Category: Technology

  • Mac malware mayhem as 100 million Apple users at risk of having personal data stolen

    Mac malware mayhem as 100 million Apple users at risk of having personal data stolen

    Apple’s Macs are generally considered more secure than Windows PCs, but they are not immune to hackers. Numerous incidents demonstrate that Macs are not impenetrable, and a new one has recently been added to the list. Security researchers have discovered a new variant of stealer malware that targets browser credentials, cryptocurrency wallets and other personal data. I reported on this malware in 2024 as well. Previously, it relied on macOS browser extensions to steal data. Now, it uses phishing websites and fake GitHub repositories to target Macs, which have a user base of 100 million people.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    Enter the giveaway by signing up for my free newsletter.

    A person working on their Apple laptop (Kurt “CyberGuy” Knutsson)

    The evolution of info-stealer Mac malware

    Cybersecurity company Check Point has discovered a new variant of info-stealer malware, BanShee. Elastic Security Labs first highlighted this malware in mid-2024, noting that it operates as malware-as-a-service, a business model in which cybercriminals provide access to malicious software and related infrastructure for a fee. At that time, it was available for as much as $3,000 per month.

    Check Point says this malware evolved in September after being exposed. This time, its developers had “stolen” a string encryption algorithm from Apple’s own XProtect antivirus engine, which replaced the plain text strings used in the original version. Since antivirus programs expect to see this kind of encryption from Apple’s legitimate security tools, they weren’t flagged as suspicious, allowing the BanShee to remain undetected and quietly steal data from targeted devices.

    Mac malware mayhem as 100 million Apple users at risk of having personal data stolen

    A woman working on her Apple desktop and Apple laptop (Kurt “CyberGuy” Knutsson)

    4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

    How the Mac malware operates

    BanShee Stealer is a prime example of how advanced malware has become. Once it’s on a system, it gets straight to work stealing all kinds of sensitive information. It goes after data from browsers like Chrome, Brave, Edge and Vivaldi, as well as cryptocurrency wallet extensions. It even takes advantage of two-factor authentication (2FA) extensions to grab credentials. On top of that, it collects details about the device’s software and hardware, as well as the external IP address.

    The Mac malware also tricks users with fake pop-ups that look like real system prompts, tricking victims into entering their macOS passwords. Once it has gathered the stolen information, BanShee exfiltrates it to command-and-control servers, using encrypted and encoded files to ensure the data remains secure.

    The malware’s creators used GitHub repositories to spread BanShee. They set up fake repositories that looked like they hosted popular software, complete with stars and reviews, to seem trustworthy. These campaigns didn’t just target macOS users with BanShee. They also hit Windows users with a different malware called Lumma Stealer. Over three waves, the attackers used these fake repositories to trick people into downloading their malicious files.

    Mac malware mayhem as 100 million Apple users at risk of having personal data stolen

    A woman working on her laptop (Kurt “CyberGuy” Knutsson)

    MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

    5 tips to protect yourself from Mac malware

    Follow these essential tips to safeguard your Mac from the latest malware threats, including the notorious BanShee Stealer.

    1) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    2) Be cautious with downloads and links: Only download software from reputable sources such as the Mac App Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages.

    3) Keep your software updated: Ensure that both macOS and all installed applications are up to date. Apple frequently releases security patches and updates that address vulnerabilities. Enable automatic updates for macOS and your apps to stay protected without having to manually check for updates. If you need more help, see my guide on keeping all your devices updated.

    4) Use strong and unique passwords: To protect your Mac from malware, it’s also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. A password manager can be incredibly helpful here; it generates and stores complex passwords for you, making them difficult for hackers to crack.

    It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don’t have to remember them yourself. By reducing the number of passwords you need to recall, you’re less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed password managers of 2025 here.

    5) Use two-factor authentication (2FA): Enable 2FA for your important accounts, including your Apple ID, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password.

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

    Kurt’s key takeaway

    No device is immune to cyberattacks when a human operator is involved. Take the BanShee Stealer, for example. It managed to target Macs not due to weak cybersecurity measures by Apple but because it successfully tricked users into installing it and granting the required permissions. Most breaches, hacks and other cyberattacks stem from human error. This highlights the importance of maintaining basic cybersecurity hygiene. It’s crucial to know what you’re downloading, ensure it’s from a trusted source and carefully review the permissions you grant to any online service or application.

    When downloading new software, how do you determine if it’s safe to install? Do you rely on app store ratings, reviews or something else? Let us know by writing us at Cyberguy.com/Contact.

