25.2 C
New York
Wednesday, November 6, 2024
Home Blog

Liz Cheney acknowledges Trump’s victory: ‘We have a new President-elect’

0

Former Rep. Liz Cheney acknowledged former President Donald Trump’s 2024 presidential election victory on Wednesday, noting in a post on X that the nation has “a new President-elect.”

Cheney, a vociferous Trump critic who supported Vice President Kamala Harris in the election, asserted that Americans must accept the result.

“Our nation’s democratic system functioned last night and we have a new President-elect.  All Americans are bound, whether we like the outcome or not, to accept the results of our elections,” Cheney declared in her post. 

LIZ CHENEY BLASTS TRUMP AS ‘DEPRAVED,’ ‘UNSTABLE,’ CLAIMS PRO-LIFE AND PRO-CHOICE WOMEN RALLYING BEHIND HARRIS

Vice President Kamala Harris, speaks with former U.S. Rep. Liz Cheney at a town hall at the Royal Oak Music Theatre on Oct. 21, 2024 in Royal Oak, Michigan. (Sarah Rice/Getty Images)

“We now have a special responsibility, as citizens of the greatest nation on earth, to do everything we can to support and defend our Constitution, preserve the rule of law, and ensure that our institutions hold over these coming four years. Citizens across this country, our courts, members of the press and those serving in our federal, state and local governments must now be the guardrails of democracy,” she added.

Cheney was one of the 10 House Republicans who voted to impeach then-President Donald Trump in the wake of the Jan. 6, 2021, Capitol riot. Later, she served on the House Select Committee that investigated the episode.

Trump and Cheney had both been excoriating each other.

TRUMP CRITICISM OF LIZ CHENEY AS ‘RADICAL WAR HAWK’ FRAMED AS CALL FOR VIOLENCE BY ‘IRRESPONSIBLE’ MEDIA

Trump Florida speech

Former President Donald Trump is pictured at an election night watch party, on Wednesday, Nov. 6, in West Palm Beach, Fla.  (AP/Alex Brandon)

Trump called her “a very dumb individual” and “a radical war hawk.”

Cheney blasted Trump, declaring in a post on X, “We cannot entrust our country and our freedom to a petty, vindictive, cruel, unstable man who wants to be a tyrant.”

Former Rep. Adam Kinzinger also acknowledged the election outcome.

TRUMP LAMBASTES LIZ CHENEY AS ‘CRAZED WARHAWK’ AS SHE CAMPAIGNS FOR KAMALA HARRIS

Former Rep. Adam Kinzinger

Former Rep. Adam Kinzinger speaks during a campaign event with U.S. Vice President Kamala Harris, not pictured, at Washington Crossing Historic Park in Washington Crossing, Penn., on Wednesday, Oct. 16, 2024.  (Hannah Beier/Bloomberg via Getty Images)

CLICK HERE TO GET THE FOX NEWS APP 

“Last night the battle was lost, but the mission continues. We move on, regroup, and prepare for the next one,” Kinzinger tweeted.

Like Cheney, Kinzinger was also one of the House Republicans who voted to impeach Trump after the Capitol riot. He also served on the House Select Committee formed to probe the episode and he backed Harris during the 2024 White House contest.

My iPhone says I have 14 viruses. What should I do next?

0


Although iPhones have robust security features, they are not entirely immune to threats. While they are generally safer from viruses and malware than Android devices, no device is completely invulnerable.

This point was reinforced by a strange experience that caught our attention when “Pam” of Mesa, Arizona, wrote to us, “My iPhone says I have 14 viruses. What program can I [install] to help with my phone? How can I [make] my phone safe?”

Well, Pam, we’re more than happy to explore why you are getting strange messages on your iPhone suggesting that there were 14 viruses on it. There are various reasons why you could be seeing these types of messages, and there are workarounds to make your phone safe again.

I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS

Enter the giveaway by signing up for my free newsletter.

My iPhone says I have 14 viruses. What should I do next?

Woman shocked about virus alerts on her phone (Kurt “CyberGuy” Knutsson)

Why am I getting virus or malware alerts?

