal service can significantly limit your exposure. These services systematically monitor and erase your personal information from numerous websites and data brokers. Check out my top picks for data removal services here.

    2. Be wary of mailbox communications: With addresses among the compromised data, scammers may exploit this breach to send fraudulent letters. Be aware of mail claiming missed deliveries, account suspensions or security alerts. Always verify the authenticity of such communications before responding or taking action.

    3. Be cautious of phishing attempts and use strong antivirus software: Scammers may use your compromised email or phone number to target you with phishing attacks. Be wary of messages asking for personal information or containing suspicious links. To protect yourself, ensure strong antivirus software is installed on all your devices. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    4. Monitor your accounts: Given the scope of this breach, regular monitoring of your bank accounts, credit card statements and other financial accounts is critical. Look for unauthorized transactions or suspicious activity, and report any issues immediately to your bank or credit card provider.

    5. Recognize and report a Social Security scam: If your Social Security number is exposed, you could become a target for related scams. Official communication regarding Social Security issues usually comes via mail, not phone calls or emails. Learn more about spotting and reporting scams by visiting the Social Security Administration’s scam information page.

    6. Invest in identity theft protection: Data breaches happen every day, and most never make the headlines, but with an identity theft protection service, you’ll be notified if and when you are affected. An identity theft protection service can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. It can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    One of the best parts of using an identity theft protection service is that it might include identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft. 

    MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

    Kurt’s key takeaway

    The CHC breach may not be as large as the UnitedHealth attack, but with over a million individuals affected, it’s still a serious incident. Cybercriminals can exploit stolen data in various ways, from identity theft to targeted phishing scams. While CHC has taken steps to secure its systems, those impacted should remain vigilant. Be wary of unexpected emails, calls or messages requesting personal information, and consider monitoring financial and medical accounts for any suspicious activity.

    CLICK HERE TO GET THE FOX NEWS APP

    Do you think these companies are doing enough to protect your data, and is the government doing enough to catch those behind cyberattacks? Let us know by writing us at Cyberguy.com/Contact

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels for the latest tech tips and tricks:

    Answers to the most-asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Fox News AI Newsletter: Bill would ban DeepSeek

    Fox News AI Newsletter: Bill would ban DeepSeek

    Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.

    IN TODAY’S NEWSLETTER:

    – House reps unveil bill banning DeepSeek from US government devices over alleged ties to Chinese government
    – Perplexity AI bids on TikTok, CEO says it’s a win-win for Trump
    – Donny Osmond adds AI version of himself as a teen to Las Vegas residency

    DeepSeek (REUTERS/Dado Ruvic/Illustration)

    ‘DEEPLY DISTURBING EVIDENCE’: House lawmakers are introducing legislation Thursday to ban the Chinese AI DeepSeek from U.S. government devices, arguing that the software is “directly linked to the Chinese Communist Party” and poses a “five-alarm national security fire.” 

    AN AMERICAN TIKTOK: The CEO of AI startup Perplexity, Aravind Srinivas, confirmed his company’s bid for TikTok U.S. and said the deal checks all the boxes for investors and President Donald Trump, including an ownership stake for the U.S.

    SEEING DOUBLE: Donny Osmond is bringing on a new co-star for his Las Vegas residency: himself.

    donald-trump

    President Donald Trump speaks to reporters after signing a series of executive orders in the Oval Office of the White House on January 23, 2025, in Washington, D.C.

    ‘AI POWERHOUSE’ : The White House is opening its artificial intelligence plan up to Americans to contribute policy ideas to the Trump administration to ensure that the United States is “the undeniable leader” in AI technology. 

    PEDAL TO THE METAL: For a commander on the battlefield, a split second of decision advantage can determine the difference between victory and defeat. In every battlespace, AI is critical to enabling action at the speed of kinetic and non-kinetic conflict. It is already being successfully applied to rapid data processing, target recognition, combat simulation, countering drones and strategic decision-making for defense missions. And looking across current conflict zones and hot spots, we need its benefits faster than ever before, in environments from urban terrain to cyber, sea and space.

    TAKING CHARGE: Sylvester Stallone is the latest celebrity embracing artificial intelligence. The “Rocky” star invested, along with several others, in Largo.ai, an AI-driven analytics platform for film, TV and advertising, raising $7.5 million in financing for the company.

    Celine Udriot, COO of Largo.ai, Sylvester Stallone, and Sami Arpa, CEO & co-founder of Largo.ai

    Celine Udriot, COO of Largo.ai, Sylvester Stallone, and Sami Arpa, CEO & co-founder of Largo.ai (Courtesy of Largo.ai)

    Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.