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2024 CyberGuy.com. All rights reserved.

  • Scientists say X-rays from nuclear explosion may deflect asteroids from Earth

    Scientists say X-rays from nuclear explosion may deflect asteroids from Earth

    Scientists in Albuquerque, New Mexico, say potentially dangerous asteroids could possibly be deflected by exploding a nuclear warhead more than a mile from its surface and showering it with X-rays to send it in a different direction.

    Previous methods, as seen in blockbuster movies like “Armageddon” and “Deep Impact,” involved blowing up a nuclear warhead on an asteroid or comet and shattering it into multiple pieces.

    But scientists now say the method would change the space object from a lethal bullet headed toward Earth into a shotgun blast of multiple fragments.

    Last year, the National Academy of Sciences released a report calling planetary defense a national priority, and according to an ongoing NASA sky survey, the threat is credible.

    STADIUM-SIZED ASTEROID DEEMED ‘POTENTIALLY HAZARDOUS’ BY NASA, IS EXPECTED TO MOVE ‘RELATIVELY CLOSE’ TO EARTH

    An artist’s impression of a large asteroid impacting at Chicxulub on the Mexican coastline, which caused a mass extinction of dinosaurs 66 million years ago. (Mark Garlick/Reuters)

    The sky survey found there are about 25,000 objects big enough to cause varying degrees of destruction to Earth, and only about a third of them have been detected and tracked, according to a press release from the Sandia National Laboratories in Albuquerque.

    Many of the objects move invisibly in the sun’s glare. In 2013, a relatively small object created chaos in Russia while a larger asteroid is credited with ending the age of dinosaurs.

    “To most people, the danger from asteroids seems remote,” Nathan Moore, a physicist at Sandia National Laboratories said. “But our planet is hit by BB-sized asteroids every day. We call them shooting stars. We don’t want to wait for a large asteroid to show up and then scramble for the right method to deflect it.”

    Moore’s team conducted several experiments with Sandia’s Z machine, the most powerful pulsed-power machine on Earth, to monitor the deflection of synthetic asteroids hit by Z’s sudden shocks.

    FLASHBACK: STUDY SAYS ASTEROID THAT KILLED THE DINOSAURS ALSO CAUSED A GLOBAL TSUNAMI 

    2024 ON graph

    2024 ON will be 621,000 miles from Earth on Tuesday night, NASA says. (NASA)

    While the machine is on Earth, all experiments are affected by gravity, though Moore’s team was able to beat the inevitable force temporarily to create a better simulation of asteroids floating freely in space.

    Moore’s experiments used a technique called X-ray scissors, which removed the skewing effect of friction and gravity for a few microseconds.

    The X-ray scissors allowed the model to create the effect of redirecting a free-floating asteroid when hit by a series of nuclear-intensity explosions.

    Although the experiments were done in a much smaller environment than space, they could be scaled to predict the effects of nuclear explosions on an actual asteroid.

    DINOSAUR-KILLING ASTEROID LIKELY CAME FROM BEYOND JUPITER, STUDY FINDS

    An illustration of an asteroid

    An illustration of an asteroid. The asteroid roughly the size of Rome’s Colosseum — between 300 to 650 feet (100 to 200 meters) in length — was detected by an international team of European astronomers using NASA’s James Webb Space Telescope. (N. Bartmann (ESA/Webb), ESO/M. Kornmesser and S. Brunier, N. Risinger (skysurvey.org))

    “I started working through the logic of how I could deflect a miniature asteroid in a laboratory just like in outer space,” Moore said. “A key fact was that asteroids in outer space aren’t attached to anything. But in a lab, everything is pulled down by Earth’s gravity, so everything is held in place by its gravitational attachment to something else. This wouldn’t let our mock asteroid move with the freedom of one in outer space. And mechanical attachments would create friction that would perturb the mock asteroid’s motion.”

    And that’s where the X-ray scissors came in. The method allowed scientists to release a mock asteroid the size of a tenth of a gram and made of silica, into the free space vacuum.

    The material was suspended by foil eight times thinner than human hair, which vaporized instantly when the Z machine fired.

    The silica was then left free-floating as the X-ray burst hit it.