The iPhone is less vulnerable to viruses and malware due to its closed-code design. This means that Apple doesn’t share all of its code information, which makes it harder for hackers to exploit vulnerabilities to take over a user’s apps or iPhone. It’s important to note that Apple will never send you an alert via pop-up, text or email that you have a virus on your device.

My iPhone says I have 14 viruses. What should I do next?

Warning on phone’s home screen (Kurt “CyberGuy” Knutsson)

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

Watch out for these fake virus alerts on your iPhone

Below are several reasons why you could get notifications on your iPhone about viruses, which you may or may not actually have.

1) Pop-up ads: You may not actually have any viruses or malware on your iPhone. Instead, it can be an ad that pops up from your mobile browser stating that you have viruses or malware on your iPhone. These can scam you in a couple of ways:

  • It causes you to click on the ad, which can cause you to download viruses or malware.
  • It sends you to another website that asks you for private information, such as payment, so you can pay to get rid of the virus or malware.

2) Fake apps: Some scammers have fake apps that display fake alerts about viruses or malware to scare people to download their apps or purchase their services to get rid of these fake problems.

3) Phishing scams: This alert about viruses can be a scam email or text message claiming you have viruses or malware that need to be eradicated from your device. Do not click on any links or call any numbers as it will likely transfer you to the actual scammer, who will likely hard sell you to buy their services, part with private and financial information or give them access to your iPhone.

My iPhone says I have 14 viruses. What should I do next?

Man scrolling on his iPhone (Kurt “CyberGuy” Knutsson)

NEW CYBERATTACK TARGETS IPHONE AND APPLE IDS: HERE’S HOW TO STAY SAFE

How do I protect my iPhone?

Even though it is more difficult to penetrate the iPhone, it doesn’t mean it is impossible. In fact, some hackers watch for particular vulnerabilities in iOS to launch their attacks. If you see such warnings, it’s best to ignore them and avoid clicking on any links or downloading any suggested software. Below are several key steps you can take to secure your iPhone.

1) Keep your iPhone up to date: Occasionally, Apple releases new iOS updates to address known vulnerabilities. When possible, it is best to update the iOS so that your iPhone is safe from known vulnerabilities.

2) Install and run strong antivirus software: An antivirus software actively running on all of your devices can help keep them all safe, including your iPhone. With iPhones, strong antivirus software will prevent you from clicking on any malicious links that may then install malware onto your devices, which can potentially extract personal information from your device. Avoid clicking on suspicious links or downloading attachments from unknown sources. These can be phishing attempts designed to steal your personal information.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Download apps only from the App Store: Stick to downloading apps from the official Apple App Store. Apps on the App Store are vetted by Apple for security, reducing the risk of downloading malicious software.

4) Enable two-factor authentication (2FA): Adding an extra layer of security to your Apple ID can help protect your personal information. With 2FA, even if someone gets your password, they won’t be able to access your account without the second factor.

5) Use strong passwords: Ensure that your passwords are strong and unique for different accounts. Consider using a password manager to keep track of them.

6) Monitor app permissions: Regularly check the permissions granted to your apps and revoke any that seem unnecessary. This can help prevent apps from accessing more information than they need.

AVOID IPHONE PRIVACY DISASTERS WITH THESE 10 SMART TIPS

Kurt’s key takeaways

While most iPhone users rest easy knowing that the iOS keeps most common viruses and malware at bay, they are still susceptible to scammers trying to work around the closed code and scaring people into making bad choices that endanger their phones and data. Because Apple never sends out alerts about viruses or malware on your iPhone, it should be the first clue of a scam. Even if it looks official, iPhone users do not get alerts from Apple about viruses or malware. If you do install a good antivirus program, that will be the only program notifying you that there is anything amiss with your iPhone. Understanding these scams can go a long way in keeping you calm and your phone safe.

Have you ever received what looks like an official alert from Apple notifying you about viruses on your iPhone? Have you received pop-ups and other alerts trying to get you to buy services or forward you to random websites? What steps did you take to figure out if it was legitimate or not? Let us know by writing us at Cyberguy.com/Contact.

CLICK HERE TO GET THE FOX NEWS APP

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.



