8.1 C
New York
Sunday, November 2, 2025
Home Blog

Hegseth: US, China to open ‘military-to-military’ coms after Trump-Xi meeting

0

NEWYou can now listen to Fox News articles!

The United States and China plan to establish military-to-military communications channels “to deconflict and deescalate” potential problems, Secretary of War Pete Hegseth said Saturday after talking with his Chinese counterpart.

In a post on X, Hegseth said he had a “positive meeting” with Admiral Dong Jun, China’s Minister of National Defense, in the wake of President Donald Trump’s meeting with Chinese President Xi Jinping.

During their talk, the two defense leaders agreed that the best path forward for the U.S. and China involves “peace, stability, and good relations.”

“Admiral Dong and I also agreed that we should set up military-to-military channels to deconflict and deescalate any problems that arise. We have more meetings on that coming soon. God bless both China and the USA!” Hegseth wrote, in part.

TRUMP TOUTS ‘12 OUT OF 10’ MEETING WITH XI, DOWNPLAYS REPORTS OF VENEZUELA STRIKES

Secretary of War Pete Hegseth says the U.S. and China will open “military-to-military” channels to prevent conflicts following positive meeting with Chinese counterpart Admiral Dong Jun. (Both: HASNOOR HUSSAIN/POOL/AFP via Getty Images)

Earlier Saturday, Hegseth attended a separate meeting in Malaysia with defense leaders from the Association of Southeast Asian Nations (ASEAN), where he urged them to push back against Beijing’s aggressive actions in the South China Sea.

“China’s sweeping territorial and maritime claims in the South China Sea fly in the face of their commitments to resolve disputes peacefully,” Hegseth said at the meeting, according to The Associated Press. 

“We seek peace. We do not seek conflict. But we must ensure that China is not seeking to dominate you or anybody else,” he added.

OPINION: TRUMP SCORES FOUR BIG WINS WITH XI, BUT HAS ONE BIG MISS

The South China Sea remains volatile with Beijing, the Philippines, Vietnam, Malaysia and Brunei all claiming overlapping territories. 

Chinese coast guard and Philippines fishing boats

A Chinese Coast Guard ship is seen closely shadowing the convoy of Filipino fishing boats and a Philippine Coast Guard ship, on May 16, 2024. (Martin San Diego for The Washington Post via Getty Images)

China’s maritime fleet has frequently clashed with the Philippines in the disputed waters, with Chinese officials recently describing the country as a “troublemaker” for staging naval and air drills with the U.S., Australia and New Zealand.

Hegseth defended the U.S. ally during the Saturday meeting by saying Beijing’s designation of the Scarborough Shoal – a territory seized from the Philippines in 2012 – as a “nature reserve” “yet another attempt to coerce new and expanded territorial and maritime claims at your expense.”

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

The War Secretary then urged ASEAN to finalize the Code of Conduct with China and proposed creating a “shared maritime domain awareness” network and rapid-response systems to deter provocations – measures he said would ensure that any member facing “aggression and provocation is not alone.”

Philippines air patrol

Two Philippine Air Force FA-50 fighter jets fly with two U.S. Air Force B-1 bomber aircraft during a joint patrol and training over the South China Sea on Tuesday, Feb. 4, 2025. (Philippine Air Force via AP)

Hegseth also welcomed plans for an ASEAN-U.S. maritime exercise in December aimed at strengthening coordination and safeguarding freedom of navigation.

Reagan’s Boeing 707 Air Force One marks 20 years of being on permanent display

0

NEWYou can now listen to Fox News articles!

Before the gleaming 747s that now ferry U.S. presidents across oceans, there was a smaller, sleeker jet that carried the weight of the free world. 

The last Boeing 707 to serve as a primary Air Force One — the aircraft that once flew President Ronald Reagan, plus six other American presidents — now sits under a striking glass pavilion at the Ronald Reagan Presidential Library in Simi Valley, California.

“This was the last 707 that was used as a primary aircraft as Air Force One,” said David Trulio, president and CEO of the Ronald Reagan Presidential Foundation and Institute. “Subsequent to President Reagan, it was a 747.”

TOP TRAVEL DESTINATIONS GAINING BUZZ FOR 2026 TRIPS REVEALED IN NEW REPORT

Reagan flew the 707, tail number SAM 27000, more than any other president, and it remained in the presidential fleet until it was decommissioned in 2001, taking its last flight just three days before the Sept. 11 attacks. 

During his presidency, however, Reagan ordered the modernization of Air Force One to the larger, more advanced 747s as the primary aircraft. 

President Ronald Reagan traveled aboard SAM 27000 more than any other U.S. president. (Ronald Reagan Presidential Foundation & Institute)

The transition from the 707-based VC-137s to the 747 fleet took place in 1990, according to the U.S. Air Force, a year after Reagan’s term ended, and expanded the aircraft’s range, communications capabilities and comfort.

Ironically, Reagan himself never flew aboard the newer jets he had commissioned, Trulio said.

LARA TRUMP SHARES THE CONTROVERSIAL ‘NO-WAIT-AT-THE-GATE’ TRAVEL STRATEGY THAT HAS SPARKED DEBATE

Yet he traveled to 26 countries, covering 660,000 miles aboard SAM 27000 — a jet that held roughly half as many passengers as today’s Air Force One, which can accommodate about 102 people, according to Boeing.

The 707 also shuttled Presidents Richard Nixon, Gerald Ford, Jimmy Carter, George H.W. Bush, Bill Clinton and George W. Bush.

Ronald and Nancy Reagan waving from Air Force One.

President Reagan and first lady Nancy Reagan wave aboard Air Force One in 1986. (Ronald Reagan Presidential Foundation & Institute)

When the Reagan Library learned the plane was going to be decommissioned, it sought to honor the 40th president’s wish to have it placed permanently in the space where he would later be laid to rest.