    NASA COLLISION WITH ASTEROID DIMORPHOS CHANGED BOTH ITS TRAJECTORY AND SHAPE

    Asteroid Defense Test

    The DART spacecraft, short for Double Asteroid Redirection Test, atop a SpaceX Falcon 9 rocket is seen Tuesday, Nov. 23, 2021, from Simi Valley, Calif. after launching from Vandenberg Space Force Base.  (AP Photo/Mark J. Terrill)

    “It was a novel idea,” Moore said. “A mock asteroid is suspended in space. For a one-nanometer fall, we can ignore Earth’s gravity for 20 millionths of a second as Z produces a burst of X-rays that sweeps over the mock-asteroid surface 12.5 millimeters across, about the width of a finger.

    “The trick is to use just enough force to redirect the flying rock without splitting it into several equally deadly subsections advancing toward Earth,” Moore added, referring to a real intercept scenario like the recent NASA DART experiment.

    The news comes just days after NASA monitored a “potentially hazardous” asteroid moving past Earth last Tuesday.

    NASA told Fox News Digital that the rocky object, which has been named 2024 ON, is 350 meters long by 180 meters wide, which roughly equals 1,150 feet by 590 feet — larger than previous estimates. 

    NASA has deemed the asteroid “stadium-sized” and reported it was 621,000 miles away from Earth, which is considered relatively close. Davide Farnocchia, a navigation engineer at NASA’s Jet Propulsion Laboratory, told Fox News Digital that an asteroid of this size coming this close to Earth only happens every five to ten years.

    CLICK HERE TO GET THE FOX NEWS APP 

    Although the asteroid was close enough to Earth to be deemed a “potentially hazardous object,” Farnocchia said there is no chance the asteroid would hit Earth. The asteroid would need to be within a couple of hundred miles to be a concern.

    The asteroid was one of five that would pass by Earth last week, but the other rocky objects were not expected to come nearly as close as 2024 ON. The four asteroids were between 1.1 to 3.9 million miles away from Earth, and three of the asteroids measured roughly 51 feet in diameter, which is the size of a house.

    Fox News Digital’s Andrea Vacchiano contributed to this report.

  • Fox News AI Newsletter: AI health tech will transform your fitness routine

    Fox News AI Newsletter: AI health tech will transform your fitness routine

    Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.

    IN TODAY’S NEWSLETTER:

    – Best cutting-edge health and fitness tech from CES 2025

    – Nvidia pushes back on Biden admin’s ‘misguided’ AI order

    – Biden White House announces ‘final rule’ on AI chip exports before Trump hand-off, drawing industry blowback

    FUTURE HEALTH TECH: CES 2025 has once again showcased a remarkable array of health and fitness technology that promises to transform our well-being.

    ‘UNPRECEDENTED AND MISGUIDED’: Tech giant Nvidia is pushing back on a new executive order by the Biden administration that seeks to prevent artificial intelligence technologies developed in the U.S. from falling into the hands of adversarial countries.

    ‘CHIP’ ON THEIR SHOULDER: The Biden White House on Monday announced its “final rule” placing export controls on artificial intelligence chips before President-elect Donald Trump takes office next week, drawing swift condemnation from industry leaders who argue the Democratic administration is effectively undermining America’s leadership in the emerging technology.

    AI data center

    FILE – Amazon Web Services data center is seen on Thursday, Aug. 22, 2024, in Boardman, Ore.  (AP Photo/Jenny Kane, File)

    ‘LEAD THE WORLD’: President Biden on Tuesday signed an ambitious executive order that he says will keep both national security and climate change in mind while fast-tracking the build-out of large-scale artificial intelligence infrastructure in the United States.

    HOTTEST TICKET IN TOWN: A select group of tech industry titans and venture capitalists will gather in Washington, D.C., this week to welcome the incoming Trump administration and celebrate new opportunities for global innovation in artificial intelligence and entrepreneurship.

    CUTTING-EDGE HUMANOID TECH: Chinese startup Pudu Robotics has unveiled its latest creation, the D9 humanoid robot, designed to revolutionize the way we work and interact with machines. 

    newest chinese robot 1

    D9 humanoid robot  (Pudu Robotics)

    Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.

    FOLLOW FOX NEWS ON SOCIAL MEDIA

    Facebook
    Instagram
    YouTube
    Twitter
    LinkedIn

    SIGN UP FOR OUR OTHER NEWSLETTERS

    Fox News First
    Fox News Opinion
    Fox News Lifestyle
    Fox News Health

    DOWNLOAD OUR APPS

    Fox News
    Fox Business
    Fox Weather
    Fox Sports
    Tubi

    WATCH FOX NEWS ONLINE

    Fox News Go

    STREAM FOX NATION

    Fox Nation

    Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

  • Dark Matter may be behind wobble in Mars’ orbit

    Dark Matter may be behind wobble in Mars’ orbit

    A study published last week proposed that dark matter may be responsible for an observable wobble in Mars’ orbit.