Source link

Is just reading that sketchy scammer’s email dangerous or do I have to click on a link to get in trouble?

0


Are you worried about opening suspicious emails? You’re not alone. Many people are confused about the risks associated with spam and phishing emails.

That includes “Bill” from Groton, Connecticut, who wrote to us and asked, “Myself and my friends are unclear if we can get into trouble by clicking on a spam or hacker email…as long as we don’t open anything INSIDE the email … in other words … can we EVER get into trouble by simply reading any email ??? thank you if you can address this to your viewers … I think many are unclear about this.” 

That’s a great question, Bill. Now let’s dive into this topic and clear up some common misconceptions.

I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS

Enter by signing up for my free newsletter!

Is just reading that sketchy scammer’s email dangerous or do I have to click on a link to get in trouble?

Person checking emails on laptop (Kurt “CyberGuy” Knutsson)

Common misconceptions

Opening emails can instantly infect your device: One common myth is that simply opening an email can automatically infect your device with malware. In reality, modern email systems (such as Gmail, Outlook, etc.) generally prevent this from happening. The real danger comes from interacting with the content inside the email, such as clicking on malicious links or downloading harmful attachments.

Plain text emails are always safe: While emails in plain text format are generally safer than HTML-based emails, they can still pose a risk if they contain malicious links. Phishing attacks can appear in plain text emails, luring you to dangerous websites.

Emails from known contacts are always safe: Even if an email appears to come from someone you know, that doesn’t always mean it’s safe. Attackers can spoof email addresses or hack accounts, so always be cautious about unexpected or unusual messages from known contacts, especially those containing links or attachments.

Spam filters catch all malicious emails: Spam filters are highly effective but not perfect. Some sophisticated phishing and malicious emails can bypass these filters and land in your inbox. This is why it’s important to stay vigilant, even with emails that seem to have passed your email service’s security checks.

Previewing emails is always safe: Most modern email clients use a “preview” pane for quick reading. While the risk of malware through previews is significantly reduced in up-to-date systems, embedded trackers or other forms of data collection can still occur, confirming your activity to the spammer. Always disable automatic image loading or other active content features in your email client’s settings to minimize exposure.

Is just reading that sketchy scammer’s email dangerous or do I have to click on a link to get in trouble?

Person checking emails on laptop (Kurt “CyberGuy” Knutsson)

CONTROL SPAM – HOW TO CREATE A QUICK ALIAS EMAIL ADDRESS

What to watch out for

As mentioned already, generally, simply opening an email is not enough to cause harm. However, there are some important points to consider:

1) Embedded trackers: Some spam or phishing emails contain trackers that can notify the sender when the email is opened. This can confirm to the spammer that your email address is active, potentially leading to more spam.

2) Malicious links and attachments: The real danger lies in clicking on links or downloading attachments within the email. These can lead to malicious websites or download malware onto your device.

3) HTML emails: Emails that contain HTML content can sometimes execute scripts when opened. While modern email clients have protections against this, it’s still a potential risk.

4) Phishing attempts: Even if you don’t click on anything, phishing emails can be designed to look very convincing and may trick you into providing personal information if you respond.

Is just reading that sketchy scammer’s email dangerous or do I have to click on a link to get in trouble?

Person checking emails on laptop (Kurt “CyberGuy” Knutsson)

WHY AM I GETTING SPAM FROM MY OWN EMAIL ADDRESS AND HOW TO STOP IT

How to stay safe from suspicious emails

If you’re worried about receiving sketchy emails, there are several steps you can take to stay safe and reduce your risk of encountering malware or falling for scams. Follow these guidelines to protect yourself:

1) Avoid clicking links or downloading attachments: Never click on links or download files from emails you don’t trust. Scammers often use these tactics to direct you to malicious websites or install malware on your device. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2) Use a reputable email client: Choose an email provider that prioritizes security features like spam filtering and two-factor authentication to add an extra layer of protection for your account. Read more about secure and private email here.