    FOLLOW FOX NEWS ON SOCIAL MEDIA

    Facebook
    Instagram
    YouTube
    Twitter
    LinkedIn

    SIGN UP FOR OUR OTHER NEWSLETTERS

    Fox News First
    Fox News Opinion
    Fox News Lifestyle
    Fox News Health

    DOWNLOAD OUR APPS

    Fox News
    Fox Business
    Fox Weather
    Fox Sports
    Tubi

    WATCH FOX NEWS ONLINE

    Fox News Go

    STREAM FOX NATION

    Fox Nation

    Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

  • Identify any mystery caller for free with this phone number lookup tool

    Identify any mystery caller for free with this phone number lookup tool

    Got an unknown number that’s been driving you nuts? 

    We totally get it. 

    Those random calls on your cellphone can be seriously frustrating. And now you can fight back with a simple, free solution. In just a few easy clicks, you’ll go from feeling annoyed to being in total control, uncovering exactly who’s behind that mysterious phone number.

    GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

    A woman frustrated by mystery call coming in on her smartphone. (Kurt “CyberGuy” Knutsson)

    Your step-by-step guide to phone number sleuthing

    The TruePeopleSearch.com website works with both landline and cellphone numbers. It allows you to do a reverse phone lookup for any type of phone number, whether it’s a cellphone or a landline. It’s important to note that the availability and completeness of information can vary depending on the specific number and its associated public records. 

    However, in most cases, with just a few simple steps, you’ll go from “Who the heck is calling me?” to “Aha! Now I know exactly who this is.” Note that you can also search by name, address and email, as well, but for our example, we’ll use a phone number. 

    mystery number 2

    Reverse phone lookup website. (TruePeopleSearch)

    AN ALARMING SPIKE IN SCAM CALLS ORIGINATING FROM ROBOCALLS

    Step 1: Fire up your device and navigate to TruePeopleSearch.com

    Grab your preferred device — be it a computer, smartphone or tablet. Any browser will do, so launch Chrome, Safari or whatever you’re comfortable with. Type in truepeoplesearch.com in your browser’s address bar. The layout might vary slightly depending on your device, but don’t worry — the functionality remains the same.

    mystery number 3

    Reverse phone lookup website. (TruePeopleSearch)

    TOP 10 ROBOCALL HOTSPOTS IN AMERICA

    Step 2: Initiate the phone search

    • On your smartphone, tap the phone icon.
    mystery number 4

    Reverse phone lookup website. (TruePeopleSearch)

    • On a computer? Click where it says “Phone Search.”
    mystery number 5

    Reverse phone lookup website. (TruePeopleSearch)

    Step 3: Enter the mystery number

    Now, type in that perplexing phone number that’s been nagging at you. Hit the search button and watch the magic unfold.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    mystery number 6

    Reverse phone lookup website. (TruePeopleSearch)

    Step 4: Explore the results

    Prepare to be amazed by the wealth of information at your fingertips. Click the “View Details” button next to or under the actual search results, depending on your device. You might discover the person’s name, age, date of birth, current address or previous addresses, as well as email addresses, relatives, friends, associates and more. It’s astounding how much data a simple phone number can unlock.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    Now, beware of Sponsored Links that might try to lure you into signing up for other services.

    mystery number 7

    Reverse phone lookup website. (TruePeopleSearch)

    Disclaimer about TruePeopleSearch.com 

    While TruePeopleSearch.com can be a helpful tool, not every phone number search will yield comprehensive results. The information available varies depending on several factors:

    • Some numbers may have limited or no publicly available data.
    • Information accuracy can depend on how recently the data was updated.
    • Certain privacy settings or legal restrictions may limit the information displayed.

    Always use this service responsibly, respect individual privacy and understand that results may be incomplete or vary significantly between different phone numbers.

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

    Pro tip: Invest in personal data removal services

    Try searching for your own phone number. You might be surprised at the amount of information that pops up. If you’re uncomfortable with the information available about you, consider investing in a personal data removal service to have that information taken down. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

    Kurt’s key takeaways

    This free tool empowers you to take control of solving the mystery of who is calling you. No more wondering about unknown callers or potential spam. With just a few clicks, you can unmask the mystery and decide whether to answer, ignore or block that call.

    How do you usually handle unknown callers? Have you ever used a reverse phone lookup tool before? Let us know by writing us at Cyberguy.com/Contact

    CLICK HERE TO GET THE FOX NEWS APP

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels for the latest tech tips and tricks:

    Answers to the most-asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Robot dog sprints into history books by breaking speed records

    Robot dog sprints into history books by breaking speed records

    A Chinese team has unveiled a groundbreaking quadruped robot that is pushing the boundaries of robotics and speed. 

    The Black Panther 2.0, developed by Zhejiang University’s humanoid innovation institute in collaboration with the Hangzhou-based startup Mirror Me, has achieved a remarkable feat by running approximately 100 meters in under 10 seconds.

    Black Panther 2.0 sprinting against a human  (Mirror Me)

    Nature-inspired engineering

    The design of the Black Panther 2.0 draws inspiration from various animals, resulting in a highly efficient biomechanical structure. Its carbon-fiber shins are modeled after jerboa desert rodents, increasing stiffness by an impressive 135% while only adding 16% to its weight. 

    GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

    The robot features spring-loaded knee joints that act as shock absorbers, mimicking the powerful movements of black panthers. Additionally, its “running shoes,” inspired by cheetah claws, enhance grip performance by an astonishing 200%. Standing at 2 feet and 0.8 inches tall and weighing 83.8 pounds, this robot achieves a peak stride frequency of five times per second.

    robot dog 2

    Black Panther 2.0. (Mirror Me)

    CHINESE TECH FIRM SHARES ROBOT TRAINING SECRETS WITH THE WORLD

    Intelligent movement and adaptation

    The impressive performance of the Black Panther 2.0 is not solely due to its hardware; it also incorporates artificial intelligence and machine learning to adapt its gait in real time for specific situations. This technology allows the robot to coordinate its limb movements using the concept of Huygens’ coupled pendulum principle, enabling it to maintain fluid motion on various terrains and pushing it closer to the agility of living organisms.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    robot dog 3

    Black Panther 2.0. (Mirror Me)

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    Breaking speed records

    In addition to breaking records, the Black Panther 2.0 has joined the prestigious “10-second club” for the 100-meter sprint, surpassing the previous record holder, HOUND, which was developed at Korea’s Advanced Institute of Science and Technology. This achievement positions the robotic dog ahead of most human sprinters, although it still trails behind some of nature’s fastest runners, like cheetahs, ostriches and wildebeests.

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    robot dog 4

    Black Panther 2.0. (Mirror Me)

    NO TENNIS PARTNER? NO WORRIES WITH THIS AI ROBOT

    Kurt’s key takeaways

    The development of the Black Panther 2.0 opens up exciting possibilities for the future of robotics. Its high-power-density motor drivers suggest potential industrial applications, while its design invites further exploration into the differences between robotic and biological mobility. This technology could also be utilized in search and rescue operations or for exploring hazardous environments.

    Would you feel comfortable having a robot like the Black Panther 2.0 working alongside you, or would its advanced capabilities make you nervous about potential job displacement or safety concerns? Let us know by writing us at Cyberguy.com/Contact

    CLICK HERE TO GET THE FOX NEWS APP

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter 

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most-asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Beware of fake Reddit solutions delivering dangerous malware

    Beware of fake Reddit solutions delivering dangerous malware

    Sometimes, when you need an answer to a complex life situation or a way to troubleshoot an error on your computer, regular articles on the web don’t help. Some issues are so niche that no one writes about them, and those who do often say nothing useful in 1,000 words. 

    In these cases, adding Reddit to your search query can be a game changer. Nine times out of 10, someone on Reddit has faced the same issue, and there’s probably a solution. 

    But bad actors have caught on to this, too. They’re now mimicking Reddit to spread malware that can steal your personal information.

    GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

    Reddit app on home screen of smartphone (Kurt “CyberGuy” Knutsson)

    What you need to know about fake Reddit pages

    Hackers are distributing nearly 1,000 fake websites mimicking Reddit and WeTransfer to spread the Lumma Stealer malware. These sites are designed to trick you into downloading malicious software by imitating legitimate discussions and file-sharing services.

    On these fake Reddit pages, attackers create a fabricated discussion where one user asks for help downloading a tool, another offers a WeTransfer link and a third expresses gratitude to make the exchange seem real. Clicking the link redirects victims to a counterfeit WeTransfer site, where the download button delivers the Lumma Stealer malware.

    All these fake pages have the following things in common:

    • The websites include a brand name (like “Reddit” or “WeTransfer”) followed by random characters to appear legitimate at first glance
    • They use “.org” or “.net” domains instead of the official one, which is “.com”
    • The interface closely mimics the real sites to deceive users

    These fake websites were discovered by Sekoia researcher crep1x, who compiled a full list of the pages involved in the scheme. In total, 529 of these sites mimic Reddit, while 407 impersonate WeTransfer to trick users into downloading malware.

    According to BleepingComputer, hackers may be driving traffic to these fake pages through methods like malicious ads (malvertising), search engine manipulation (SEO poisoning), harmful websites, direct messages on social media and other deceptive tactics.

    fake reddit 2

    Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

    The dangers of info-stealer malware

    Hackers are using fake Reddit pages to spread Lumma Stealer, a powerful malware designed to steal personal data while staying under the radar. Once it infects a device, it can grab passwords stored in web browsers and session tokens, allowing attackers to hijack accounts without even needing a password.

    But Reddit isn’t the only way this malware spreads. Hackers also push it through GitHub comments, deepfake websites and shady online ads. Once they steal login credentials, they often sell them on hacker forums, where others can use them for further attacks.