Boeing, the plane’s manufacturer, collaborated with the Reagan Library to transport and reassemble the aircraft. The 707 was disassembled and towed to the library site. As the pavilion was constructed, each piece was brought inside and rebuilt within the building itself.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

This year, the Air Force One Pavilion celebrated its 20th anniversary. Since opening to the public in October 2005, nearly seven million visitors have stepped aboard Air Force One 27000. 

The three-story pavilion also features a Marine One helicopter, Reagan’s 1984 presidential limousine and an authentic Irish pub from his ancestral village of Ballyporeen, Ireland. A sweeping mural, “History of the Flying White House,” traces presidential air travel from its beginnings with FDR to the present day.

Nancy Reagan, George W. Bush and Barbara Bush and others cut ribbon for Reagan Library's Air Force One Pavilion in 2005.

The Air Force One Pavilion opened to the public in October 2005.

Over the past two decades, the pavilion has been used for everything from educational programs and international summits to presidential and even high school debates. 

The Reagan Library’s digital reach has grown tremendously, Trulio said, now topping 1.8 million followers across platforms as it expands access to its exhibits and events for audiences worldwide.

The plane is the top attraction for visitors to the Reagan Library. 

When visitors enter and see the massive aircraft, slightly tilted to give the illusion of takeoff and framed by floor-to-ceiling windows overlooking the Simi Valley hills, their first reaction is to gasp, Trulio said.

“It’s a really remarkable, very living piece of history,” he told Fox News Digital. “Any one of our visitors can come and buy a ticket and actually go onto the plane and see exactly where the president, his staff, the press corps, the Secret Service and so on used it as a working, flying office.”

The plane is the top attraction for visitors to the Reagan Library, Trulio noted.

Reagan's Air Force One and presidential motorcade on display at Reagan library.

The Air Force One Pavilion includes Reagan’s limousine and a Marine One helicopter. (Ronald Reagan Presidential Foundation & Institute)

It looks the same as it did 20 years ago, he added. While it was once state of the art, its rotary phones and mid-century decor are a blast from the past for visitors today. 

“To us, they look a little ’80s,” Trulio said.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Unlike modern planes, Reagan’s was not the “cushiest,” he added. “There’s a conference room, there are perfectly comfortable chairs — but the current Air Force One has bedrooms. This one doesn’t.”

Still, it was a vehicle of face-to-face diplomacy, helping to shape global history and continuing to teach lessons that resonate today.

CLICK HERE FOR MORE LIFESTYLE STORIES

After his first meeting with Soviet leader Mikhail Gorbachev in Geneva during the Cold War, for example, Reagan remarked, “So, face-to-face talks can be helpful.”

Trulio said there are “tremendous parallels” between Reagan’s era and today. 

President Reagan putting a golf ball with Robert McFarlane Jim Kuhn Thomas Dawson Thomas Carter George Shultz Don Regan and Dennis Thomas looking on aboard Air Force One watching him play.

President Reagan putts a golf ball aboard Air Force One in 1985. (Ronald Reagan Presidential Foundation & Institute)

History, it’s been said, rhymes. And if you think of the ‘70s going into the ’80s, that was a period of economic challenge, high inflation, we were competing with a communist regime with global ambitions, and there was a sense that maybe America’s best days were behind us,” he said.

CLICK HERE TO GET THE FOX NEWS APP

“President Reagan was an unquestionably successful president,” he continued. “It’s inspiring but also deeply instructive to draw on those successes as we ponder the challenges and the opportunities that we face today.”

How to stay protected from dark web threats and cybercriminals online

0


NEWYou can now listen to Fox News articles!

The dark web often feels like a mystery, hidden beneath the surface of the internet that most people use every day. But to understand how scams and cybercrimes actually work, you need to know what happens in those hidden corners where criminals trade data, services and stolen access. Cybercriminals rely on a structured underground economy, complete with marketplaces, rules and even dispute systems, to operate safely away from law enforcement. By learning how these systems function, you can better understand the threats that could reach you and avoid becoming the next target.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE

Man typing on his laptop.

Learn how to protect your personal information from dark web threats with simple cybersecurity habits and tools. (Photo by Phil Barker/Future Publishing via Getty Images)

Inside the hidden layers of the internet

The Internet is often divided into three layers: the clear web, the deep web and the dark web. The clear web is the open part of the internet that search engines like Google or Bing can index, including news sites, blogs, stores and public pages. Beneath it lies the deep web, which includes pages not meant for public indexing, such as corporate intranets, private databases and webmail portals. Most of the content in the deep web is legal but simply restricted to specific users.

The dark web, however, is where anonymity and illegality intersect. It requires special software such as Tor to access, and much of its activity happens behind encryption and invitation-only walls. Tor, short for The Onion Router, was originally developed by the U.S. Navy for secure communication but has since become a haven for both privacy advocates and criminals.

It anonymizes users by routing traffic through multiple encrypted layers, making it almost impossible to trace where a request truly came from. This anonymity allows criminals to communicate, sell data and conduct illegal trade with reduced risk of exposure.

Over time, the dark web has become a hub for criminal commerce. Marketplaces once operated like eBay for illegal goods, offering everything from drugs and stolen credit card data to hacking tools and fake identities. Many of these platforms have been shut down, but the trade continues on smaller, more private channels, including encrypted messaging apps such as Telegram. Vendors use aliases, ratings and escrow systems to build credibility.

Ironically, even among criminals, trust is a critical part of business. Forums often have administrators, verified sellers and mediators to settle disputes. Members who cheat others or fail to deliver are quickly blacklisted, and reputation becomes the main currency that determines who can be trusted.

