Category: Technology

  • Biggest Wi-Fi mistakes you can make on a plane

    Biggest Wi-Fi mistakes you can make on a plane

    When my husband and I were on the very long flight last year, he leaned over and asked, “I want to check our Morgan Stanley account. Do you think it’s OK to do it using the plane’s Wi-Fi?”

    Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

    How did we live without Wi-Fi on a plane? Oh, yeah, we read magazines! Sorry to be the bearer of bad news, but Wi-Fi isn’t as protected as we hope. Fear not. I’ve got some tips on protecting yourself and surfing safely in the skies.

    10 TECH UPGRADES TO SAVE YOUR TIME, PRIVACY AND MONEY THIS YEAR

    Up in the air

    Hackers use all kinds of sneaky tactics to hijack your privacy in flight. One thing in their favor: VPNs are more likely to drop in and out in the air than on the ground. (More on that below.)

    Without that layer of protection, cybercriminals using the same airline Wi-Fi can easily tap into your devices, access your information and spread malware.

    Here are a few tips to safely surf the web from the skies. (iStock)

    “S” for security: Only visit encrypted websites — the ones that start with “HTTPS” (that “S” is important!). In general, this blocks a hacker from viewing your activity on a given site, like the password or credit card number you typed in.

    Beware of AirDrop: Keyloggers keep track of every single thing you type, and criminals love to pass them along using Apple’s AirDrop feature. Don’t accept drops from strangers in flight. Steps here to disable or limit AirDrop if you need help.

    Name game: Crooks can create fake Wi-Fi networks with almost identical names to the airline’s. If you’re not careful, you could plug into a copycat network instead of the legit one.

    THE NSA SAYS DO THESE 5 THINGS WITH YOUR PHONE RIGHT NOW

    Is your home connection locked down? Do this check twice a year.

    Sky-high safety

    I know you’re not going to skip the Wi-Fi altogether. That’s OK, just be smart about it.

    Update everything: Before you hit the road, make sure your phone, computer, tablet, smartwatch and any other connected devices are running the latest software. Steps here for Windows, Mac, iPhone and Android. Updates often include critical security patches that protect against the new threats. Don’t forget to update your apps, too.

    Add a layer of security: A Virtual Private Network (VPN) encrypts your internet connection. Before accessing anything sensitive, like your email, online banking or shopping accounts, turn on your VPN. Double-check its status to ensure it’s actively protecting your connection. It should display as “connected” or “secured.”

    VPN on a phone screen

    While VPNs are an easy way to secure your internet connection from the ground, they’re often a lot spottier – and in turn, less effective – when you’re flying. (iStock)

    Verify names. If you notice multiple Wi-Fi networks with similar names, check with the airline staff and confirm which is the right one.

    Use 2FA: For any account tied to financial information or personal details, two-factor authentication is a must. This adds an extra layer of security by requiring a second verification step, like a code sent to your phone or email, after entering your password. Set this up for all accounts with ties to your finances to reduce the risk of unauthorized access.

    Secure your devices. Invest in antivirus and malware-protection software, and keep your devices physically secure. Avoid leaving your phone, tablet or laptop unattended, even for a moment. 

    THE STEP I TAKE TO CLEAR MY INBOX EVERY JANUARY

    Stop looky loos. Get a privacy screen for your laptop to prevent nearby shoulder snooping.

    Bonus: Don’t post pics of your boarding pass or other travel docs

    You’re excited, waiting for the plane. What’s the harm in posting a pic of your boarding pass? A whole lot. Boarding passes display your full legal name, ticket number and passenger name record. That six-digit code plus your last name gives anyone access to your booking information online.

    The same goes for your license, passport, visa or other identification documents. Thieves keep an eye out for any detail they can use.

    Keep these photos on your phone before vacation. Scroll to No. 3. You’ll thank me if something goes missing.

    CLICK HERE TO GET THE FOX NEWS APP

    Get tech-smarter on your schedule

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

  • Don’t let this credit card fraud nightmare happen to you

    Don’t let this credit card fraud nightmare happen to you

    Credit card fraud has been on the rise in recent years.

    The Federal Trade Commission’s most recent database indicates that 416,582 cases of credit card fraud were reported in 2024, making it one of the most common forms of identity theft. You know you’ve been a victim of this fraud when you notice unauthorized transactions on your credit card bill. 

    These transactions are usually below $100 to avoid detection. However, sometimes they can exceed $1,000. One such incident happened with Martin from Martinsville, Virginia, when he was randomly charged $1,095 in Hong Kong.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    “Hello, I recently received a fraud alert from my credit card company that said that there was a $1,095 charge on my credit card in Hong Kong. I use my iPad and Safari browser to buy online. Can you please explain how this could happen? By the way, my credit card company canceled my credit card and will send me a new Mastercard in the mail, and I’m not responsible for the charges on my credit card. What can I do in the future to prevent this from happening again?”

    I’m sorry to hear about the fraudulent charge on your credit card, Martin. It’s good that your credit card company is handling it and that you’re not responsible for the charges. For future reference, I’ll be discussing how this could have happened and how to stay safe.

    A woman using her credit card to shop online   (Kurt “CyberGuy” Knutsson)

    How credit card fraud happens

    Credit card fraud can happen in several ways, often without you even realizing it. One common method is when fraudsters get hold of your card information through data breaches at online stores or banks, which means your details get leaked without your knowledge. 

    Another sneaky tactic is phishing, where scammers trick you into giving away your card info by posing as legitimate companies via emails or fake websites. 