3) Enable email filtering: Turn on spam filters to reduce the number of unsolicited or potentially dangerous emails reaching your inbox. This reduces your exposure to phishing attempts. Most email platforms these days automatically filter out what they assume to be “junk” into their own folder. If you notice the amount of spam getting through to your inbox increasing, you may want to consider a Spam Filter. There are free options for different email providers. For Gmail, try Mailwasher. For Outlook and Windows Mail, try Spam Bully, which costs an annual fee of $29.95.

4) Keep your software updated: Regularly update your email client and operating system to stay protected from the latest security vulnerabilities that hackers might exploit.

5) Consider data removal services: Use data removal services to ensure your personal information is less accessible to potential scammers. This reduces your risk of being targeted in the first place.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

HOW TO BLOCK THOSE UNWANTED AND ANNOYING SPAM EMAILS

Kurt’s key takeaways

While opening spam emails isn’t typically dangerous, it’s always better to err on the side of caution. Be vigilant, trust your instincts, and when in doubt, delete suspicious emails without opening them.

What’s the most convincing spam email you’ve ever received, and how did you recognize it was fake? Let us know by writing us at Cyberguy.com/Contact.

CLICK HERE TO GET THE FOX NEWS APP

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.



Source link

Maye Musk speaks about her health and nutrition habits

0

Elon Musk’s mother, Maye Musk, doesn’t pull any punches when it comes to nutrition.

During a Thursday appearance on Fox Business’ “The Bottom Line,” Musk was asked about “Make America Healthy Again,” the wellness initiative from former President Donald J. Trump and Robert F. Kennedy Jr., which focuses on choosing healthier foods.

The model and dietitian, 76, said she saw many diet-related health conditions while running her private practice for 40 years.

AS ELECTION NEARS, STRESS EATING NEEDS A SHARP EYE: ‘IT’S DESTRUCTIVE BEHAVIOR’

“The main issues were obesity, high cholesterol, hypertension and diabetes,” Musk said.

“Once they started changing their diets, their blood values looked better — and it just decreases the expense of treating these patients.”

During a recent appearance on “The Bottom Line” on Fox Business Network, Maye Musk was asked about the wellness initiative, “Make America Healthy Again,” which focuses on choosing healthier foods. (Getty Images)

Musk emphasized the importance of communities working together for better health.

ULTRA-PROCESSED FOODS MAKE UP 60% OF AMERICA’S DIET, WHO’S AT BIGGEST RISK

“We need to be able to teach people to eat better, and to have communities doing it together,” she said. 

“Because it’s hard when you have a community that loves to eat a lot of food and then you have to try to pull yourself back.”

Maye and Elon Musk

Maye Musk and Elon Musk attend The 2022 Met Gala at The Metropolitan Museum of Art on May 2, 2022, in New York City. (Jamie McCarthy/Getty Images)

As a proud grandmother of 14 grandchildren, Musk said she takes measures to provide healthy foods and snacks.    

“You’ll never see chips and cookies in my home,” she said, joking that “as my grandkids say, ‘I’ve got no food.’”

CLICK HERE TO SIGN UP FOR OUR HEALTH NEWSLETTER

Musk also alluded to the addictive nature of unhealthy foods.

Maye Musk modeling

Musk, a model and dietitian, said she takes measures to provide healthy foods and snacks for her grandchildren. (Getty Images)

“If you start on them, you can’t stop,” she said. 

“And so I’d rather not start with them.”

Instead of processed foods, Musk said she sticks with healthier choices like fruits, vegetables, yogurt, milk, cereal and whole-wheat bread.

CLICK HERE TO GET THE FOX NEWS APP  

Mus has previously credited her “flexitarian diet” for helping her look and feel her best.

The style of eating has been described as one that prioritizes plant-based foods while consuming meat in moderation. It is considered more “flexible” than vegetarianism.

mayemusk

“To me, to keep the body healthy and skin glowing, you have to eat well,” Musk previously told Fox News Digital. (Steven Ferdman/Getty Images)

“I eat very well,” Musk told Fox News Digital at the time.

“To me, to keep the body healthy and skin glowing, you have to eat well. That keeps me in good health.”

For more Health articles, visit www.foxnews.com/health

Musk has also shared her commitment to a daily active lifestyle, relying on simple workouts that can be done at home, including yoga, weights and walking her dogs.

Stephanie Nolasco of Fox News Digital contributed reporting.