    This type of malware has already played a role in major security breaches, including attacks on PowerSchoolHot Topic, CircleCI and Snowflake. It’s a growing threat, especially for companies that rely on password-based security.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    fake reddit 3

    Illustration of a hacker at work

    BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS – CYBERGUY PICKS

    6 ways to protect yourself from info-stealing malware

    1. Be cautious with download links: Avoid downloading files from random Reddit discussions, social media messages or unfamiliar websites. If an unknown user shares the link or seems out of place in the context, it’s better to err on the side of caution. If the link is directing you to a file-sharing site like WeTransfer or Google Drive, double-check the URL for any signs of manipulation—like random characters added to the domain name.

    2. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware originating from these Reddit discussions, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    3. Verify website URLs: Fake websites often look convincing but have slight differences in their URLs. Check for misspellings, extra characters or unusual domains (e.g., “.org” or “.net” instead of the official “.com”).

    4. Use strong, unique passwords and enable 2FA: password manager can help generate and store strong passwords for each site. Meanwhile, enabling two-factor authentication (2FA) adds an extra layer of security, making it harder for attackers to hijack your accounts. Get more details about my best expert-reviewed Password Managers of 2025 here.

    5. Keep your software updated: Regularly update your operating system, apps, browsers and other software on your PC or mobile devices. Updates often include patches for security vulnerabilities that hackers can exploit.

    6. Watch out for malvertising and SEO traps: Hackers manipulate search engine results and run deceptive ads to trick users into visiting fake sites. Stick to official sources and avoid clicking on ads or search results that seem too good to be true. 

    HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY

    Kurt’s key takeaway

    Hackers are getting sneakier, using fake Reddit and WeTransfer pages to spread dangerous malware like Lumma Stealer. These sites might look real, but they’re designed to steal your personal info. To stay safe, always double-check links and be cautious about downloading files from unfamiliar sources. Use strong, unique passwords, enable two-factor authentication and keep your software updated to stay one step ahead of cybercriminals.

    CLICK HERE TO GET THE FOX NEWS APP

    Have you ever encountered a suspicious link on Reddit or social media? How did you handle it? Let us know by writing us at Cyberguy.com/Contact.

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Smart windows take a page from nature’s pinecone playbook

    Smart windows take a page from nature’s pinecone playbook

    Have you ever wondered how a pine cone knows when to open and close? It’s not magic, it’s science. 

    Now, researchers have taken this cue from nature to create something pretty cool for our homes. 

    Let’s dive into how this revolutionary window technology works, keeping your home comfortable without using a single watt of electricity.

    GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

    Solar Gate window facade system (Conné van d’Grachten)

    Nature’s ingenious design

    Pine cones have these amazing scales that respond to moisture. When it’s damp, they close up tight. But when it’s warm and dry, they open wide to release their seeds. This simple yet effective mechanism has inspired scientists to develop a smart window system that could change the way we think about energy efficiency in buildings.

    smart windows 2

    Solar Gate window facade system (ICD/IntCDC University of Stuttgart)

    SOLAR DEVICE TRANSFORMS USED TIRES TO HELP PURIFY WATER SO THAT ITS DRINKABLE

    The Solar Gate window system

    Scientists from Germany’s universities of Stuttgart and Freiburg have developed what is known as the Solar Gate window facade system. It’s like having tiny pinecones built right into your windows. These smart windows have special elements that curl up when it’s cool and moist, letting in sunlight to warm your home. But when it’s hot and dry, they flatten out to block the sun and keep things cool inside.

    smart windows 3

    Solar Gate window facade system (ICD/IntCDC University of Stuttgart)

    NEVER NEED AN EV CHARGING STATION AGAIN WITH THESE ROOFTOP SOLAR POWER PANELS

    How it works

    The Solar Gate system consists of a gridded array of pine-cone-scale-inspired self-bending elements housed between two panes of glass in an aluminum-frame window unit. Each element is ingeniously crafted with three distinct layers, each serving a unique purpose. The bottom layer is composed of a cellulose powder and a thermoplastic blend that swells when exposed to moisture. Above this lies a middle layer made of thermoplastic, which remains unaffected by moisture.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    The top layer consists of flexible biocomposite filaments that serve to hold the entire structure together. When exposed to moist air, the bottom layer expands, causing the element to curl upwards. Conversely, in dry conditions, it returns to its flattened state. This simple yet effective mechanism allows the window to respond automatically to changing weather conditions, providing optimal shading and light penetration as needed.

    smart windows 4

    Solar Gate window facade system (ICD/IntCDC University of Stuttgart)

    SOLAR-POWERED BLIMP COULD BRING HIGH SPEED INTERNET TO YOUR AREA

    Real-world testing

    The Solar Gate system underwent rigorous real-world testing to prove its effectiveness. In a comprehensive year-long study, researchers installed 424 Solar Gate elements in the south-facing skylight of a research building at the University of Freiburg. The results of this extensive trial were nothing short of impressive.