    There’s also the risk of “card skimming,” where devices at ATMs or gas stations secretly capture your card details when you swipe it. In some cases, fraudsters might also exploit weak security on public Wi-Fi networks or compromised apps to access your information while you’re shopping online.

    man with credit card

    A man using his credit card to shop on his phone   (Kurt “CyberGuy” Knutsson)

    OUTSMART THE SCAMMERS: HOW THE SNEAKY CEO APPLE GIFT CARD SCAM ALMOST GOT ME  

    Credit card fraud is way too common

    A report from Security.org reveals that 52 million Americans experienced credit card fraud in 2023, a figure even higher than the one reported by the FTC. With four out of five American adults owning at least one credit card, the report found that three in five cardholders have faced unauthorized charges — an estimated 128 million victims. Even more concerning, 75% of these victims reported having their credit card information stolen more than once. 

    The typical unauthorized transaction is around $100, which adds up to approximately $5 billion in criminal purchases each year. Interestingly, most unauthorized transactions involve credit cards that weren’t physically lost or stolen, highlighting the growing risks of online fraud and data breaches.

    person using credit card

    A woman using her credit card to pay   (Kurt “CyberGuy” Knutsson)

    THE BEST BALANCE TRANSFER CREDIT CARDS 2025

    The need for identity theft protection

    Data breaches are one of the main ways credit card fraud happens. Hackers often get unauthorized access to sensitive information stored by businesses or institutions. When a retailer, financial institution or online store experiences a data breach, the hackers usually go after the payment systems where customer credit card details are kept.

    If these systems aren’t properly secured, hackers can grab things like credit card numbers, expiration dates and sometimes even security codes. Once they have that info, they can either use it themselves or sell it to others.

    But it’s not just credit card information at risk. Data breaches can also expose personal details like names, email addresses and phone numbers. Scammers can then use this stolen info to launch phishing attacks, pretending to be trusted companies and tricking you into giving away more sensitive information.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    This is why identity theft monitoring is so important. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

    credit card crook

    Illustration of a credit card crook   (Kurt “CyberGuy” Knutsson)

    HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY

    10 ways to protect yourself from credit card fraud

    1. Notify your credit card issuer immediately: If you notice fraudulent charges on your credit card, start by calling the number on the back of your credit card. From there, you should get more detailed information on what to do next.

    2. Monitor your statements regularly: One of the best ways to catch credit card fraud early is to keep an eye on your statements. Review your transactions regularly to spot any unfamiliar charges. The sooner you notice something suspicious, the quicker you can report it to your credit card company and prevent further damage.

    3. Regularly check your credit report: In addition to monitoring your credit card statements, periodically review your credit report to catch any unauthorized accounts opened in your name.

    4. Use strong, unique passwords: Always use strong, unique passwords for your online accounts, especially those that store payment details. Avoid using easily guessable information, and consider using a password manager to store and generate secure passwords. This reduces the chances of fraudsters accessing your accounts.

    5. Use credit card alerts: Set up transaction alerts with your credit card company. This way, you’ll receive a notification via email or text for every transaction made with your card. If you receive an alert for a purchase you didn’t make, you can take immediate action to report it and prevent further charges.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    6. Be Cautious with public Wi-Fi: Avoid making purchases or entering sensitive information when connected to public Wi-Fi networks because they’re often not secure. If you need to make an online purchase while on the go, consider using a VPN (Virtual Private Network) to encrypt your connection and keep your credit card details safe from hackers. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices 

    7. Don’t store credit card info on browsers and websites: Storing your credit card information on browsers or websites can make it convenient, but it also exposes you to a higher risk of fraud. If your browser or the website’s security gets compromised, hackers could gain access to your saved card details. To stay safe, avoid saving your credit card information and manually enter it each time you make a purchase. If a site offers to save your details for future use, think twice before accepting. It’s better to take the extra step to enter your information each time, ensuring your data stays secure.

    8. Use EMV chip technology: When making in-person purchases, always use the chip reader instead of swiping your card. Chip technology provides an extra layer of security against fraud.

    9. Be wary of phishing attempts and have strong antivirus software: Be cautious of unsolicited emails, texts or phone calls asking for your credit card information. Legitimate companies typically don’t request sensitive information through these channels. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    10. Keep your card in sight: When using your card in restaurants or stores, try to keep it within view. This reduces the risk of someone copying your card details.

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

    Kurt’s key takeaway

    It’s clear that credit card fraud is more prevalent than ever, affecting millions of Americans each year. The good news is that there are effective steps to protect yourself from becoming a victim. By staying vigilant and employing best practices — like monitoring your statements and using strong passwords — you can significantly reduce your risk. Remember, awareness and proactive measures are your best defenses against credit card fraud.

    CLICK HERE TO GET THE FOX NEWS APP

    Have you or someone you know ever experienced credit card fraud, and how did it impact you? Let us know by writing us at Cyberguy.com/Contact

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover

    Follow Kurt on his social channels

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com.  All rights reserved.

  • Crooks can’t steal this motorcycle that hides in plain sight

    Crooks can’t steal this motorcycle that hides in plain sight

    Imagine walking down a busy city street surrounded by the usual urban clutter — graffiti-covered walls, chained bicycles and various pieces of street furniture. 

    Among these familiar sights, you might pass by what appears to be a nondescript telecom signal box. 