The criminal economy and how scams are born

Every major cyberattack or data leak often traces back to the dark web’s underground economy. A single attack typically involves several layers of specialists. It begins with information stealers, malware designed to capture credentials, cookies and device fingerprints from infected machines. The stolen data is then bundled and sold in dark web markets by data suppliers. Each bundle, known as a log, might contain login credentials, browser sessions and even authentication tokens, often selling for less than twenty dollars.

Another group of criminals, known as initial access brokers, purchases these logs to gain entry into corporate systems. With that access, they can impersonate legitimate users and bypass security measures such as multi-factor authentication by mimicking the victim’s usual device or browser. Once inside, these brokers sometimes auction their access to larger criminal gangs or ransomware operators who are capable of exploiting it further.

Some of these auctions are run as competitions, while others are flash sales where well-funded groups can buy access immediately without bidding. Eventually, this chain of transactions ends with a ransomware attack or an extortion demand, as attackers encrypt sensitive data or threaten to leak it publicly.

Interestingly, even within these illegal spaces, scams are common. New vendors often post fake listings for stolen data or hacking tools, collect payments and disappear. Others impersonate trusted members or set up counterfeit escrow services to lure buyers.

Despite all the encryption and reputation systems, no one is truly safe from fraud, not even the criminals themselves. This constant cycle of deception forces dark web communities to build internal rules, verification processes and penalties to keep their operations somewhat functional.

What you can do to stay ahead of dark web-driven threats

For ordinary people and businesses, understanding how these networks operate is key to preventing their effects. Many scams that appear in your inbox or on social media originate from credentials or data first stolen and sold on the dark web. That is why basic digital hygiene goes a long way. Below are some steps you can take to stay protected.

MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH

Hacker using a computer.

From password managers to antivirus software, experts share practical ways to keep hackers out of your data. (Annette Riedl/picture alliance via Getty Images)

1) Invest in personal data removal services

A growing number of companies specialize in removing your personal data from online databases and people-search sites. These platforms often collect and publish names, addresses, phone numbers and even family details without consent, creating easy targets for scammers and identity thieves.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

2) Use unique passwords and a password manager

One of the easiest ways to stay safe online is to use unique, complex passwords for every account you own. Many breaches happen because people reuse the same password across multiple services. When one site is hacked, cybercriminals take those leaked credentials and try them elsewhere, a technique known as credential stuffing. A password manager eliminates this problem by generating strong, random passwords and securely storing them for you.

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

3) Install strong antivirus protection

Antivirus software remains one of the most effective ways to detect and block malicious programs before they can steal your information. Modern antivirus solutions do far more than just scan for viruses. They monitor system behavior, detect phishing attempts and prevent infostealer malware from sending your credentials or personal data to attackers.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

4) Keep your software updated

Outdated software is one of the biggest entry points for attackers. Cybercriminals often exploit known vulnerabilities in operating systems, browsers and plugins to deliver malware or gain access to systems. Installing updates as soon as they are available is one of the simplest yet most effective forms of defense. Enable automatic updates for your operating system, browsers and critical applications.

5) Enable two-factor authentication

Even if your password gets leaked or stolen, two-factor authentication (2FA) adds an additional barrier for attackers. With 2FA, logging in requires both your password and a secondary verification method. This includes code from an authentication app or a hardware security key.

6) Consider identity theft protection services

Identity theft protection can provide early warnings if your personal information appears in data breaches or on dark web marketplaces. These services monitor your sensitive data, such as social security numbers, bank details, or email addresses. If anything suspicious is detected, they alert you. Many providers also offer recovery assistance, helping you restore stolen identities or close fraudulent accounts. While no service can prevent identity theft entirely, these tools can shorten your response time and limit potential damage if your data is compromised.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

Black keyboard with red lights.

Protecting your identity starts with strong passwords, two-factor authentication and regular software updates. (Jens Kalaene/picture alliance via Getty Images)

Kurt’s key takeaway

The dark web thrives on the idea that anonymity equals safety. But while criminals may feel protected, law enforcement and security researchers continue to monitor and infiltrate these spaces. Over the years, many large marketplaces have been dismantled, and hundreds of operators have been caught despite their layers of encryption. The takeaway for everyone else is that the more you understand about how these underground systems function, the better prepared you are to recognize warning signs and protect yourself.

Do you think law enforcement can ever truly catch up with dark web criminals? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved. 



Source link

Historic 12th-century Bellister Castle hits UK market for $3.34 million with a catch

0

NEWYou can now listen to Fox News articles!

A historic castle recently hit the real estate market in the United Kingdom — but it’s not your typical freehold sale.

Bellister Castle, a Grade I-listed property in Haltwhistle, Northumberland, was recently listed by real estate agency Sanderson Young.

Dating back to the 12th century, the castle has a peel tower, which is its oldest feature. The structure boasts 4,778 square feet in the main castle, with a 1,159-square-foot two-bedroom lodge repurposed from a historic gatehouse.

DIVERS REVEAL IMAGES OF 321-YEAR-OLD SHIPWRECK IN REMARKABLE CONDITION OFF COAST

The castle is said to have been constructed with stone from Hadrian’s Wall, a second-century Roman wall designed to protect the northern border of Britannia from the Picts. 

In addition to six bedrooms and three bathrooms, the property also features decorative ceilings, an ornate drawing room and a renovated 19th-century fountain tub.

Bellister Castle in Northumberland dates back to the 12th century and features a historic peel tower. (Sanderson Young)

The estate spans roughly 4.51 acres, including a walled garden, an orchard and pasture — with a magnificent tree-lined driveway leading up to the castle.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

The property “offers a rare combination of modernity and comfort against a backdrop of outstanding historical features,” according to the listing. 

“Attention to detail is in every aspect, combining all the luxuries of modern-day living set within a superb example of an historic, fortified mansion with rich provenance.”

Split image of castle, walled English garden

The estate features nearly five acres of land, including a walled garden, orchard and pasture. (Sanderson Young)

“The rarity of such an opportunity is self-evident and is presented to a superb standard throughout. It is an opportunity for a purchaser to buy into the fabric of England,” the listing also notes.