    The study, published in the peer-reviewed scientific journal Physical Review, postulates the theory that dark matter compromises microscopic, or primordial, black holes.

    Unlike astrophysical black holes, these primordial black holes formed when dense pockets of gas collapsed in the seconds after the Big Bang and scattered throughout the universe because of expansion. 

    Despite being as small as an atom, these primordial black holes would be heavier than thousands of solar masses and constitute dark matter. 

    AMAZING TIME-LAPSE VIDEO OF PARTIAL LUNAR ECLIPSE CAPTURED IN ALABAMA

    A panoramic view of Mars (NASA)

    First theorized in the 1930s by Swiss astronomer Fritz Zwicky, dark matter is a form of matter undetectable to the human eye. It does not emit light or energy but makes up roughly a quarter of the universe’s mass. Researchers have proposed its existence based on the gravitational pull on other visible matter.

    dark matter universe

    Though not detectable to the naked eye, dark matter is believed to comprise around a quarter of the universe. (NASA)

    The new study, “Close encounters of the primordial kind,” theorizes that dark matter, made up of primordial black holes, is pushing Mars’ orbit slightly off track because of its extreme mass.

    The researchers, comprising MIT physicists, backed up their theory with a simulation of Mars’ orbit which aligned with their proposal. 

    MARS STUDY SUGGESTS OCEAN’S AMOUNT OF WATER COULD BE MILES BENEATH RED PLANET’S SURFACE

    The researchers theorized that these primordial black holes would introduce a wobble into Mars’ orbit at least once per decade during zooms through the solar system.

    U.S.-NASA-PRESEVERANCE-ROVER-LANDING

    This image made available by NASA shows an illustration of NASA’s Perseverance rover landing safely on Mars. (Xinhua/NASA/JPL-Caltech via Getty Images)

    Astronomers can detect such a wobble thanks to advances in telemetry, or measuring the distance between planets. 

    CLICK HERE TO GET THE FOX NEWS APP

    “We’re taking advantage of this highly instrumented region of space to try and look for a small effect,” said co-author and physics professor David Kaiser. “If we see it, that would count as a real reason to keep pursuing this delightful idea that all of dark matter consists of black holes that were spawned in less than a second after the Big Bang and have been streaming around the universe for 14 billion years.”

  • Powerful Webb Telescope captures photos of one of the earliest supernova ever seen

    Powerful Webb Telescope captures photos of one of the earliest supernova ever seen

    NASA’s James Webb Space Telescope (JWST) has captured photos of one of the earliest supernovas ever seen, with features appearing like grains and knots found in a cut of wood.

    “Once upon a time, the core of a massive star collapsed, creating a shockwave that blasted outward, ripping the star apart as it went,” NASA said on its website. “When the shockwave reached the star’s surface, it punched through, generating a brief, intense pulse of X-rays and ultraviolet light that traveled outward into the surrounding space.”

    Now, nearly 350 years later, scientists are getting a view of the aftermath as the pulse of light reaches interstellar material and causes it to glow.

    The infrared glow created was captured by JWST, revealing details that look like knots and whorls found in wood grain.

    POWERFUL WEBB TELESCOPE CAPTURES MOST DISTANT KNOWN GALAXY, SCIENTISTS SAY

    This background image of the region around supernova remnant Cassiopeia A was released by NASA’s Spitzer Space Telescope in 2008. By taking multiple images of this region over three years with Spitzer, researchers were able to examine a number of light echoes. Now, NASA’s James Webb Space Telescope has imaged some of these light echoes in much greater detail. Insets at lower right show one epoch of Webb observations, while the inset at left shows a Webb image of the central supernova remnant released in 2023. (Spitzer Image: NASA/JPL-Caltech/Y. Kim (Univ. of Arizona/Univ. of Chicago). Cassiopeia A Inset: NASA, ESA, CSA, STScI, Danny Milisavljevic (Purdue University), Ilse De Looze (UGent), Tea Temim (Princeton University). Light Echoes Inset: NASA, ESA, CSA, STScI, J. Jencson (Caltech/IPAC).)