    But with the push of a button, this unassuming object transforms into a fully functional motorcycle. Welcome to the world of the Nomoto, a revolutionary concept by designer Joey Ruiter that challenges our perception of urban transportation.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    The invisible motorcycle

    The Nomoto, short for “No moto here, buddy,” is a remarkable electric motorcycle concept that blurs the line between vehicle and urban infrastructure. When parked, it looks like nothing more than a graffiti-covered metal box, seamlessly blending into its surroundings. 

    This camouflage serves a dual purpose. It’s an artistic statement about urban design and a practical solution to bike theft.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    invisible motorcycle 2

    WHO CAME UP WITH THIS CRAZY BUT COOL ELECTRIC MONOWHEEL?

    How the Nomoto works

    The genius of the Nomoto lies in its transformation. At the touch of a button, the seemingly immobile box rises up on wheels, ready to ride. The design eliminates the need for a kickstand because the bodywork lowers itself to sit flush with the ground when parked. 

    A drop-down cover reveals the handlebars, while flip-up covers on the front and rear boxes provide small storage areas. While the Nomoto’s primary appeal is its unique aesthetic, it’s not just for show. The bike is a fully functional electric scooter, albeit a basic one. It features stealthy headlight and brake light arrangements, though it appears to lack mirrors and indicators.

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

    invisible motorcyel 3

    The Nomoto   (J. Ruiter)

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    Joey Ruiter: The mind behind the concept

    Joey Ruiter is no stranger to pushing the boundaries of design. Known for his minimalistic approach, Ruiter strips products down to their essence, reimagining ordinary objects in extraordinary ways.

    His portfolio includes a 215-horsepower watercraft and the Snoped, an upright single-track snow bike with stark, boxy bodywork. Ruiter’s work often polarizes opinion, and he wouldn’t have it any other way. 

    “I don’t mind if somebody doesn’t like my work,” he says. “I think the polarization makes it fun.” 

    The Nomoto embodies this philosophy, challenging our expectations of what a motorcycle should look like and how it should function in an urban environment.

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    invisible motorcycle 4

    A PEDAL-ELECTRIC HYBRID THAT’S HALF BIKE, HALF CAR

    Kurt’s key takeaways

    The Nomoto represents a bold reimagining of urban transportation. It’s a testament to the power of creative design to solve practical problems while challenging our perceptions. While it may never see mass production, the Nomoto serves as an inspiring example of how thinking outside the box — or, in this case, inside a very unusual box — can lead to innovative solutions for city living.

    Would you feel comfortable riding a motorcycle that looks completely invisible when parked, trading traditional motorcycle aesthetics for ultimate urban stealth? Let us know what you think by writing us at Cyberguy.com/Contact

    CLICK HERE TO GET THE FOX NEWS APP

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover

    Follow Kurt on his social channels

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com.  All rights reserved.

  • Allstate sued for allegedly tracking and selling 45M Americans’ location data

    Allstate sued for allegedly tracking and selling 45M Americans’ location data

    Nowadays, almost every app you download asks for location permissions, meaning it wants to track where you are and your movements. For an app like Google Maps, requesting location access makes perfect sense. It’s also reasonable for apps like Uber or DoorDash, which rely on location for their services. 

    However, many apps that have nothing to do with location still ask for it, and we often grant these permissions without thinking twice. When you give an app access to your location, that data is stored and, in some cases, might even be sold. According to Texas Attorney General Ken Paxton, this practice is not uncommon. 

    A recent lawsuit filed by Paxton alleges that the insurance company Allstate collected and sold the location data of 45 million Americans’ smartphones.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    Illustration of a company tracking customer’s data. (Kurt “CyberGuy” Knutsson)

    Allstate was allegedly collecting and stealing data

    In a press release, Paxton announced that he had sued Allstate and its subsidiary, Arity, for unlawfully collecting, using and selling data about the location and movements of Texans’ cellphones. The data was gathered through secretly embedded software in mobile apps, such as Life360. “Allstate and other insurers then used the covertly obtained data to justify raising Texans’ insurance rates,” the press release stated.

    The insurance provider allegedly collected trillions of miles’ worth of location data from more than 45 million Americans nationwide. The data was reportedly used to build the “world’s largest driving behavior database.” When customers sought a quote or renewed their coverage, Allstate and other insurance companies allegedly used the database to justify raising car insurance premiums.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    Paxton claims the actions violated the Texas Data Privacy and Security Act. The lawsuit alleges customers were not clearly informed their data was being collected and did not consent to the practice.

    “Our investigation revealed that Allstate and Arity paid mobile apps millions of dollars to install Allstate’s tracking software,” said Paxton. “The personal data of millions of Americans was sold to insurance companies without their knowledge or consent in violation of the law. Texans deserve better and we will hold all these companies accountable.”

    We reached out to Allstate and Arity for comments. A rep for the Allstate Corporation provided CyberGuy with this statement: “Arity helps consumers get the most accurate auto insurance price after they consent in a simple and transparent way that fully complies with all laws and regulations.”

    allstate lawsuit 2

    Illustration of a person laying out how company tracking works. (Kurt “CyberGuy” Knutsson)

    MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

    Car manufacturers apparently do this all the time

    Car manufacturers have also been accused of selling similar data to insurance companies. Last year, Paxton sued General Motors for allegedly collecting and selling the private driving data of more than 1.5 million Texans to insurance companies without their knowledge or consent. In addition to insurance companies, data brokers are frequent buyers of customer data. Critics say these brokers fail to adequately protect the information, leaving it vulnerable to hackers. Earlier this month, hackers claimed to have breached Gravy Analytics, a major location data broker and the parent company of Venntel, which is known for selling smartphone location data to U.S. government agencies.

    allstate lawsuit 3

    Illustration of a hacker looking at someone’s personal data. (Kurt “CyberGuy” Knutsson)

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

    5 ways to stay safe from unwanted tracking

    1. Avoid installing the insurance company’s app: Many insurance companies encourage users to download their apps to “simplify” claims, payments or policy management. However, these apps often collect and track your location data under the guise of improving their services. If the app is not absolutely essential, manage your account through the company’s website or contact customer service directly instead.