Voting on Election Day: Here’s when polls close for all 50 states

0

Tens of millions of Americans are headed to the polls across the country Tuesday, but polling locations won’t remain open forever.

Here are the poll closing times for every state in the country.

6 PM EST

Kentucky: Partial poll closure. Some polling locations will remain open.

Indiana: Partial poll closure. Some polling locations will remain open.

HEAD HERE FOR FOX NEWS UPDATES ON THE 2024 ELECTION 

Fox News Power Rankings presidential map.

7 PM EST

Alabama: Partial poll closure. Some polling locations will remain open.

Florida: Partial poll closure. Some polling locations will remain open.

Georgia: Polls will fully close.

Kentucky: Polls will fully close.

Indiana: Polls will fully close.

New Hampshire: Partial poll closure. Some polling locations will remain open.

South Carolina: Polls will fully close.

Vermont: Polls will fully close.

Virginia: Polls will fully close.

HARRIS, TRUMP, HOLD ELECTION EVE DUELING RALLIES IN THE BIGGEST OF THE BATTLEGROUNDS

7:30 PM EST

New Hampshire: More partial closures.

North Carolina: Polls will fully close.

Ohio: Polls will fully close.

West Virginia: Polls will fully close.

A person arrives to cast their early ballot on the last day of early voting in Michigan at a polling station

A person arrives to cast their early ballot on the last day of early voting in Michigan at a polling station in Lansing, Michigan, U.S. November 3, 2024.  (REUTERS/Carlos Osorio)

8 PM EST

Alabama: Polls will fully close.

Connecticut: Polls will fully close.

Delaware: Polls will fully close.

Maine: Polls will fully close.

Florida: Polls will fully close.

Illinois: Polls will fully close.

Kansas: Partial poll closure. Some polling locations will remain open.

Maryland: Polls will fully close.

Massachusetts: Polls will fully close.

Michigan: Partial poll closure. Some polling locations will remain open.

Mississippi: Polls will fully close.

Missouri: Polls will fully close.

New Hampshire: Polls will fully close.

New Jersey: Polls will fully close.

North Dakota: Partial poll closure. Some polling locations will remain open.

Oklahoma: Polls will fully close.

Pennsylvania: Polls will fully close.

Rhode Island: Polls will fully close.

South Dakota: Partial poll closure. Some polling locations will remain open.

Tennessee: Polls will fully close.

Texas: Partial poll closure. Some polling locations will remain open.

Washington, DC: Polls will fully close.

CHECK OUT THE FOX NEWS ELECTION HUB

8:30 PM EST

Arkansas: Polls will fully close.

9 PM EST

Arizona: Polls will fully close.

Colorado: Polls will fully close.

Iowa: Polls will fully close.

Kansas: Polls will fully close.

Louisiana: Polls will fully close.

Michigan: Polls will fully close.

Minnesota: Polls will fully close.

Nebraska: Polls will fully close.

New Mexico: Polls will fully close.

New York: Polls will fully close.

North Dakota: Polls will fully close.

South Dakota: Polls will fully close.

Texas: Polls will fully close.

Wisconsin: Polls will fully close.

Wyoming: Polls will fully close.

Fox News Power Rankings on the US House

Fox News Power Rankings House table. (Fox News)

10 PM EST:

Idaho: Partial poll closure. Some polling locations will remain open.

Montana: Polls will fully close.

Nevada: Polls will fully close.

Oregon: Partial poll closure. Some polling locations will remain open.

Utah: Polls will fully close.

NOVEMBER SURPRISE: DISMAL JOBS REPORT HANDS TRUMP INSTANT AMMUNITION TO FIRE AT HARRIS

11 PM EST:

California: Polls will fully close.

Idaho: Polls will fully close.

Oregon: Polls will fully close.

Washington: Polls will fully close.

12 AM EST:

Alaska: Partial poll closure. Some polling locations will remain open.

Hawaii: Polls will fully close.

CLICK TO GET THE FOX NEWS APP

1 AM EST:

Alaska: Polls will fully close.