    “Even as a star dies, its light endures—echoing across the cosmos. It’s been an extraordinary three years since we launched NASA’s James Webb Space Telescope. Every image, every discovery, shows a portrait not only of the majesty of the universe but the power of the NASA team and the promise of international partnerships. This groundbreaking mission, NASA’s largest international space science collaboration, is a true testament to NASA’s ingenuity, teamwork, and pursuit of excellence,” NASA Administrator Bill Nelson said. “What a privilege it has been to oversee this monumental effort, shaped by the tireless dedication of thousands of scientists and engineers around the globe. This latest image beautifully captures the lasting legacy of Webb—a keyhole into the past and a mission that will inspire generations to come.”

    While beautiful in nature, the observations also give astronomers the ability to map the 3-dimensional structure of the interstellar dust and gas for the first time.

    “We were pretty shocked to see this level of detail,” Jacob Jencson of Caltech/IPAC in Pasadena, the principal investigator of the science program, said.

    Josh Peek of the Space Telescope Science Institute in Baltimore is also a member of the team and said they see layers like those of an onion.

    POWERFUL WEBB TELESCOPE SPIES SPECTACULAR STAR BIRTH CLUSTER BEYOND THE MILKY WAY

    supernova2

    These shimmering cosmic curtains show interstellar gas and dust that has been heated by the flashbulb explosion of a long-ago supernova. (NASA, ESA, CSA, STScI, J. Jencson (Caltech/IPAC))

    “We think every dense, dusty region that we see, and most of the ones we don’t see, look like this on the inside,” he said. “We just have never been able to look inside them before.”

    The images produced from the JWST near-infrared camera (NIRCam) highlight a phenomenon called light echo, NASA said, which is created when a star explodes or erupts before flashing light into surrounding masses of dust and causing them to shine.

    The visible light echoes are caused when the light reflects off interstellar material, where those at infrared wavelengths are caused when the dust is warmed by energetic radiation, causing it to glow.

    Scientists targeted a light echo previously observed by NASA’s retired Spitzer Space Telescope, and it is one of dozens found near remains of the Cassiopeia A supernova.

    MERGER OF MASSIVE BLACK HOLES FROM EARLY UNIVERSE UNCOVERED BY WEBB TELESCOPE, SCIENTISTS SAY

    Technicians lift the mirror of the James Webb Space Telescope

    FILE – In this April 13, 2017 photo provided by NASA, technicians lift the mirror of the James Webb Space Telescope using a crane at the Goddard Space Flight Center in Greenbelt, Md. (Laura Betz/NASA via AP, File)

    The Webb images show tightly packed sheets, with filaments displaying structures on what NASA called “remarkably small scales,” of about 400 astronomical units, or less than one-hundredth of a light year. One astronomical unit is the average distance between the Earth and the Sun, and Neptune’s orbit is 60 astronomical units in diameter.

    “We did not know that the interstellar medium had structures on that small of a scale, let alone that it was sheet-like,” Peek said.

    The discovery was compared by scientists to a medical CT scan.

    “We have three slices taken at three different times, which will allow us to study the true 3D structure. It will completely change the way we study the interstellar medium,” Armin Rest of the Space Telescope Science Institute, and member of the team, said.

    The team’s findings will be presented this week at the 245th American Astronomical Society meeting in Washington, D.C.

    CLICK HERE TO GET THE FOX NEWS APP

    The Webb Telescope, the successor to the Hubble and the largest telescope ever launched into space, is a joint project of NASA and the European Space Agency.

  • Geomagnetic storm expected following autumnal equinox

    Geomagnetic storm expected following autumnal equinox

    The Earth is expected to experience a geomagnetic storm this week following the autumnal equinox.

    A sunspot erupted on Sunday, generating a coronal mass ejection (CME) on a trajectory toward Earth.

    The solar plasma, propelled toward the planet at 650,000 mph, is expected to glance off the magnetosphere on Wednesday, according to Space.com.

    GEOMAGNETIC STORM HITS EARTH CREATING NORTHERN LIGHTS, DISRUPTING RADIO COMMUNICATIONS

    A view of the Sun through a solar telescope, showing solar prominences, sunspots and filaments. (Manuel Romano/NurPhoto via Getty Images)

    The CME could create a geomagnetic storm in part of the world due to its occurrence near the autumnal equinox, which passed on Sept. 22. 

    During the spring and fall equinoxes, the Earth’s magnetic poles are aligned with the sun’s, making geomagnetic storms more likely.

    NORTHERN LIGHTS MAY BE SEEN ACROSS SOME PORTIONS OF US THIS WEEK AFTER ‘STRONG SOLAR ACTIVITY’

    The geomagnetic storm can sometimes cause disruption in communications or electrical blackouts.

    The phenomenon can also cause the “Northern Lights” effect at high altitudes, illuminating the night sky with brilliant colors.