    During the cool, wet winter months, the elements responded by curling upwards, allowing ample sunlight to penetrate the building. This natural response effectively warmed and illuminated the interior spaces, reducing the need for artificial heating and lighting. Conversely, as the seasons changed and brought warmer, drier summer conditions, the elements automatically flattened out.

    This flattening action served to block excess sunlight, effectively keeping the building’s interior cool and comfortable without the need for energy-intensive air conditioning. The test demonstrated the system’s ability to autonomously adapt to changing weather conditions, providing optimal comfort and energy efficiency throughout the year.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    smart windows 5

    Solar Gate window facade system (ICD/IntCDC University of Stuttgart)

    5 BEST PORTABLE CHARGERS FOR ANY OCCASION 

    The future of energy-efficient buildings

    This innovative approach to building technology has far-reaching implications beyond just window systems. Researchers have already begun exploring similar biomimetic principles in a variety of applications. For instance, studies have investigated the development of shading systems using wooden slats that can open and close in response to environmental conditions.

    In the realm of textiles, scientists are working on “smart” clothing fabrics that can adapt to ambient temperature, providing optimal comfort for wearers. Perhaps most intriguingly, these principles are even being applied to the field of robotics, with researchers developing tiny mobile robots that can respond to environmental stimuli in ways inspired by natural mechanisms. As we continue to draw inspiration from nature’s ingenious designs, the potential for creating more sustainable and responsive technologies seems boundless.

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    smart windows 6

    Solar Gate window facade system (ICD/IntCDC University of Stuttgart)

    Kurt’s key takeaways

    Nature never ceases to amaze us with its ingenious solutions, and the Solar Gate window system is a brilliant example of how we can harness these natural wonders. By mimicking the pinecone, scientists have created a game-changing technology that could revolutionize how we approach energy efficiency in our buildings. It’s exciting to think about a future where our homes and offices adapt to the environment just like living organisms do. Who knew that the key to smarter buildings was hiding in our forests all along?

    CLICK HERE TO GET THE FOX NEWS APP

    Would you feel comfortable having windows that automatically open and close based on moisture and temperature — without any electrical controls? Let us know by writing us at Cyberguy.com/Contact.

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Fox News AI Newsletter: AI takes big step forward with 3D-printed shoe

    Fox News AI Newsletter: AI takes big step forward with 3D-printed shoe

    Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.

    IN TODAY’S NEWSLETTER:

    – World’s first AI-designed, 3D-printed shoe wants to be the next Crocs

    – Trump’s AI czar flags report questioning DeepSeek’s cost of developing AI models

    – Wheeled wonder robot dog shows off crazy dance moves in all kinds of tough terrain

    AI-designed, 3D-printed shoe  (Syntilay)

    INNOVATIVE STEP FORWARD: Syntilay, a startup with a sparkle in its eye and artificial intelligence on its mind, has just unveiled what it claims to be the world’s first entirely AI-designed and 3D-printed shoe.

    SETTING THE RECORD STRAIGHT: President Donald Trump’s artificial intelligence czar, David Sacks, is pointing to evidence that China’s DeepSeek AI startup spent a lot more money developing its models than has been reported.

    robot dog 1

    The Lynx robot dog dancing in snow  (Deep Robotics)

    ROBOT’S GOT MOVES: Deep Robotics, a Chinese robotics firm, recently unveiled its latest innovation in quadruped robotics, the Lynx.

    SPUTNIK MOMENT: If you care about national security, artificial intelligence (AI) or the index funds in your retirement account, you have likely heard of DeepSeek. Chinese AI model DeepSeek’s release late January caused a $969 billion stock market selloff and prompted responses from AI leaders like President Donald Trump, NVIDIA, venture capitalist Marc Andreessen and OpenAI CEO Sam Altman.

    AUTONOMOUS BIG RIGS: Are you ready to share the road with massive semi-trucks cruising down the highways next to you without a human driver? Well, that is one step closer, thanks to the groundbreaking partnership between Kodiak Robotics and Atlas Energy Solutions. These innovative companies have just pulled off something incredible. They successfully launched the first-ever commercial driverless trucking operation.

    Big rigs deliver cargo with no humans at the wheel

    Driverless semi-truck (Kodiak Robotics) (Kurt “CyberGuy” Knutsson)

    Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.

    FOLLOW FOX NEWS ON SOCIAL MEDIA

    Facebook
    Instagram
    YouTube
    Twitter
    LinkedIn

    SIGN UP FOR OUR OTHER NEWSLETTERS

    Fox News First
    Fox News Opinion
    Fox News Lifestyle
    Fox News Health

    DOWNLOAD OUR APPS

    Fox News
    Fox Business
    Fox Weather
    Fox Sports
    Tubi

    WATCH FOX NEWS ONLINE

    Fox News Go

    STREAM FOX NATION

    Fox Nation

    Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

  • How to minimize your digital footprint when you travel

    How to minimize your digital footprint when you travel

    Those of us old enough to remember traveling before the age of smartphones and mobile internet know we have it pretty good these days. You can find the best flights using comparison sites, choose among hundreds of hotels on a single booking site, get tickets sent to your phone rather than picking them up in person, check in online, order a ride and you’re off. 