Is your Social Security number at risk? Signs someone might be stealing it

0


With most of your life attached to these nine numbers, your Social Security number (SSN) is incredibly important to keep safe. That’s why it is crucial to pay attention to signs that your SSN may have been compromised. While preventing the misuse of your SSN is paramount, there are action steps you can take if it does fall into the wrong hands.

I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS

Enter the giveaway by signing up for my free newsletter.

Is your Social Security number at risk? Signs someone might be stealing it

There are steps you can take if your Social Security number falls into the wrong hands. (Kurt “CyberGuy” Knutsson)

Top signs someone might be using your Social Security number

Are you concerned that your Social Security number may have gotten into the wrong hands? Check below to see if you are experiencing any of these signs:

1) Changes to your credit report and score

Americans are granted free credit reports every 12 months from the three major consumer reporting companies. Regularly culling through these reports can help you spot potential fraud, which might signal that your Social Security number has been compromised. Any hard inquiries you didn’t request on your credit report are a strong indicator that someone tried to open a credit card or another line of credit with your SSN.

2) Changes to your Social Security statement

While most people know they should check their credit report and scores, you can see your Social Security statement by creating an account on the official Social Security Administration website. Because only one account can be created per SSN, it is safer if you claim it so that no one else can by piecing together your personal information (along with your SSN) to claim it fraudulently. Make sure it is connected to a secure email account that you check frequently. This account also provides up-to-date data on earnings and benefit distributions so you can see if anything is “off.”

Is your Social Security number at risk? Signs someone might be stealing it

You can see your Social Security statement by creating an account on the official Social Security Administration website. (Kurt “CyberGuy” Knutsson)

BEWARE OF THIS SOCIAL SECURITY SCAM BY CROOKS TRYING TO TRICK YOU

3) Strange or new mailings or calls from debt collectors and junk mailers

While it might seem natural to toss a pile of “junk” mailers or ignore calls from random debt collectors or advertisers, it may be an indicator that someone has gotten a hold of your Social Security number and has begun opening accounts under your number. It’s important to make note of the patterns and follow up with these collectors should it become more and more apparent that your SSN might have been misused. Oftentimes, consumers start getting more credit offers when new credit cards are opened. Additionally, if you start receiving bills under someone else’s name at your address, it might be time to follow up with these notices.

4) New notices from the IRS or other governmental agencies

If you start receiving notices about your Social Security number being used to file someone else’s taxes or inappropriately use your health insurance, it is definitely a sign that someone may have compromised your SSN. While receiving a notice from the IRS or Medicare can feel scary, it is imperative that you reach out to the corresponding agency to notify them of the fraudulent activity so that you can stop further damage.

Is your Social Security number at risk? Signs someone might be stealing it

Beware of new notices from the IRS or other governmental agencies. (Kurt “CyberGuy” Knutsson)

Top ways to keep your Social Security number safe

1) Sign up for a Social Security account

Go to the official Social Security Administration website to create an account, if you haven’t already.

2) Hide/keep safe your Social Security number card

Put your Social Security number card in a very safe place, such as a safe, bank safe or a filing cabinet that can be locked. Because it is used so frequently, those nine digits are worth memorizing. If your wallet is lost or stolen, and you keep your SSN card in there, it will be messier than losing just money or your ID. Don’t carry your Social Security card in your wallet or purse.

3) Go online

Skip jotting down your Social Security number on in-person forms. When your SSN is jotted down on paper, it is hard to control how the information gets used or disposed of. If you can submit forms online, you can skip the risk of having your SSN getting into the wrong hands. If you mail in forms that denote your SSN, you risk having that piece of mail stolen or lost.

4) Opt out of inputting SSN

Even though your SSN is requested on some forms, it is not always necessary. If a future employer is requesting your SSN, double-check why they need it. They would most likely need it to run a background check, which you should know about anyway. Additionally, some establishments allow you to provide the last four digits of your SSN until you are finalizing a screening process, etc.

5) Combat child identity theft

Open accounts for your children’s Social Security numbers because you want to claim them for them early and be able to monitor any movement related to their SSN.

6) Secure documents

Some records that contain your Social Security number are important to keep on hand, such as income tax filings. If they are kept digitally, encrypt and or password-protect the document or folder, especially if it is uploaded to the cloud. Keep offline documents with SSNs in a safe or shred instead of throwing them away.