    CLICK HERE TO GET THE FOX NEWS APP

    Solar storms May 10

    The aurora borealis from Mukilteo, Washington state, during a geomagnetic storm earlier this year. (Scott Sistek via Fox Weather)

    Earlier this summer, the dancing lights of the aurora borealis were seen across the U.S. and even in some of the southern states, after the strongest geomagnetic storm in 20 years took place.

    Fox News Digital’s Sydney Borchers contributed to this report.

  • Soft robotic armband gives prosthetic hand users natural control

    Soft robotic armband gives prosthetic hand users natural control

    Prosthetic hands have long struggled to replicate the dexterity and functionality of natural hands, often limiting users to a single grasp function at a time. 

    This limitation has made everyday tasks, such as typing on a keyboard or braiding hair, challenging for those who rely on prosthetics. 

    However, a groundbreaking study from Florida Atlantic University (FAU) offers promising advancements that could transform the experience of prosthetic hand users.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    Man sporting wearable soft robotic armband (Florida Atlantic University)

    New technology enables users to grasp two objects at once

    Researchers at FAU’s College of Engineering and Computer Science, in collaboration with the Charles E. Schmidt College of Science, conducted an innovative study that combined haptic feedback, electromyogram control and a wearable soft robotic armband. This study aimed to investigate whether users could control grip forces applied to two different objects simultaneously with a dexterous artificial hand.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    The study’s findings, published in Scientific Reports, demonstrated that multiple channels of haptic feedback allowed participants to successfully grasp and transport two objects at once without dropping them, even when visual feedback was obstructed.

    For example, participants managed to pinch a card between their fingers while simultaneously unscrewing a water bottle lid or toggling a light switch with their little finger.

    prosthetic hand 2

    Prosthetic robot hand (Florida Atlantic University)

    NEW PROSTHETICS RESTORE NATURAL MOVEMENT VIA NERVE CONNECTION

    Multichannel soft robotic armband

    A key innovation in this research was the development of a multichannel soft robotic armband designed to convey artificial sensations of touch. This armband included soft actuators that provided proportional contact force feedback and vibrotactile stimulators that alerted users if they were about to drop or break an object. The armband’s design allowed it to deliver haptic feedback at three critical points corresponding to the thumb, index and little fingers, effectively enhancing the user’s ability to control multiple objects simultaneously.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    Participants in the study reported that haptic feedback was significantly more important than visual feedback, especially since visual cues often failed to indicate when an object was about to be lost. This insight underscores the necessity of integrating tactile sensations into prosthetic technology.

    prosthetic hand 3

    Prosthetic robot hand (Florida Atlantic University)

    BREAKTHROUGH PROSTHETIC FINGERS REVOLUTIONIZE THE LIVES OF AMPUTEES

    Implications for future prosthetic design

    The implications of this study extend beyond immediate user benefits; they suggest a paradigm shift in how prosthetic hands could be controlled in the future. By enabling refined dexterous control through enhanced sensory feedback, this research opens new pathways for individuals with upper limb loss to engage in complex tasks traditionally deemed impossible with current prosthetics. This includes activities such as playing musical instruments or performing intricate surgical procedures.

    In addition, the researchers noted that participants with limb loss performed as well as able-bodied subjects in key performance metrics during the tasks. This finding is particularly encouraging for clinical applications and indicates that advancements in technology can bridge gaps in functionality for users.

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    prosthetic hand 4

    Prosthetic robot hand (Florida Atlantic University)

    COULD THESE EXOSKELETON ‘POWERED PANTS’ MAKE OUTDOOR ACTIVITIES EASIER IN THE FUTURE?

    Kurt’s key takeaways

    As researchers continue to refine these prosthetic technology systems, we may soon see prosthetic hands that not only replicate but exceed the capabilities of natural hands, empowering users to reclaim their independence and engage fully in both everyday activities and specialized tasks. This innovative approach not only addresses existing limitations but also paves the way for future developments in assistive technologies for individuals with disabilities.

    What personal experiences or stories do you have related to the use of prosthetics or assistive devices? Let us know by writing us at Cyberguy.com/Contact.

    CLICK HERE TO GET THE FOX NEWS APP

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Venomous creatures wash up on popular North Carolina beaches

    Venomous creatures wash up on popular North Carolina beaches

    Venomous creatures were spotted washing up on the beaches of the Outer Banks in North Carolina, and the National Park Service sent out a warning about the punch these slugs pack.