So what’s the catch? 

The property is being leased by the National Trust — meaning that its next owners won’t quite own the property. 

CLICK HERE FOR MORE LIFESTYLE STORIES

Its 120-year lease ends in 2145. The guide price is 2.5 million pounds, or roughly $3.34 million.

A spokesperson for Sanderson Young told Fox News Digital the listing presents a “very rare” opportunity to rent a castle leased from the National Trust.

Ancient castle with flag flying near open lawn

The Grade I-listed Bellister Castle was built partly with stone from Hadrian’s Wall, according to its real-estate listing. (Sanderson Young)

“Most long-term leases are for residential or farm properties, and the lease agreements state that the National Trust will need to be involved in the transfer of the lease,” the spokesperson said, adding that there may be an opportunity to extend the lease when it ends.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“Owning Bellister Castle provides the opportunity to live in an extraordinary historic building and look after it for future generations,” added the official.

Bedroom inside the castle with large bed, ornate windows

The listing presents a “very rare” opportunity to live in a National Trust property, said Sanderson Young. (Sanderson Young)

The listing came months after a similar property hit the British real estate market. 

CLICK HERE TO GET THE FOX NEWS APP

St. John’s Jerusalem, a medieval monastery in England once used by crusader monks, was listed for sale this summer. 

It was priced at about $4.4 million for a lease ending in 2122.

Space data centers could make cloud computing services faster and greener

0


NEWYou can now listen to Fox News articles!

A computer chip so powerful that it fuels today’s artificial intelligence is about to leave Earth. NVIDIA’s H100 GPU, used to train advanced AI models, will soon travel aboard a Starcloud satellite.

Starcloud, a startup based in Redmond, Washington, wants to see if the world can move data centers into orbit. These centers power nearly everything online, from streaming to AI tools. Shifting them into space could help reduce pollution, save resources and speed up computing for everyone.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

LIVING IN GIANT MOON GLASS SPHERES COULD BE OUR FUTURE

Servers at a data center.

Starcloud aims to build the first orbital data centers, cutting emissions and speeding up global computing. (Dean Mouhtaropoulos/Getty Images)

Why space data centers matter for the future

Every time you send a message, store a file in the cloud or use AI, large computers on Earth handle the work. These data centers use massive amounts of electricity and water to stay cool. They also release heat, noise and greenhouse gases that affect local communities.

Space offers a different environment. Solar energy is abundant, and cooling happens naturally in the cold vacuum. “The only environmental cost is the launch,” said Starcloud CEO Philip Johnston. “After that, we could save ten times the carbon emissions compared with running data centers on Earth.”

For a world searching for greener technology, that goal matters.

How the NVIDIA GPU will work in orbit

The Starcloud-1 satellite, about the size of a small refrigerator, will carry NVIDIA’s H100 GPU. It is nearly one hundred times more powerful than any chip ever sent into orbit.

Once in space, the GPU will process huge amounts of satellite data. It will study images of Earth to identify wildfires, track crops and monitor weather. Normally, satellites send this data back to Earth for processing, which can cause long delays. Doing the analysis in orbit allows faster results and better decisions on the ground.

The mission will also test Google’s Gemma language model in orbit. It will be the first time a large AI model operates in space.

THE NEW ARMS RACE IS FOR COMPUTE — AND AMERICA CAN’T AFFORD TO FALL BEHIND

By processing satellite data in orbit, Starcloud hopes to make Earth monitoring faster and more efficient.

By processing satellite data in orbit, Starcloud hopes to make Earth monitoring faster and more efficient. (Dean Mouhtaropoulos/Getty Images)

Starcloud plans to build space data centers

Starcloud hopes this is only the beginning. The company plans to build larger data centers in space powered by sunlight and cooled by the natural chill of orbit. Future systems will include the next generation of NVIDIA GPUs called Blackwell, which promise even higher performance.

Starcloud’s long-term goal is to create a five-gigawatt orbital data center about 2.5 miles wide (around 13,000 feet across). It could handle massive AI workloads while cutting costs and carbon emissions. As launch prices continue to fall, building data centers beyond Earth could soon become practical.

Johnston believes that by the 2030s, many new data centers will operate in orbit instead of on land.

What this space mission means for you

If this works, the technology that powers your apps, games and AI tools might soon be running in space. This change could make cloud services faster, more efficient and less harmful to the planet.

Space-based data centers could also speed up disaster response, improve weather forecasts and save millions of gallons of water every year. The idea shows that innovation and sustainability can grow together.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

RAPID RISE OF AI PUTS NEW URGENCY ON CONGRESS TO UNLEASH AMERICAN ENERGY

NVIDIA logo.

NVIDIA’s powerful H100 GPU is heading to space aboard Starcloud-1 to test AI data processing in orbit. (Kent Nishimura/Bloomberg via Getty Images)

Kurt’s key takeaways

Sending an NVIDIA GPU into orbit shows how quickly technology is changing. The mission combines curiosity, innovation and a genuine push to make computing cleaner and faster. As space becomes more reachable, the idea of data centers floating above Earth feels less like fiction and more like something that could actually happen. Each of these missions could teach us a little more about how to build a sustainable digital future.

How do you feel about the idea of data centers operating in space? Is it exciting, risky or both?  Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
 

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link

Becky Robinson’s ‘Entitled’ comedy special features viral housewife act

0

NEWYou can now listen to Fox News articles!

Stand-up comedian Becky Robinson’s career is really starting to take off, thanks to a wig, a golf outfit from her mother’s closet, and what she calls “one manic episode of improv” she filmed and posted to social media at the height of the COVID-19 pandemic.