    2. Don’t give location permissions unnecessarily: When an app requests location access, ask yourself whether it genuinely needs this information to function. For example, a weather app may need approximate location data, but a flashlight app does not.  Always choose “Deny” or “Allow only while using the app” unless absolutely necessary. Most modern devices also allow you to provide an approximate location rather than a precise one, which is a safer option when location access is unavoidable.

    3. Review and manage app permissions regularly: Over time, you may forget which apps have been granted permissions. Regularly go through your device’s app settings to check and adjust permissions. On most devices, you can access this under settingsprivacyapp permissions (specific steps vary by operating system). Revoke access for any apps that don’t need it or seem suspicious.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    4. Turn off location services when not in use: Keep location services off when you don’t need them. This reduces the chances of apps or devices tracking you passively in the background. For tasks like mapping or food delivery, turn location services on temporarily, then turn them off when you’re done. For added security, avoid connecting to public Wi-Fi networks, which can also be used to track your location indirectly.

    5. Use privacy-focused tools and apps: Invest in tools designed to safeguard your privacy. Virtual private networks (VPNs) can mask your location online and prevent unwanted tracking while browsing.  VPNs will also protect you from those who want to track and identify your potential location and the websites that you visit. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices

    BEWARE OF ENCRYPTED PDFS AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

    Kurt’s key takeaway

    If Allstate is indeed unlawfully collecting and selling people’s location data, Attorney General Paxton is right to hold them accountable by filing a lawsuit. In an era where cybercriminals exploit every opportunity to scam individuals, companies that fail to protect customer data are unacceptable and should face consequences. Data has become the new oil, and everyone seems eager to exploit it — often at the expense of ordinary people. Businesses that prioritize profits over privacy erode trust and put consumers at risk, making it crucial to enforce strict accountability for such practices.

    CLICK HERE TO GET THE FOX NEWS APP

    Do you think companies like Allstate should be required to make their data practices crystal clear to customers? Let us know by writing us at Cyberguy.com/Contact

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most-asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Fox News AI Newsletter: Musk vs. Altman

    Fox News AI Newsletter: Musk vs. Altman

    Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.

    IN TODAY’S NEWSLETTER:

    – Musk casts doubt on Trump-backed Stargate project: ‘They don’t actually have the money’
    – Elon Musk biographer offers big prediction for Trump term
    – AI abortion training has arrived: New tech tools navigate the blurry line between healthcare and politics
    -Trump’s AI deal fueling early cancer detection: Oracle’s Larry Ellison
    -Microsoft CEO says AI is the ‘most important’ export of American services

    EMPTY COFFERS?: Business magnate and X CEO Elon Musk has cast doubt on whether there is enough funding available to follow through on a massive $500 billion artificial intelligence (AI) infrastructure project announced by President Donald Trump on Tuesday.

    Elon Musk

    SpaceX and Tesla founder Elon Musk speaks during an America PAC town hall on Oct. 26, 2024 in Lancaster, Pa. ( Samuel Corum/Getty Images)

    ON THE BRINK: Walter Isaacson, author of “Elon Musk,” discusses the Trump administration’s collaboration with tech giants to drive AI innovation and technological advancement on “America’s Newsroom.”

    Election 2024 Trump

    Republican presidential nominee former President Donald Trump hugs Elon Musk at a campaign rally at the Butler Farm Show, Saturday, Oct. 5, 2024, in Butler, Pa.  (AP Photo/Evan Vucci)

    CONTROVERSIAL TECH: Artificial intelligence (AI) tools are now available for future medical professionals at one Texas university to navigate the complexities of pregnancy and abortion—a development that further blurs the line between technology, politics and healthcare.

    AI abortions

    Texas medical students have developed new AI tools to assist women with different pregnancy options, including abortion.  (Jan Woitas/picture alliance via Getty Images/iStock)

    FUELING CANCER VACCINES: Oracle founder Larry Ellison said the massive artificial intelligence (AI) infrastructure project dubbed Stargate is helping to fuel the development of a cancer vaccine.

    Larry Ellison speaks on Stargate

    Oracle founder Larry Ellison speaks during a news conference with President Donald Trump in the Roosevelt Room of the White House on Jan. 21, 2025, in Washington, D.C.

    ‘MOST IMPORTANT’ EXPORT: Microsoft vice chair and president Brad Smith breaks down how the company plans to invest in artificial intelligence during an appearance on ‘Mornings with Maria.’

    Microsoft logo

    A view shows a Microsoft logo at Microsoft offices in Issy-les-Moulineaux near Paris, France, on Jan. 25, 2023.  (REUTERS/Gonzalo Fuentes)

    Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.