    The Cape Hatteras National Seashore posted on Facebook that Blue Sea Dragons (Glaucus atlanticus) have been spotted on the beaches.

    “This venomous sea slug lives in the open ocean and occasionally gets stranded on land following strong winds,” officials from the National Seashore posted to Facebook. “They may only grow to about an inch long, but don’t let their size fool you. They pack a punch!”

    According to Oceana.org, Blue Sea Dragons go by other names like sea swallow or blue angel and can grow to about 1.3 inches.

    12 OF THE OCEAN’S CREEPIEST CREATURES THAT ARE SURE TO MAKE YOUR SKIN CRAWL

    Blue Sea Dragons are washing onto the beaches in the Outer Banks, including Cape Hatteras National Seashore, in North Carolina. (Cape Hatteras National Seashore Facebook Post)

    They are often found throughout the Atlantic, Pacific and Indian oceans in tropical and subtropical waters.

    The specimen is considered a sea slug and spends most of its life floating upside-down at the surface and staying afloat by storing air bubbles in its stomach, the organization wrote.

    MONTANTA 12-YEAR-OLD STUNNED AS HE REELS IN RECORD-BREAKING FISH: ‘I’M IN DISBELIEF’

    Highway-12-Hatteras

    Drone aerial view of Outer Banks Highway 12 with Atlantic Ocean and Sound on both sides, Cape Hatteras National Seashore. (Photo by: Visions of America/Joseph Sohm/UCG/Universal Images Group via Getty Images)

    Cape Hatteras National Seashore officials say Blue Sea Dragons move through ocean currents feeding on their meal of choice: the Portuguese man o’ war.

    “Because their meals consist of such a venomous creature, they are capable of storing that venom for their own defense,” the park service wrote. “They concentrate that ingested venom and deliver a sting that is even more powerful! Talk about a fiery bite for such a small dragon.”

    HOUSE ON NORTH CAROLINA’S OUTER BANKS COLLAPSES INTO OCEAN

    Blue-Sea-Dragon-Art

    Blue dragon or Floating sea slug (Glaucus atlanticus), Glaucidae. Artwork by Brigette James. (Photo by DeAgostini/Getty Images)

    Since these tiny slugs carry such a strong toxin, park officials advise anyone who comes across one of these blue beauties to admire it from a safe distance and be cautious of others nearby.

    CLICK HERE TO GET THE FOX NEWS APP

    “Blue Sea Dragons can travel in groups known as ‘Blue Fleets,’” the post read. “If they are discovered, dead or alive, they remain venomous. Please enjoy this fascinating organism without touching it.”

  • What to do if you think your PC has a virus

    What to do if you think your PC has a virus

    If you suspect your PC has a virus, it’s important to act quickly to remove it and protect your data. 

    Keep reading to discover the key warning signs and the steps you can take to address the issue.

    Illustration of a virus on a PC (Kurt “CyberGuy” Knutsson)

    Signs your PC has a virus 

    There are several red flags that could signal your computer may have a virus. One of the most common is if your computer starts running unusually slow. 

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    Another warning sign is the appearance of unfamiliar apps or programs that you don’t remember installing. Additionally, if your usual programs start crashing frequently or behaving oddly, it’s a cause for concern. 

    Finally, an overheating computer is a good reason to start investigating further.

    PC virus 2

    A man frustrated at getting a virus on his PC (Kurt “CyberGuy” Knutsson)

    WINDOW USERS ARE BEING TRICKED BY SNEAKY MALWARE SCHEME

    Steps to remove a virus from your PC

    Realizing you have a virus can be scary, but there’s no need to panic. Here’s what to do next.

    1. Disconnect from the internet:

    • This helps prevent the virus from spreading or communicating with its server.

    2. Enter safe mode:

    • Restart your PC and press F8 (or Shift + F8) before Windows starts to load.
    • Select Safe Mode with Networking. This mode loads only the essential drivers and services.

    3. Run a virus scan:

    • Use strong antivirus software to run a full system scan.
    • Install antivirus software as early as possible to safeguard against malicious links, phishing emails, ransomware and malware that can compromise your private information.
    • The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    4. Delete or quarantine infected files:

    • Follow the instructions provided by your antivirus software to delete or quarantine any detected threats.

    5. Clear temporary files:

    • Use the Disk Cleanup tool to delete temporary files that might harbor the virus.
    • Press Windows + R, type cleanmgr and press Enter. Select the drive you want to clean and follow the prompts.