Robinson spoke with Fox News Digital in October about her new special, “Entitled,” and the inspiration behind her viral comedy character, “Entitled Housewife” — an uninhibited, foul-mouthed parody of wine-mom and country club culture. The character blew up on social media during the pandemic and has helped Robinson build a legion of fans. 

“I first found the character by just like improvising, like my parents left the house and I was just like, ‘Scott, where’s the Sauvy B?’ I just kind of started yelling at this fake husband kind of how my mom maybe would at my dad if she was upset,” she told Fox News.

COMEDIAN REVEALS HOW DENYING AN ARRANGED MARRIAGE AT 14 YEARS OLD COST HER RELATIONSHIP WITH HER FATHER

Stand-up comedian Becky Robinson spoke to Fox News Digital in October about her new special and her viral character, “Entitled Housewife.” (Fox News Digital )

One of Robinson’s first “Entitled Housewife” videos, posted to YouTube in 2020, shows the character trying — and failing — to back her SUV out of her driveway to make it to a “country club bruncheon.”

Wearing a massive golf visor, oversized sunglasses and AirPods, she screams at her imaginary son, Dashiell, to move his toy wagon.

“Dashiell, move your f—— wagon! I’m already 15 minutes late to the country club bruncheon! I don’t have any time for this.” She pulls out anyway, with the sound of the wagon crunching under the weight of the car can be heard in the background.

“Whelp, that’s your loss. You could’ve moved it a little faster, OK? Mommy’s got s— to do.” 

From the very first video, Robinson had developed an entire fictional family for “Housewife” to yell at.

“And it was that very first day that I started yelling at Scott, at the kids – Dashiell and Maccabee – and my best friend Trish, and her other two friends Jackie and Margo who are like her foursome that she golfs with,” Robinson said. “Her universe was just all built in that one, dare I say, manic episode of improv.”

When asked where the inspiration for the character came from, Robinson pointed to her parents — and a lot of downtime during the COVID-19 pandemic. 

“I grew up outside of Portland, Oregon, and went home during the pandemic, and I was with my parents, and they were just like having the time of their lives. My dad was like, ‘Golf is all we have. This is great. This is great. The country club’s still open.’ And my mom has had a lot of health issues. She had a brain tumor and breast cancer. And so, by the time the pandemic hit, she was finally healthy. And she was like, ‘This is the time I’m supposed to be out and about having White Claws with the girls.’”

“And I kind of sat there and watched them. It was just like, ‘Oh my gosh, you guys are out of your minds,’” she continued. “And I just, I put a wig on, and I went in their closet and I found a skort and a polo and a visor and my dad’s Oakleys and, of course, the AirPods. And I started improvising.”

MARLON WAYANS WEIGHS IN ON CONTROVERSIAL TONY HINCHCLIFFE JOKE, WHICH POLITICIAN COULD BE A COMIC

Becky Robinson special poster

Stand-up comedian Becky Robinson’s new special, “Entitled,” debuted on her website in late October.  (Becky Robinson/Instagram)

The comic told Fox News Digital she wasn’t thinking about what “Entitled Housewife” might do for her career — she just wanted to make herself laugh during the lows of the pandemic. 

“And that was the first time I had laughed in a long time. So, it was kind of like, maybe it’ll make one other person laugh. And I posted the first video, and it just blew up. I had no idea. I thought it was just gonna be like any other thing.”

Robinson recalled how the video even caught the attention of A-list celebrities.

“All these celebrities started DM’ing me. Chris Pratt was like, ‘I gotta play your husband if you’re gonna make a movie with this.’ And some of the females – Wendy McClendon Covey, who I’ve looked up to for years, was like, ‘Yes, if you’re making a movie, I’m in.’ And it just opened up a lot of doors, and I’ve met so many amazing women.”

Hundreds of videos and millions of views later, “Entitled Housewife” has become a household name — and a co-star on Robinson’s ongoing “Member’s Only” tour. The special, filmed during the Boston stop of the tour in April, is split into two parts: one featuring Robinson as herself, and the other featuring the character. 

“It’s half me doing stand-up as myself,” Robinson explained, describing the first half of the set. She said the first bit is about her “just poking fun at everyday life about the things that we’re like, ‘Oh, this isn’t quite right,’” and making jokes about being a “modern-day woman.”

Describing the second act, she said, “Then the character ‘Entitled Housewife’ rolls up to the theater — running late, as usual — busts down the door, drives onto the stage and does this epic, big performance. At that point, the special turns into what feels like one big party.” 

“We’re trying to make people ruin a couple pairs of pants, hopefully,” Robinson added.

In addition to the onstage antics — including what looked like a dance number — the audience also made an impression. Many of the women showed up wearing visors, sunglasses and tennis skorts in tribute to the character. 

“Yes, we’ve got a cult,” Robinson said, acknowledging her diehard fans. 

Recalling when fans first began showing up in costume, she said, “Yeah, the very first show at the tour, kind of the tail end of the pandemic, our first show back, they just descended inside, just visors – everyone came to us. People brought rackets and clubs and like pickleball paddles. And yeah, so from the jump, everyone’s been dressing up.”

CLICK HERE FOR MORE COVERAGE OF MEDIA AND CULTURE

Becky Robinson in 2017

Comedian Becky Robinson doing stand-up in 2016. (Michael S. Schwarts/Getty )

Robinson’s connection to her female fans is so important that she’s hosting her first annual golf tournament in Tulum, Mexico, this month — the “Entitled Housewife Classic.” 

“We found this epic course — the PGA Riviera Maya in Tulum — and the Conrad Hotel right across the way,” Robinson said. “I’m hosting more than 100 people for the weekend, and we’ve got a bunch of brands on board.” 

“I want a whole weekend with them,” she said of the fans. “A night is not enough. It’s like, let’s do a whole week. So, I’m gonna do a show while we’re down there too. And two days of like a kind of a golf tournament.” 

The tournament is open to the first 100 fans who buy tickets, she said, with plenty of extra perks included. 