    FOLLOW FOX NEWS ON SOCIAL MEDIA

    Facebook
    Instagram
    YouTube
    Twitter
    LinkedIn

    SIGN UP FOR OUR OTHER NEWSLETTERS

    Fox News First
    Fox News Opinion
    Fox News Lifestyle
    Fox News Health

    DOWNLOAD OUR APPS

    Fox News
    Fox Business
    Fox Weather
    Fox Sports
    Tubi

    WATCH FOX NEWS ONLINE

    Fox News Go

    STREAM FOX NATION

    Fox Nation

    Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

  • Willing to pay 5,000 for a life-size robot friend that remembers everything about you?

    Willing to pay $175,000 for a life-size robot friend that remembers everything about you?

    In a world where loneliness is becoming increasingly prevalent, researchers have taken a bold step forward by introducing Melody, a life-sized artificial intelligence robot designed to combat this growing epidemic. 

    However, Melody is not just another gadget; she represents a significant move toward creating robots that closely resemble humans in both appearance and interaction.

    Melody, the life-sized AI robot. (Realbotix)

    The vision behind Melody

    Realbotix, the innovative tech firm responsible for Melody’s creation, aims to produce robots that are not only visually indistinguishable from humans but also capable of meaningful interactions.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    According to CEO Andrew Kiguel, “Melody was created with the intention of having robots that are easy to travel with and modify for various forms of personal interaction.” This focus on adaptability allows Melody to serve multiple roles, from educational tools to companions in entertainment.

    melody the robot 2

    Melody, the life-sized AI robot. (Realbotix)

    Features that set Melody apart

    Melody boasts an impressive array of features that enhance her functionality and user experience:

    Realistic movements: Equipped with advanced motor technology, Melody can execute fluid and natural movements, enhancing her ability to engage in lifelike interactions.

    CHINA’S NEWEST HUMANOID ROBOT IS READY TO SERVE LIKE NEVER BEFORE

    Eye tracking and object recognition: With micro-cameras embedded in her eyes, she can maintain eye contact and recognize objects, making conversations feel more genuine.

    Modular design: Her components can be easily disassembled and reassembled, allowing for portability and customization according to user needs.

    Open-source compatibility: Melody’s design supports integration with various AI platforms, including Realbotix’s proprietary companionship AI, making her versatile for different applications.

    melody the robot 3

    Melody, the life-sized AI robot. (Realbotix)

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    A new kind of companion

    Realbotix emphasizes that Melody’s primary purpose lies in fostering connection rather than intimacy. Her role as an engaging companion is designed to enhance human experiences through interaction and fun. However, she can engage in adult conversations if desired. The company envisions Melody as a versatile solution for addressing loneliness, with potential applications across multiple domains such as education, healthcare and personal companionship.

    melody the robot 4

    Melody, the life-sized AI robot. (Realbotix)

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    The price of connection

    With a price tag of $175,000, Melody is positioned as a premium product aimed at those seeking a unique blend of companionship and technology. This investment speaks to the growing market for humanoid robots designed for personal interaction, reflecting a shift in how we view relationships in an increasingly digital world.

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    melody the robot 5

    Melody, the life-sized AI robot. (Realbotix)

    Kurt’s key takeaways

    One look at Melody, and you might think she is designed for something else entirely. As technology evolves, so too does our understanding of companionship. Melody represents not just a technological advancement but also a cultural shift towards accepting robots as part of our social fabric. With her ability to remember personal interactions and adapt to individual preferences, she challenges our perceptions of connection in the modern age.

    CLICK HERE TO GET THE FOX NEWS APP

    What do you think about the rise of humanoid robots like Melody? Are they the solution to loneliness or just another gadget? Let us know what you think by writing us at Cyberguy.com/Contact

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most-asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Newly discovered asteroid turns out to be Tesla Roadster launched into space

    Newly discovered asteroid turns out to be Tesla Roadster launched into space

    Elon Musk’s sense of humor is out of this world. 

    Seven years after the SpaceX CEO launched a Tesla Roadster into orbit, astronomers from the Minor Planet Center at the Harvard-Smithsonian Center for Astrophysics in Massachusetts confused it with an asteroid earlier this month. 

    A day after the astronomers with the Minor Planet Center registered 2018 CN41, it was deleted on Jan. 3 when they revealed that it was in fact Musk’s roadster. 

    The center said on its website that 2018 CN41’s registry was deleted after “it was pointed out the orbit matches an artificial object, 2018-017A, Falcon Heavy Upper stage with the Tesla Roadster. The designation2018 CN41 is being deleted and will be listed as omitted.”

     DEBRIS FROM SPACEX STARSHIP STREAKS THROUGH THE SKY

    Seven years after the SpaceX CEO launched a Tesla Roadster into orbit, astronomers from the Minor Planet Center at the Harvard-Smithsonian Center for Astrophysics in Massachusetts confused it with an asteroid earlier this month.  (SpaceX via Getty Images)

    SpaceX launched the Tesla Roadster on the maiden flight of SpaceX’s huge Falcon Heavy rocket in February 2018. 

    The roadster was expected to go into elliptical orbit around the sun, going a little beyond Mars and back toward Earth, but it apparently exceeded the orbit of Mars and kept going to the asteroid belt, according to Musk at the time. 

    SpaceX launch with Tesla Roadster

    SpaceX launched the Tesla Roadster on the maiden flight of SpaceX’s huge Falcon Heavy rocket in February 2018.  (Jim Watson/AFP via Getty Images))

    When the roadster was mistaken for an asteroid earlier this month, it was less than 150,000 miles from Earth, which is closer than the moon’s orbit, according to Astronomy Magazine, meaning that astronomers would want to monitor how close it gets to Earth. 