    6. Reset browser settings:

    • Reset your web browser to its default settings to remove any malicious extensions or settings changes.
    • In Chrome, go to SettingsAdvancedReset and clean upRestore settings to their original defaults.
    • In Firefox, go to HelpTroubleshooting InformationRefresh Firefox.
    • In Edge: Go to Settings > Reset settings > Restore settings to their default values.

    7. Check Startup Programs

    • Viruses often embed themselves in startup programs.
    • Press Ctrl + Shift + Esc to open the Task Manager.
    • Navigate to the Startup tab and disable any unfamiliar or suspicious programs.

    8. Update your software:

    • Ensure your operating system, antivirus software and all other programs are up to date to protect against future threats. Updates often include security patches to protect against known vulnerabilities.

    9. Backup your data:

    HOW TO REMOVE MALWARE ON A PC

    Tips to avoid future viruses 

    Here’s how to be proactive about protecting your PC from viruses down the road. 

    Use safe browsing practices: Avoid clicking on suspicious links or downloading files from untrusted sources.

    Enable firewall: Make sure your firewall is enabled to block unauthorized access to your computer.

    Download apps and software from trusted sites only: Check the number of downloads, as more suggests greater reliability. 

    Use a secure VPN connection: Mask your IP address with a trusted VPN (virtual private network) service to secure your online activity. Many sites can read your IP address and, depending on their privacy settings, may display the city from which you are corresponding. A VPN will disguise your IP address to show an alternate location. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    PC virus 3

    Illustration of protecting your technology (Kurt “CyberGuy” Knutsson)

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    Kurt’s key takeaways 

    By following these steps, you can effectively remove a virus from your PC and protect your data. Staying vigilant and practicing good cybersecurity habits will help safeguard your system from future threats.

    What other PC issues would you like help with? Let us know by writing us at Cyberguy.com/Contact.

    CLICK HERE TO GET THE FOX NEWS APP

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Comet visible from Earth for first time in 80,000 years: ‘Most anticipated comet of the year’

    Comet visible from Earth for first time in 80,000 years: ‘Most anticipated comet of the year’

    A comet not seen for more than 80,000 years will be visible from Earth, potentially during two separate time periods over the next month.

    Comet Tsuchinshan-ATLAS, also known as Comet A3, is believed to have an orbit around the sun of more than 80,000 years, according to earth.com. 

    The comet was first visible starting on Sept. 27 and will continue until shortly before sunrise on Oct. 2. It is expected to appear like a fuzzy ball with a tail stretching across the sky.

    “C/2023 A3 has an orbital period of approximately 80,000 years, classifying it as a long-period comet. This means its behavior and appearance can be unpredictable, with potential changes in brightness and tail development as it approaches the sun,” Minjae Kim, a space expert in the University of Warwick’s astronomy department, told earth.com.

    SPACEX LAUNCHES MISSION TO SPACE STATION THAT WILL BRING BACK STRANDED NASA ASTRONAUTS NEXT YEAR

    Comet C2023 A3 Tsuchinshan-Atlas is seen over the hills near the village of Aguas Blancas, Lavalleja Department, Uruguay, at dawn on September 28, 2024. (Getty Images)

    “If predictions hold, it could be visible to the naked eye, appearing as a fuzzy star with a tail stretching across the sky. Otherwise, binoculars or a small telescope may reveal more detail in the comet’s structure and tail,” Kim added.

    Sept. 27th also marked perihelion, or closet point to the sun, after which the comet will begin its trip back to the outer solar system, according to WKMG.

    Comet

    Comet C/2023 A3 (Tsuchinshan-ATLAS) appears in the sky over Molfetta, Italy, on September 28, 2024. (Getty  Images)

    Another viewing opportunity, which is expected to have better visibility, will be in the middle of October if the comet survives the trip around the sun, as comets will often break apart as they move closer to the sun.

    If the comet survives the trip around the sun, the comet could be visible with the naked eye as it becomes its closest to Earth, with its best visibility expected from Oct. 12 until Oct. 20.

    GEOMAGNETIC STORM EXPECTED TO HIT EARTH FOLLOWING AUTUMNAL EQUINOX

    Comet in September 2024

    Comet C2023 A3 Tsuchinshan-Atlas can be observed over the hills near the village of Aguas Blancas, Lavalleja Department, Uruguay, at dawn on September 28, 2024. (Getty Images)

    CLICK HERE TO GET THE FOX NEWS APP

    The comet will move higher in the sky each night until it disappears for the next 80,000 years.

    Starwalk, an astronomical app for stargazers, said this comet is the “most anticipated comet of the year.”