Remember you (usually) only get one SSN in a lifetime, it is important to safeguard that data with your “life.”

7) Remove your personal information from the internet

Removing your personal information from the internet, given the increasing privacy concerns about artificial intelligence, is essential. Data removal services can help protect your Social Security number by systematically erasing your details from websites, thus reducing the risk of identity theft. 

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services here.

8) IRS identity protection PIN (IP PIN)

To further protect your tax returns from identity theft, the IRS offers an identity protection PIN (IP PIN). This is a six-digit number that prevents someone else from filing a tax return using your Social Security number or individual taxpayer identification number. The IP PIN is known only to you and the IRS, adding an extra layer of security to your tax filings.

How to get an IP PIN

  • Online request: The fastest way to receive an IP PIN is to request one through your online account on the IRS website. If you don’t already have an account, you must register to validate your identity.
  • Alternative methods: If you can’t establish an online account, there are other methods, but they take longer. You can file an application or request in-person authentication.

Using your IP PIN

  • Enter the six-digit IP PIN when prompted by your tax software or provide it to your trusted tax professional when filing your return.
  • An IP PIN must be used on all federal tax returns during the year, including prior year returns.
  • Do not reveal your IP PIN to anyone except your tax professional when you are ready to sign and submit your return.

Important information

  • An IP PIN is valid for one calendar year, and a new one is generated each year.
  • If you lose your IP PIN, you can retrieve it online or have it reissued by calling the IRS.

By using an IP PIN, you can significantly reduce the risk of tax-related identity theft and ensure that your tax returns are processed smoothly and securely.

9) Recognizing and reporting a Social Security scam

If there is a problem with a person’s SSN or record, Social Security will typically mail a letter. You can learn more about recognizing Social Security-related scams, including how to report a scam quickly and easily online to Social Security’s Office of the Inspector General, by reading more at www.ssa.gov/scams.

Is your Social Security number at risk? Signs someone might be stealing it

Image of a lock on Social Security cards (Kurt “CyberGuy” Knutsson)

What to do if you think your Social Security number has been compromised?

If you noticed any of the signs listed above that indicate that your Social Security number may have been compromised, below are action steps you can take:

1) Reach out to the Social Security Administration immediately: Call them at 1-800-772-1213 to put an electronic block on your SSN.

2) Contact the three main credit bureaus to freeze your credit: This will prevent anyone, including hackers, from wreaking havoc on your credit. Make sure to report any errors on your credit reports with the credit agencies as well.

3) File a report with the local authorities as well as the Federal Trade Commission.

4) Submit a Social Security fraud report online or call the SSA’s Office of the Inspector General at 1-800-269-0271. They can help investigate any Social Security-related fraud.

5) Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any lossesSee my tips and best picks on how to protect yourself from identity theft.

HOW DATA BROKERS ARE FUELING ELDER FRAUD IN AMERICA

Kurt’s key takeaways

Because your Social Security number has such a significant impact on your life, it is important to pay attention to any signs that it has been compromised and misused. While it may feel overwhelming to see any of these signs that your SSN might be compromised, it’s important to know there are steps you can take to protect yourself moving forward. While paying regularly for fraud protection services may seem like an unnecessary expense when you’re not presently dealing with identity or credit issues, a fraud protection service subscription can help you focus on your present moment instead of worrying about what a criminal might do with your SSN. And if something does happen, you have people in your corner to help you through the process.

What additional steps do you think government agencies should take to enhance the security of Social Security numbers? Let us know by writing us at Cyberguy.com/Contact.

CLICK HERE TO GET THE FOX NEWS APP

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.



Source link

Iran-backed Iraqi militia targets Haifa, Israel with drones: state media

0

An Iran-backed Iraqi militia launched a drone attack in northern Israel early Tuesday, according to Iranian state media.

The Islamic Resistance in Iraq claimed several of its drones targeted Haifa, a port city in northern Israel, in response to Israeli military action in Gaza and Lebanon, the state media said.