    All this, of course, comes with downsides and trade-offs. 

    Most people’s biggest concerns are “getting hacked,” which, when you get down to it, really means “being robbed in ways I don’t quite understand.” But that’s one of those risks that, although very real, is unlikely to happen if you take the usual precautions. 

    GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

    A couple on vacation (Kurt “CyberGuy” Knutsson)

    The dangers few think about until it’s too late

    In a time when personal information is said to be worth more than oil, bad actors are often interested in getting their hands on your personal data as much as your money. And a “bad actor” need not be some guy with his hood up, hunched over a laptop in the back of a coffee shop. 

    In 2024, for example, ClassAction.org reported on suspicions of major cruise lines illegally sharing consumers’ data with Facebook. Cruise lines RoyalCaribbean.com, CelebrityCruises.com, Princess.com and HollandAmerica.com are suspected of collecting personal information through the sneaky “Meta tracking pixel” and sending it to Facebook without users’ consent. 

    Booking.com, a site most of us have used at one time or another, has also had its fair share of problems. The website has been battling waves of hacking attacks aimed at defrauding its customers; it’s faced accusations of not doing enough to protect its customers and has even been fined for failing to disclose a data breach on time. 

    Data gathered from these kinds of incidents often ends up circulating online, being added to what was already out there before, just waiting for someone or some company to make use of it.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    woman with luggage

    A woman pulling her luggage while traveling (Kurt “CyberGuy” Knutsson)

    THE BEST TRAVEL GEAR FOR 2025

    What you can do to protect your personal data

    Avoiding cruise lines and booking sites altogether is hardly a practical solution when you need to book a cruise or accommodation. Here are some things you can do to dramatically reduce the risk when booking flights, cruises, vehicles and accommodation.

    1. Invest in personal data removal services: While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

    2. Use personal security caution: Don’t sign in to anything using your social media accounts. Sign in with your email instead and be sure to use an email address you’ve set aside just for these kinds of situations.

    3. Do your homework online: Do an online search for the booking website, cruise line or travel agency in question, keeping an eye out for any recent reports of scams or other issues.

    4. Check company reputation carefully: Check ClassAction.org, the Better Business Bureau and Trustpilot specifically. This will help you gain comprehensive insights into a company’s track record, customer experiences and potential issues.

    5. Verify communication legitimacy: Whenever you receive a call, email or text message from a booking service, confirm that it’s really them by first checking your account directly and then contacting the company through official, publicly listed channels (not social media).

    BEST TRAVEL ADAPTERS OF 2025

    More ways to protect yourself online when traveling: Here’s how to stay safe

    Here are some of the “usual precautions” that can protect you from “getting hacked” while traveling.

    1. Update all your apps and operating systems before heading off: All those security patches are that much more important while you’re traveling. You’ll want to download and install all pending updates at least 24-48 hours before your departure, ensuring you have the latest security protections and giving yourself time to troubleshoot any potential update-related issues that might arise. 

    2. Lock everything down: Use strong, unique passwords and a reliable password manager to keep track of them.

    3. Turn on two-factor authentication where available: Prioritize using authenticator apps over SMS-based codes. This provides a more secure second layer of verification, as authenticator apps are less vulnerable to SIM swapping attacks and interception compared to text message-based authentication. Choose reputable authenticator apps, which generate time-based one-time passwords that change frequently and are tied directly to your device.

    4. Keep location services turned off: NFC, Bluetooth and Wi-Fi should also be turned off while you’re not using them. That’ll make your battery last longer as a side benefit.

    5. Go dark: Don’t publicly share news of your trip until you’re back. Avoid posting about your vacation on social media or keeping a blog about your adventures, as this information can be used by criminals to piece together a snapshot of your life.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    6. Limit social media use: Scammers and hackers often exploit social media to gather personal information and target travelers. To stay secure, avoid sharing trip details publicly and use a privacy-focused messaging app like Signal to stay in touch with family and friends.

    7. Use privacy-focused browsers: You should consider using browsers like Brave or Firefox with privacy extensions. Enabling “do not track” settings and utilizing private/incognito mode can provide an extra layer of digital protection.

    8. Disable automatic Wi-Fi and Bluetooth connections: Disable settings that automatically connect to networks and manually select and verify networks before connecting. This prevents your device from inadvertently joining potentially unsecured networks.

    9. Use encrypted messaging and email: Protect your private communications by using services that offer end-to-end encryption for both messaging and email. These platforms ensure your data remains secure from unauthorized access, with features like encryption for non-users, multifactor authentication and tracking protection. See my review of the best secure and private email services here.