“Oh, and I also have hired male Chippendales to be the drink cart drivers, because you don’t see that in the game of golf. No, it’s always very attractive women, so I thought, ‘Let’s get some.’”

Robinson’s special is out now on her website, beckyrobinsonthegreat.com. 

Readers can also find more info about her upcoming golf tournament at entitledhousewifeclassic.com.

CLICK HERE TO GET THE FOX NEWS APP

Red Cross transfers three bodies to Israeli authorities in rare coordination

0

NEWYou can now listen to Fox News articles!

The International Committee of the Red Cross (ICRC) confirmed Thursday it facilitated the transfer of three bodies to Israeli authorities “at the request and with the approval of the parties,” marking the first such return since fighting resumed.

The organization said it acted in its role as a neutral intermediary and emphasized that identification of the remains will be carried out by Israeli authorities. The ICRC “does not take part in locating the remains,” it said.

The humanitarian group added that its involvement was limited to facilitating the transfer and reiterated that, under international humanitarian law, it is the responsibility of the parties to search for, collect and return the dead.

The transfer marks a rare instance of coordination between the sides since hostilities resumed earlier this month as humanitarian agencies continue to call for broader access to affected areas.

RED CROSS TO RECEIVE ‘SEVERAL COFFINS OF DECEASED HOSTAGES’ IN GAZA STRIP, IDF SAYS

Hamas handed over the bodies of two more Israeli hostages to International Committee of the Red Cross officials to be transferred into Israel through the Kissufim border crossing in the central Gaza Strip Oct. 21, 2025.  (Alaa Y. M. Abumohsen/Anadolu via Getty Images)

The ICRC has previously overseen similar exchanges in conflicts involving Israel and armed groups in Gaza and Lebanon, typically serving only as an intermediary to ensure compliance with international humanitarian law.

“The parties must act to ensure their return to their families,” the ICRC said, adding it can fulfill its neutral role “only through cooperation from all relevant parties and within the framework of the current agreement.”

ISRAEL DEFENSE FORCES ANNOUNCES RESUMPTION OF CEASEFIRE FOLLOWING STRIKES

Israeli soldiers

Israeli soldiers stand near their tanks along the Israeli-Gaza border, as seen from southern Israel Oct. 10, 2025, after Israel and Hamas agreed to a pause in their war and the release of remaining hostages. (AP Photo/Emilio Morenatti)

Israeli officials have not yet released details about the identities of the deceased or the circumstances of the transfer.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Protesters in Tel Aviv hold sign reading "President Trump Bring the Last Hostages Home"

A drone view shows participants holding a large banner during a rally held by hostage families and supporters at Hostages Square to demand the immediate release of the bodies of the deceased hostages who were kidnapped in the deadly Oct. 7, 2023, attack on Israel by Hamas in Tel Aviv, Israel, Oct. 18, 2025.  (Ilan Rosenberg/Reuters)

The ICRC’s involvement in body transfers dates back decades, often serving as one of the few remaining channels of communication between adversaries during times of active conflict.

Microsoft warns Windows 10 users face 90% ransomware risk after support

0


NEWYou can now listen to Fox News articles!

Microsoft’s blog recently gave a firm warning: unsupported systems aren’t just outdated, they’re unprotected. That message targets anyone still using Windows 10, and it’s serious. In Microsoft’s Digital Defense Report, over 90% of ransomware attacks hit unsupported PCs. That statistic alone should make every Windows 10 user think twice.

When an operating system stops receiving updates, it becomes an open door for hackers. Security patches dry up, and vulnerabilities grow. So while your computer might seem fine today, it could already be compromised without your knowledge.

Sign up for my FREE CyberGuy Report

Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

Why are unsupported systems dangerous

Unsupported Windows 10 systems no longer get the updates that keep you safe. Without those patches, ransomware and malware have easy access to your files. Once inside, attackers can encrypt your personal data or steal credentials and banking details.

It’s not just about losing files. Identity theft and financial fraud often start with outdated systems. The older the software, the easier it is for cybercriminals to exploit weaknesses that will never be fixed.

The “just one more year” trap

Many people tell themselves they’ll upgrade later. Microsoft calls this “just one more year” thinking. The problem is that every delay increases your risk. Extended security updates only offer limited coverage, and they don’t stop new types of attacks.

Without Microsoft’s regular monitoring, new vulnerabilities stay hidden. You could be using your computer for months while attackers quietly collect your data. That’s a frightening thought, especially when most of it can be prevented by upgrading.

microsoft laptop computer

Upgrading to Windows 11 keeps your system protected with ongoing security updates. (Microsoft)

MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

The hidden costs of waiting to upgrade to Windows 11

It’s easy to think upgrading costs too much. But what about the cost of losing your photos, business files or financial information? Data recovery, fraud resolution and downtime can cost far more than a new device.

Hackers know users delay updates, and they actively look for outdated systems. Even one unsupported device in a home or office network can create a weak spot that exposes everything else.

How to stay safe from unsupported Windows 10 security risks

You can protect yourself right now with a few smart steps. These actions reduce your exposure, tighten your online defenses and prepare you for a smooth upgrade to Windows 11. The good news is that most of these changes only take a few minutes but make a major difference in your security.

1) Upgrade your system to Windows 11

HACKERS FOUND A WAY TO TURN OFF WINDOWS DEFENDER REMOTELY

Start by checking whether your PC can handle Windows 11. Most modern AMD and Intel processors already meet the system requirements. Upgrading keeps your computer protected with ongoing updates that patch vulnerabilities and improve overall performance. It’s one of the simplest ways to defend against ransomware and malware before they strike.