    POWERFUL WEBB TELESCOPE CAPTURES PHOTOS OF ONE OF THE EARLIEST SUPERNOVA EVER SEEN

    Center for Astrophysics (CfA) astrophysicist Jonathan McDowell told Astronomy magazine that the mistake shows the issues with untracked objects. 

    Elon Musk

    Elon Musk’s SpaceX launched his former personal car into orbit at the time.  (Justin Sullivan)

    “Worst case, you spend a billion launching a space probe to study an asteroid and only realize it’s not an asteroid when you get there,” he said.

    CLICK HERE TO GET THE FOX NEWS APP

    Fox News Digital has reached out to SpaceX for comment. 

  • The NSA says do these 5 things with your phone right now

    The NSA says do these 5 things with your phone right now

    Can’t remember the last time you turned your phone off? Is Bluetooth always on? Do you plug into any charger you can find?

    Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

    If you answered yes to any of these questions, the NSA says you’re playing a crapshoot with your privacy. The National Security Agency’s purpose is to listen and collect communications from satellites, cellphones and anywhere else, really. 

    THESE MISTAKES COULD TANK YOUR CREDIT SCORE

    Let’s take a deeper look at five smartphone rules they use that you can, too.

    1. Restart your phone once a week

    It’s dead simple and absolutely worth doing. Turn off your phone, wait 10 seconds, then turn it back on. This works to combat zero-click exploits where a hacker can get in simply by sending you the right code.

    Heads up: A restart won’t work for other types of malware. If your phone becomes infected, you’ll need to do a full factory reset.

    2. Disable Bluetooth when you don’t need it

    Bluetooth works similarly to Wi-Fi and cellular networks but performs simpler tasks at shorter ranges. You don’t need a cellular signal or network connection to use Bluetooth, and it doesn’t use data. And like any other connection, it’s not 100% safe.

    A driver is pictured holding an iced coffee and a mobile phone while in the car. (iStock)

    Hackers and scammers must be close to you to use Bluetooth to hijack your phone. But in just about any public space, you’re arm’s length from strangers.

    The NSA’s advice: Turn off Bluetooth when you’re not using it. It’ll help battery life, too.

    • On an iPhone, go to Settings > Bluetooth and switch it off. You can also swipe down from the top right of your screen to open the Control Center and tap the Bluetooth icon.
    • The same steps work for Android phones. Go to Settings > Connected Devices > Connection Preferences > Bluetooth and switch it off. (Note: Steps may vary based on your phone’s model. Look or search for Bluetooth if these steps don’t match your phone.)

    Airplane mode also disables Bluetooth and Wi-Fi, among other things, so it works in a pinch — but you won’t receive calls or texts.

    THE STEP I TAKE TO CLEAR MY INBOX EVERY JANUARY

    3. Skip public USB ports

    In spaces like the airport or coffee shop, hackers can use them to install malware or steal your data. Now, actual cases of juice jacking are rare in the U.S. but it’s still a real threat. They happen through USB connections, so if a kiosk has actual power outlets to charge your phone using your own adapter, you’re good to go.

    Stay away from USB ports of any size, especially when traveling overseas. USB standards are international, and foreign hackers can target USB ports in hotels or rentals to steal your data, even if you’re not using a kiosk.

    More and more public kiosks have wireless charging pads instead of USBs. This method doesn’t exchange data directly with your phone, so it’s virus-free by default. 

    If you’re desperate for juice, you can use a USB connection safely … with the right cable. Pack a charge-only cable for your trip. They’re cheap and compact, and they don’t allow for data transfers.

    close up of hands of business person working on computer, man using internet and social media

    A business person is seen working on a laptop. (iStock)

    4. Don’t use public Wi-Fi

    It’s a playground for snoopers. Public Wi-Fi is open to everyone, and every device is susceptible, whether it’s your smartphone, laptop or tablet.

    Just because a public Wi-Fi network pops up and asks if you want to join doesn’t mean it’s legitimate. If you’re at a coffee shop or hotel, ask an employee for the specific name of their Wi-Fi network. Scammers will sometimes create networks called “Coffee Shop” or “Hotel Guest” to make you believe you’re connecting to the real thing when, actually, you’re not.

    Here’s a good rule of thumb: If it requires a username and password to log in, you should only access that site from your own private network. If you do need to access sensitive sites or info on a public network, don’t do it without a VPN enabled.

    AI ISN’T GOING ANYWHERE: PROMPTS TO MAKE LIFE EASIER

    5. Cover your mic and camera

    The NSA says it’s best to use a protective case that drowns out your microphone and covers your camera when you’re not using it.

    In “hot-miking” attacks, hackers activate your microphone without you knowing it so they can listen into your conversations. It happens when your device has been compromised in some way, usually through malware or an app that’s exploiting permissions you granted. Most folks aren’t targets for attacks like this, but I’d rather be safe than sorry.

    Start with app permissions to check what access you’ve handed out:

    • Apple iPhone: Go to Settings > Privacy & Security, and look through the list of apps and what permissions they have.
    • Google Pixel: Open Settings > Security and privacy > Privacy > Permission manager.
    • Samsung Galaxy: Head to Settings > Security and privacy > Permission manager.
    A woman uses her phone at an airport

    A woman uses her smartphone while waiting to board a plane at Dallas/Fort Worth International Airport. (Robert Alexander/Getty Images)

    It’s not just hackers to worry about. Most of what you type, say, search and buy is being tracked in one way or another.

    The only unhackable layer of security is physically blocking the sound or camera feed. There are expensive cases out there that do the job, or you can buy a mic blocker for around $10. 