    10. Travel with minimal digital gear: Consider bringing a “travel-only” phone or laptop with minimal personal data.

    11. Be cautious of public charging stations: Avoid using public USB charging ports that could potentially compromise your device. Instead, carry a portable phone charger with you.

    12. Monitor your accounts: Set up transaction alerts on financial accounts and use credit cards with strong fraud protection. Regularly check your accounts while traveling to quickly detect any suspicious activity.

    13. Bring your own internet access with you: Find a local or international SIM, a mobile hot spot and a trusted VPN (virtual private network) service for those times you can’t help but use public Wi-Fi. Using a VPN can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

    passport

    A man holding his passport (Kurt “CyberGuy” Knutsson)

    5 WAYS TO SECURELY ACCESS WI-FI ON YOUR PHONE WHILE TRAVELING

    Kurt’s key takeaways

    There’s plenty of good advice out there when it comes to avoiding public Wi-Fi and protecting your documents while traveling. To really stay safe, though, it’s important to start thinking about your data privacy and data security before even booking your trip. It doesn’t take much when all is said and done, but it could make a huge difference to how you remember your trip for years to come.

    When was the last time technology made your travel more stressful instead of easier? What happened? Let us know by writing us at Cyberguy.com/Contact.

    CLICK HERE TO GET THE FOX NEWS APP

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Are these autonomous transport pods the future of sky-high commuting?

    Are these autonomous transport pods the future of sky-high commuting?

    Imagine gliding above city traffic in a sleek, autonomous pod, bypassing congested streets and reaching your destination in record time. 

    This is the promise of Whoosh, an innovative urban transit system set to debut in 2026. 

    Whoosh represents a paradigm shift in urban transportation, offering a solution that’s as efficient as it is futuristic.

    GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

    On-demand, autonomous urban transit pod network (Whoosh)

    A new era of transportation

    Whoosh isn’t your typical gondola or cable car system. While it may look similar at first glance, this clever Kiwi invention offers a unique blend of on-demand service, direct routing and privacy that sets it apart from traditional public transportation. Unlike fixed-route gondolas, Whoosh pods are equipped with their own motors and autonomous navigation systems. This allows them to freely traverse a complex network of cables and rails, choosing the most efficient path from one point to another without intermediate stops.

    sky travel 2

    On-demand, autonomous urban transit pod network (Whoosh)

    HYDROGEN POWERED RESCUE TRUCK JUST SMASHED A WORLD RECORD AND IT ONLY SPITS OUT WATER

    How Whoosh works

    The Whoosh system combines the best aspects of ride-sharing and public transport. Users can book a pod through an app, much like calling an Uber. The pod will be waiting at a nearby station, ready to whisk you away to your destination. These stations are designed with minimal footprint, fitting into a standard car park space and featuring a spiral ramp up to the network height of about 40 feet above the ground. Larger stations can be built at ground level, offering easy access for passengers. 

    The network itself consists of tensioned cables spanning 500-985 feet, interspersed with shorter sections of steel rail for smooth turns and junctions. This design allows Whoosh to overcome geographical obstacles with ease, crossing rivers, highways or even connecting rooftops.

    sky travel 3

    On-demand, autonomous urban transit pod network (Whoosh)

    THE BEST TRAVEL GEAR FOR 2025

    Speed, efficiency and comfort

    Whoosh pods are expected to achieve an average speed of 25 mph across the network. While this may not sound impressive at first, the non-stop nature of the journey means it could be significantly faster than driving through congested urban areas. The system features remarkable efficiency, using less energy for a standard ride than a 10-minute shower. This is achieved through constant motion and low rolling resistance, making Whoosh about twice as efficient as a small electric car. Comfort hasn’t been overlooked either. The pods can lean into corners, much like a motorcycle, providing a smooth ride even at higher speeds. The cable sections of the journey offer an especially pleasant “floating” sensation.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    sky travel 4

    On-demand, autonomous urban transit pod network (Whoosh)

    GET READY TO EXPERIENCE THE THRILL OF EVTOL RACING

    From amusement park to urban solution

    Interestingly, Whoosh’s journey began in the world of amusement parks. The team behind Whoosh, led by Chris Allington, initially developed the core technology for a zip line ride called the Switchback. This allowed them to prototype and test crucial elements of the system, such as the seamless transition between cables and rails and the eddy current braking system for controlling swing-out around corners.

    sky travel 5

    On-demand, autonomous urban transit pod network (Whoosh)

    EXPLORING HYDROGEN-POWERED VEHICLES FOR THE FUTURE OF TRANSPORTATION

    The first Whoosh transit system

    The world’s first Whoosh transit system is slated to open in Queenstown, New Zealand, in 2026. This picturesque tourist destination, with its challenging geography and traffic issues, provides an ideal testing ground for the technology. Nestled between mountains and a lake, Queenstown suffers from limited road networks and significant traffic congestion, making it a perfect proving ground for Whoosh’s innovative transportation solution. The pilot project will demonstrate the system’s ability to navigate difficult terrain and provide efficient transit in a compact urban environment, with Chris Allington noting that the location is “small enough that it’s actually solvable” while presenting unique geographical challenges.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    sky travel 6