2) Watch out for phishing scams and install strong antivirus software

Be cautious with every link and attachment you receive. Cybercriminals love sending fake update notifications that look like official Microsoft messages. These phishing scams often contain malicious links that install malware in seconds. Before you click, hover over links to verify their source and only download updates directly from Microsoft’s official site. To add an extra layer of protection, install strong antivirus software that can detect and block malicious files before they infect your system.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Signage outside the Microsoft Campus

Delaying your Windows 11 upgrade only gives cybercriminals more time to strike. (Photographer: Chona Kasinger/Bloomberg via Getty Images)

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

3) Use a data removal service

HOW A SINGLE MACBOOK COMPROMISE SPREAD ACROSS A USER’S APPLE DEVICES

Use a personal data removal service to take your information off people-search and data broker websites. These services help remove your name, address, phone number and other personal details that scammers often use for phishing or social-engineering attacks. By limiting what’s publicly available about you, you make it much harder for cybercriminals to target you, especially if your older, unsupported Windows 10 system is ever exposed online.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

4) Secure your logins

Strong logins make a huge difference. Turn on two-factor authentication (2FA) for your most sensitive accounts, such as banking and email. Also, create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. This extra layer stops hackers, even if they manage to steal a password.

WINDOWS 10 SUPPORT ENDS: UPGRADE TO WINDOWS 11 SAFELY

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords, and secure those accounts with new, unique credentials.

Man typing on his laptop.

Without Windows updates, hidden vulnerabilities give hackers easy access to your data. (Felix Zahn/Photothek via Getty Images)

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

5) Back up your data regularly

Think of backups as your safety net. Save copies of important files to an external hard drive or a trusted cloud service. Schedule automatic backups so you don’t have to remember to do it yourself. If your PC ever gets locked by ransomware, a clean backup means you can restore everything without paying a cent.

6) Stay informed and proactive

Cyber threats evolve every day, and knowledge is your best defense. Keep an eye on official Microsoft announcements and alerts. Small changes, like applying updates quickly and revisiting your privacy settings, can keep you a step ahead of attackers.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

Unsupported systems might look harmless, but they create silent risks that grow over time. Every day you stay on Windows 10 after support ends, you depend on luck instead of protection. Upgrading isn’t just about staying current; it’s about keeping your data safe and your privacy intact.

Is holding on to Windows 10 worth risking everything stored on your computer? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report

Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved.



Source link

AI integration causes job losses at tech companies

0


NEWYou can now listen to Fox News articles!

Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.

IN TODAY’S NEWSLETTER:

– Amazon to cut around 14K corporate jobs
– Senate Republican demands Google shut down AI model over false rape allegation
– Leading AI company to ban kids from chatbots after lawsuit blames app for child’s death

CORPORATE CUTBACKS: Amazon is planning to cut 14,000 roles from its corporate workforce as part of an internal restructuring, according to a message shared with employees on Tuesday.

Amazon fulfillment center in New Jersey

FILE PHOTO: Workers move products during Cyber Monday at the Amazon’s fulfillment center in Robbinsville, New Jersey, Nov. 27, 2023.  (REUTERS/Mike Segar/File Photo)

AI LIES EXPOSED: A Senate Republican accused Google and its AI of targeting conservatives with false allegations and fake news stories, including allegations of a sexual assault that never happened.

CHATBOT CRACKDOWN: Popular artificial intelligence (AI) chatbot platform Character.ai, widely used for role-playing and creative storytelling with virtual characters, announced Wednesday that users under 18 will no longer be able to engage in open-ended conversations with its virtual companions starting Nov. 24.

AI PROOF: There is growing concern among today’s workforce that they will be swiftly replaced by artificial intelligence as the technology, which has touched nearly every corner of the economy, continues to advance. But experts argue that the adoption of the technology won’t be the same across all industries, meaning not every job will be impacted the same way, according to the World Economic Forum. To better characterize the situation, the organization likened AI to a college student who had access to all the old exams and study guides.

REAL WORLD ROADS: A new safety evaluation shows the Kodiak Driver, an autonomous system from Kodiak AI, tied for the top safety score among more than 1,000 commercial fleets run by human drivers. The evaluation came from Nauto, Inc., creator of the Visually Enhanced Risk Assessment, or VERA Score. This system uses AI to measure fleet safety on a scale of 1 to 100.

A red Kodiak self-driving semi-truck drives on a highway under a blue sky near an exit sign.

Kodiak’s self-driving trucks combine AI vision and real-time data to reduce risky behavior and improve on-road performance. (Kodiak)

DIGITAL DANGER: Heartbroken parents are demanding justice after artificial intelligence (AI) “companion” chatbots allegedly groomed, manipulated and encouraged their children to take their own lives — prompting bipartisan outrage in Congress and a new bill that could potentially hold big tech accountable for minors’ safety on their platforms.

EXPANDING REACH: Chip giant Nvidia on Tuesday announced new partnerships with tech and telecommunications companies in efforts to advance artificial intelligence (AI)infrastructure and operationalize AI capabilities.

RACE TO WIN: PayPal on Tuesday became the first payments platform to embed its digital wallet into OpenAI’s ChatGPT. Shares of the San Jose, California-based company climbed in Tuesday morning trading after the company announced that it is going to adopt the Agentic Commerce Protocol (ACP) to expand payments and commerce in ChatGPT, allowing ChatGPT users to be able to check out instantly using PayPal. 

DEFAMATION SUIT: Conservative activist Robby Starbuck is suing Google after the tech giant’s AI tools allegedly linked him to false accusations of sexual assault, child rape and financial exploitation, among others.

DIGITAL DECEPTION: Artificial intelligence is helping workers create fake expense receipts, according to a recent report. A slew of AI-generated receipts have been submitted to employers thanks to new image generation models from companies like Google and OpenAI, the Financial Times reported.

TECH SHAKE-UP: Chegg Inc., a Santa Clara-based online learning platform, said Monday it will cut about 45% of its workforce – roughly 388 employees – as it confronts what it calls “the new realities of AI and reduced traffic from Google to content publishers.”