    It slides into your headphone port to stop recording. You’ll need an adapter unless your phone still has an audio jack. For a cheaper DIY option, grab your oldest corded headphones, snip them off and plug that into an adapter.

    Pro tip: When your phone’s microphone is on or was recently accessed, you’ll see a small orange dot at the top of the screen. You’ll see a green dot if your camera is in use or was recently recording. 

    While this is on your mind, go a step further. Here’s a quick 5-minute phone cleanup I like to do a few times a year.

    CLICK HERE TO GET THE FOX NEWS APP

    Get tech-smarter on your schedule

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

  • Robotic dog helps those facing mental health and cognitive challenges

    Robotic dog helps those facing mental health and cognitive challenges

    U.S. robotics company Tombot has introduced Jennie, an innovative AI-powered robotic pet designed to provide comfort and companionship to those facing cognitive health challenges.

    This groundbreaking creation is set to transform the lives of millions struggling with dementia, mild cognitive impairment and various mental health issues.

    AI-powered robotic dog. (Tombot)

    The birth of Jennie

    Jennie’s inception stems from a personal tragedy experienced by Tombot CEO Tom Stevens. When his mother, Nancy, was diagnosed with Alzheimer’s, the family had to make the heart-wrenching decision to rehome her beloved dog, Golden Bear. 

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    This difficult choice led to increased loneliness and depression for Nancy. Recognizing the widespread need for a solution, Stevens founded Tombot with the mission to create a robotic companion that could provide the emotional benefits of pet ownership without the associated challenges.

    Jennie the AI dog 2

    AI-powered robotic dog with its companion. (Tombot)

    5 NEW INNOVATIONS TO HELP SENIORS LIVE BETTER

    Cutting-edge design and technology

    Jennie’s lifelike appearance is the result of a collaboration with Jim Henson’s Creature Shop, renowned for creating the iconic Muppets. This artistic partnership has resulted in a hyperrealistic Labrador retriever puppy that captures the essence of a real dog.

    Jennie features an impressive array of interactive technologies designed to create a lifelike and engaging companion experience. The robotic puppy features sophisticated interactive touch sensors strategically placed across its body, allowing it to respond authentically to human touch and interaction. When a user pets or touches Jennie, the advanced sensor technology enables nuanced, realistic reactions that mimic a real puppy’s behavior.

    Voice command recognition technology allows Jennie to understand and respond to verbal instructions, creating an incredibly realistic puppy-like interaction. Users can give commands like “speak” or “sit,” and Jennie will react accordingly, providing a sense of genuine companionship and responsiveness.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    To enhance its authenticity, Jennie’s sounds are meticulously crafted from actual recordings of 8- to 10-week-old Labrador puppies. These genuine puppy sounds create an incredibly immersive experience, making interactions feel remarkably true to life and emotionally engaging.

    The robotic puppy is engineered for practical, everyday use with an impressive all-day battery life. Users can simply plug Jennie in overnight, similar to charging a smartphone, ensuring the companion is ready for full daily interaction without interruption.

    A dedicated smartphone app provides users with extensive customization options. Through this digital interface, owners can name their Jennie, personalize its functionality and track daily interactions, adding another layer of personal connection to the robotic pet experience.

    Tombot is committed to continuous improvement, offering regular software updates that will introduce new behaviors and commands. This approach ensures that Jennie remains dynamic and evolving, with the potential for expanding capabilities over time through simple app-based upgrades.

    Jennie the AI dog 3

    AI-powered robotic dog specs. (Tombot)

    BEST CREDIT CARDS FOR SENIORS AND RETIREES 2025

    The impact of Jennie on mental health

    Jennie was specifically designed to address the needs of individuals facing various health challenges:

    Dementia and mild cognitive impairment: Peer-reviewed studies suggest that robotic animals can help ease symptoms such as hallucinations and aggressive outbursts.

    Anxiety and depression: Jennie provides comfort and support for those struggling with mental health issues.

    Loneliness: The robotic puppy offers companionship to seniors and others experiencing isolation.

    Stress: Jennie can help alleviate psychological stress in long-term hospital patients.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    Jennie the AI dog 4

    AI-powered robotic dog. (Tombot)

    BEST TECH FOR SENIORS

    Future prospects

    Tombot aims to register Jennie as an FDA-regulated medical device, potentially expanding its use in hospitals and care facilities. With over 7,500 preorders from homes, hospitals and care centers, Jennie is poised to make a significant impact in the field of robotic companionship.

    Jennie the AI dog 5

    AI-powered robotic dog. (Tombot)

    A cost-effective alternative

    Priced at $449, Jennie offers an affordable and accessible alternative to live pet ownership. This is particularly beneficial for those who cannot safely or practically care for a real animal due to health or living conditions. To join the Jennie waitlist, prospective owners can click the link on Tombot’s website, and the company will directly contact you with specific pricing details and shipping availability as the next production batch approaches.

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    Jennie the AI dog 6

    Companion with AI-powered robotic dog with its companion. (Tombot)

    Kurt’s key takeaways

    Jennie represents a significant step forward in addressing the emotional and companionship needs of those facing cognitive and mental health challenges. By combining cutting-edge technology with a compassionate approach, Tombot has created a solution that could improve the quality of life for millions of people worldwide.