    On-demand, autonomous urban transit pod network (Whoosh)

    Kurt’s key takeaways

    Whoosh combines the convenience of ride-sharing with the efficiency of public transit. Its modular design and relatively low infrastructure costs make it an attractive option for growing cities grappling with congestion and sustainability concerns. As we look towards a future of smarter, more connected cities, Whoosh offers a glimpse of what’s possible when innovative thinking is applied to age-old urban challenges. The success of the Queenstown pilot could pave the way for similar systems worldwide, potentially revolutionizing how we move through urban spaces.

    CLICK HERE TO GET THE FOX NEWS APP

    Would you be willing to trade your car commute for a ride in a Whoosh pod? Let us know by writing us at Cyberguy.com/Contact.

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Hacked on social? Here’s what to do next

    Hacked on social? Here’s what to do next

    The chances of your Instagram, X, Facebook, Amazon, Threads, Rumble, Twitch or other accounts getting taken over by spammy bots and data-stealing thieves have never been higher. So, don’t sit there all smug, thinking, “Oh, Kim, that could never happen to me!”

    Freebie alert: I’m giving away my latest ebook, “50 Smart Ways to Use AI” (a $9.95 value). Hope it helps you!

    A lot of the advice you find online about hacked social media sites and profiles is just plain wrong or, worse, leads to a scammer who promises to get your account back but really just steals your money. Keep reading for advice you can trust.

    DON’T SCAM YOURSELF WITH THE TRICKS HACKERS DON’T WANT ME TO SHARE

    Step 1: Sign out on every device

    It’s alarming to think about someone else’s hands all over your social media account, posting crap on your page. Fully sign out of your account on every device you’re logged in.

    Pro tip: Under the Settings section in every social app, you’ll see a list of all (or the most recent) devices signed in. On Facebook, for instance, just click your profile picture > Settings & privacy > Activity log > Where you’re logged in.

    This step will often boot more casual hackers piggybacking on automatic sign-ins. They’ll get asked for passwords they don’t have and won’t be able to log in again, so they can’t spam your peeps. But don’t stop here!

    In the social media age, anyone can become a victim of account hacking or identity theft at any time. (iStock)

    Step 2: Change your password

    Log into your account on one device and change your password. The account or settings page will have that option, like here on Instagram. If hackers did get your password (maybe from a massive data breach), this will lock them out.

    You know the drill: Replace your old password with a strong one. Make it at least 12 characters with a mix of uppercase and lowercase letters, numbers, and symbols. Better yet, have a password manager come up with a great one for you.

    THIS CRIME SHOT UP 400% — HOW TO PROTECT YOURSELF

    Step 3: Report the hack

    Now, hackers should be mostly locked out of your socials. Before you take a deep breath, though, report the hack. This way, your social media platform can help you roll back your hacked messages and freeze your account until you’re sure everything is safe.

    Account hacking is so bad, some social media sites have dedicated pages to report the problem. Here’s Facebook’s hacked page, and, no surprise, there’s also an Instagram hacked page and X’s questionnaire.

    Apps

    Different apps come with different steps to safeguard your account. (Photo by CHANDAN KHANNA/AFP via Getty Images)

    Step 4: Check for surprise changes

    No one likes cleaning the house, but it has to be done. Jump over to your account settings and check for any funny business, like:

    • Fake messages or posts: Get rid of them.
    • Connected devices: Hackers add their own devices for easy access to your accounts. Give them the boot.
    • Third-party apps: A hacker may have installed a few new apps to track you or steal your data while your account was compromised. Remove them.
    • Linked accounts: They also may have grabbed a bunch of bots or stalker-looking accounts as followers. Bye-bye.
    • Your profile photos: Make sure it’s you and not some hot Russian woman.

    I’M A TECH EXPERT: 10 AI PROMPTS YOU’LL USE ALL THE TIME

    Step 5: One last thing

    Phew, you’re almost done. Be sure to enable two-factor authentication (2FA) for your account. You can get a code via text, but it’s more secure to use an authenticator app. Steps here if you’re new to the 2FA game.

    FYI, you can only get 2FA on X if you pay for its $8 monthly Premium service. Annoying.

    CLICK HERE TO GET THE FOX NEWS APP

    If you run into any trouble with these steps

    … Or if a hacker got your account suspended, call the social media platform. Keep in mind these companies don’t care about you, so they really don’t want to help you. You’ll have to be persistent. Here’s a list of popular tech numbers. Do not search on Google for these phone numbers.

    Reminder, get my newest ebook “50 Smart Ways to Use AI” free right now.

    Get tech-smarter on your schedule

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.