GONE GROK: Elon Musk’s artificial intelligence company, xAI, launched its early version of Grokipedia Monday, which is said to be an AI-generated encyclopedia to compete with Wikipedia. The billionaire Tesla founder, who has long criticized Wikipedia for what he calls “editorial bias,” previously described Grokipedia as a more “truthful and independent alternative.” 

Elon Musk sitting with hands together

lon Musk attends the Viva Technology conference dedicated to innovation and startups at the Porte de Versailles exhibition center on June 16, 2023, in Paris. (Chesnot/Getty Images)

PROGRAMMING HOPE: Artificial intelligence is stepping into the fight against cancer — and, according to Fox News senior medical analyst Dr. Marc Siegel, it could be a game-changer. On the Monday episode of “Fox & Friends,” Siegel said AI is already transforming the way doctors detect and treat cancer, and could lead to real cures within the next decade.

EYES ON YOU: Your phone is full of photos you’ve never posted, moments you meant to share but never got around to. That’s exactly what Facebook wants to change. It now uses Meta AI to spot hidden gems in your camera roll, polish them, and create simple collages you can share. You take the pictures, and Facebook helps turn them into easy, ready-to-share memories. No design skills required.

DIGITAL DOMINANCE: The United States must win the global race for AI domination against China. Our success depends on thriving innovation and robust investment – two integral pieces of our national battle plan. But the third component of victory can’t be overlooked: The U.S. urgently needs even better internet infrastructure. If we don’t extend our advantage in 21st-century connectivity, we will lose the fight for global AI leadership.

SECURITY SLIP: Police officers swarmed a 16-year-old high school student last week after an artificial intelligence (AI) gun detection system mistakenly flagged his bag of chips as a firearm, leaving officials and students shaken. Student Taki Allen was waiting for his ride at Kenwood High School in Essex, Maryland, last Monday when he placed an empty bag of chips in his pocket, according to WMAR-2 News. Moments later, police officers suddenly surrounded him, ordering him to the ground and handcuffing him, the local station reported. 

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

Fox News
Fox Business
Fox Weather
Fox Sports
Tubi

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.





Source link

Nike’s Project Amplify creates motor-powered shoes

0


NEWYou can now listen to Fox News articles!

Nike has taken a bold step into the future with Project Amplify, the world’s first motor-powered footwear system made for people who love to move. Created with robotics partner Dephy, the design combines a carbon-plated running shoe with a motorized cuff and drive belt that add a gentle push to every stride.

Unlike performance tech built for pros, Project Amplify is designed for everyday movers such as runners, walkers and commuters. It helps anyone who wants to go a little faster and a little farther with less effort. Think of it like the running world’s version of an e-bike. It makes movement simpler, smoother and more fun for everyone.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

SKECHERS’ AIRTAG SHOES LET YOU TRACK YOUR KIDS’ STEPS

How Project Amplify works

At the center of Project Amplify is a small but powerful motor. It connects to a rechargeable cuff that wraps comfortably around your calf. The cuff links to a carbon plate inside the shoe. Together, they provide natural assistance with each step.

Nike’s Project Amplify shoe models lined one after the other in a row.

Nike’s Project Amplify pairs sleek design with advanced robotics to help every step feel lighter and smoother. (Nike)

Testing in the Nike Sport Research Lab has been extensive. More than 400 athletes have taken over 2.4 million steps during trials. According to testers, the system makes uphill running feel like flat ground. Some even said it helped them go from a 12-minute mile to a 10-minute mile with less effort.

NIKE IS NOW ON AMAZON: SHOP WALKING SHOES, JOGGERS, SOCKS AND SHORTS TODAY

Because of this, Nike says Project Amplify isn’t about competition. The company’s focus is on making movement easier and more approachable for a wider range of people. Whether someone is new to running or wants to fit more walking into daily life, the technology is designed to offer gentle support without taking over the effort.

Innovation made accessible

Nike’s VP of Emerging Sport and Innovation Michael Donaghu described the idea behind Project Amplify as this, “What if we could help athletes move faster and farther with less energy and a lot more fun?”

HUMANOID ROBOT TURNS HEADS AT NYC SNEAKER STORE

That question inspired years of research and collaboration between Nike and Dephy. Together, they combined robotics, biomechanics and motion algorithms to create a powered shoe that feels natural to wear.

Like e-bikes transformed cycling, Project Amplify could do the same for running and walking. It aims to help people stay active more often and enjoy movement in new ways. Through this approach, Nike is showing how innovation can make fitness more accessible to everyone.

Nike’s Project Amplify neon shoe model on display.

Early testing shows the powered cuff and drive system give runners steady support on every stride. (Nike)

What this means for you

AFFORDABLE 3D-PRINTED BIONIC ARM USES MUSCLE SIGNALS TO MOVE

Imagine finishing a run with energy to spare. Picture walking an extra mile without feeling tired. Project Amplify makes that possible. Its gentle mechanical assist feels like an extra set of calf muscles that supports your natural stride.

For casual runners, this means more miles with less strain. For commuters, it could make daily travel faster and more efficient. Overall, it gives you the power to enjoy movement again. The goal is not to do less. The goal is to get more from every step.

Take my quiz: How safe is your online security?

NEW EXOSKELETON BUILT TO BOOST ENDURANCE AND CUT FATIGUE

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

Kurt’s key takeaways

With Project Amplify, Nike is blending art, science and sport to change how movement feels. This new technology aims to enhance natural motion rather than replace it. As testing moves forward, one thing is clear: Project Amplify could completely change how we think about running, walking and human performance.

man tying shoes

As Nike refines Project Amplify, the focus remains on making movement easier, more natural, and more enjoyable for everyone. (iStock)

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

If powered shoes could make running and walking easier, would you try them or stick with pure muscle power? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved.



Source link