    Do you think AI robotic companions like Jennie could provide genuine comfort and emotional support in your life or the life of a loved one? Why or why not? Let us know what you think by writing us at Cyberguy.com/Contact

    CLICK HERE TO GET THE FOX NEWS APP

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most-asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • The sickening truth: Healthcare data breaches reach all-time high

    The sickening truth: Healthcare data breaches reach all-time high

    If your healthcare data hasn’t been breached in 2024, then you either don’t know it yet or should consider yourself very lucky. 

    That’s because 2024 was a nightmare year for healthcare institutions and patients in the U.S. A total of 184,111,469 records were breached. That’s 53% of the 2024 population of the United States. 

    This staggering figure represents a significant increase from previous years, setting a new and alarming record in healthcare data breaches. 

    The healthcare sector faced unprecedented challenges in cybersecurity, with attacks becoming more frequent, sophisticated and damaging than ever before.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    Illustration of a hacker at work stealing healthcare data (Kurt “CyberGuy” Knutsson)

    Health check or data leak?

    Being admitted to a hospital is stressful enough. It caused additional stress for the 100 million clients of Change Healthcare, whose data was exposed following a breach orchestrated by the BlackCat ransomware group. Not only did the breach expose sensitive health information, but it also caused widespread disruptions in claims processing. Patients and providers across the country faced chaos as the breach impacted their ability to access and pay for healthcare services.

    The second significant breach occurred at Kaiser Foundation Health Plan, where the personal data of 13.4 million individuals was compromised. This breach involved unauthorized access and the use of tracking technologies that transmitted user interactions to third parties. 

    healthcare breach 2

    Illustration of healthcare data needing to be locked up (Kurt “CyberGuy” Knutsson)

    HACKERS CLAIM MASSIVE BREACH OF COMPANY THAT TRACKS AND SELLS AMERICANS’ LOCATION DATA

    Your health data gets breached, so what?

    You’ll receive a notification letter, although be aware that it may take months before it reaches you (as was the case for victims of the Ascension Health data breach). The consequences are real and can be very painful. Medical identity theft directly affects patients’ health and safety. It happens when criminals use stolen personal health information to obtain medical services or medications under another person’s name. It can result in incorrect medical records being created that can include inaccurate diagnoses, allergies or treatments. 

    And as you may have guessed, it can also result in financial repercussions, such as patients getting fraudulent claims and bills for services they did not receive. Resolving these issues with insurers and healthcare providers takes time and mental strength. And you’re probably not in a hurry to see your breached healthcare provider ever again. That’s normal. A study has shown that up to 54% of patients consider switching providers after a data breach.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    healthcare breach 3

    A doctor looking at healthcare data on a screen (Kurt “CyberGuy” Knutsson)

    ARE DATA BROKERS ENDANGERING YOUR RETIREMENT SECURITY?

    When health data gets into the hands of data brokers

    Sensitive health information can easily be combined with personal identifiers from data brokers, creating comprehensive profiles that criminals can exploit. As a reminder, data brokers are companies that specialize in collecting, processing and selling personal information from various sources, including public records, online activities and social media. 

    They aggregate this data to create detailed consumer profiles that can be sold to marketers, insurance companies and other entities for various purposes. The more detailed the profile, the higher the chance of identity theft and potential discrimination in employment and insurance. Employers might make hiring decisions based on perceived health risks, while insurers could deny coverage or increase premiums.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    healthcare breach 4

    A doctor and patient in a healthcare facility (Kurt “CyberGuy” Knutsson)

    THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

    Wash your hands, remove your data

    You can’t prevent a data breach, but you can minimize its consequences by reducing your digital footprint overall.

    1. Set your social media to private: Restrict access to your personal information and limit what strangers can see about your life and potentially your health status. Ensure your privacy settings are robust and regularly updated to prevent unauthorized data collection.

    2. Remove your personal data from data brokers’ databases: Either by searching for your name on people search sites and requesting removals, one by one, or by using a data removal service. Data removal services automate data removal for you and let you track where exactly your data has been found and whether it was removed, not only on people search sites, which are public data brokers, but also on hidden, private databases where you can’t look yourself up (and these are the worst).

    Once your data is removed, data removal services monitor data brokers for your data and remove it again as needed (because it has a tendency to be re-listed after a while). This way, you prevent data broker companies from compiling a full profile on you and selling it to the first bidder, whether that’s a hacker, a marketing agency or an insurance company. Check out my top picks for data removal services here.

    3. Delete all unused apps on your phone: Unused applications can be hidden gateways for data leakage and potential security vulnerabilities. Regularly audit and remove apps that you no longer use or need.

    4. Check the permissions of the ones you want to keep: Review each app’s access to your personal data, location and device features to ensure you’re not inadvertently sharing more information than necessary. Be particularly cautious with health and fitness tracking applications.

    5. Use a VPN (virtual private network) when browsing: Encrypt your online activities and mask your digital location to add an extra layer of anonymity and protection. A reliable VPN can help shield your personal information from potential interceptors and data miners. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

    Kurt’s key takeaways

    The reality of healthcare data breaches is daunting, but it’s not entirely out of your control. While you can’t prevent breaches from happening, you can take steps to minimize the risks and protect your personal information. Think of it as adding locks to your digital doors: set your social media to private, use a VPN and clean up unused apps. Remember, the less information you leave out there, the harder it is for bad actors to exploit it. Stay vigilant and don’t let your data become someone else’s advantage.

    CLICK HERE TO GET THE FOX NEWS APP

    How do you feel about the growing risks to your personal information, and what steps have you taken to protect your data? Let us know by writing us at Cyberguy.com/Contact.

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.