Israel Defense Forces said it shot down one drone that entered Israeli airspace from the direction of Syria overnight, the Times of Israel reported.

The reported drone attack comes as the entire Middle East region teeters on the edge of being engulfed in a wider regional conflict over the ongoing conflicts between Israel and Iranian proxies Hamas and Hezbollah in Gaza and Lebanon.

US SOLDIER WOUNDED DURING GAZA PIER MISSION DIES MONTHS AFTER BEING INJURED

The Islamic Resistance in Iraq, which is backed by Iran, targeted Haifa, Israel, with drones early Tuesday, according to Iranian state media. (Michael Jacobs/Art in All of Us/Corbis via Getty Images, File)

Iran’s Supreme Leader Ayatollah Ali Khamenei on Saturday threatened Israel and the U.S. with “a crushing response” following Israeli strikes on Oct. 26 that targeted military bases and other locations and killed at least five people in the Islamic Republic.

Iran Supreme Leader Ali Khamenei

Iranian Supreme Leader Ayatollah Ali Khamenei on Saturday threatened the U.S. and Israel. (AP, File)

Early Sunday, U.S. Central Command confirmed that B-52 Stratofortress strategic bombers from Minot Air Force Base’s 5th Bomb Wing arrived in the Middle East region, an effort aimed at deterring Iran and its allies from attacking Israel.

B-52 Stratofortress strategic bomber

CENTCOM shared a photo of a B-52 Stratofortress strategic bomber in a post on social media confirming that the bombers arrived in the Middle East region early Sunday. (U.S. Central Command (CENTCOM))

IRAN THREATENS TO USE MORE POWERFUL WARHEADS AGAINST ISRAEL IN NEXT ATTACK: REPORT

Despite growing pressure from the U.S. and wider international community on Israel for a cease-fire in Gaza and Lebanon, Israel has intensified strikes against Hezbollah in Lebanon and continues to wage a massive offensive in northern Gaza.

CLICK TO GET THE FOX NEWS APP

Israeli strikes late Monday killed at least 30 people in Gaza, according to Palestinian health officials.

The Associated Press contributed to this report.

Robot dog is making waves with its underwater skills

0


The world of robotics has taken an exciting plunge with the latest iteration of MAB Robotics’ Honey Badger quadruped robot. This innovative machine is not just another land-dwelling robot dog; it is now making waves with its ability to walk underwater.

I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS

Enter the giveaway by signing up for my free newsletter.

Robot dog is making waves with its underwater skills

Honey Badger 4.0 quadruped robot underwater (MAB Robotics) (Kurt “CyberGuy” Knutsson)

From land to sea: The Honey Badger’s evolution

MAB Robotics, a Polish company founded in 2019, has been refining its Honey Badger robot since its inception. The fourth generation, known as Honey Badger 4.0, has added a surprising new skill to its repertoire: underwater locomotion.

Robot dog is making waves with its underwater skills

Honey Badger 4.0 quadruped robot underwater (MAB Robotics) (Kurt “CyberGuy” Knutsson)

REMEMBER THAT ROBOT DOG? IT’S BACK WITH A ‘WHEELY’ COOL UPGRADE

Diving into the details

The Honey Badger 4.0 measures about 23.6 inches in length and stands between 9.8 and 19.6 inches high, weighing in at approximately 26.5 pounds. This compact yet capable machine boasts a payload capacity of around 4.4 pounds. It is equipped with RGB and thermal cameras, lidar and gas sensors, allowing it to navigate various environments effectively. The robot can operate for up to two hours on its built-in lithium-ion battery and can be controlled remotely via 5G or a fiber-optic cable.

Robot dog is making waves with its underwater skills

Honey Badger 4.0 quadruped robot underwater (MAB Robotics) (Kurt “CyberGuy” Knutsson)

Making waves in robotics

What truly sets the Honey Badger apart is its amphibious capability. Recent footage shows the robot confidently walking along the bottom of a swimming pool. While legs may not be the most efficient means of underwater propulsion, this versatility opens up new possibilities for the robot’s applications.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

Potential applications

The Honey Badger’s amphibious nature makes it ideal for a variety of tasks. It could be invaluable in search and rescue operations in disaster areas, as well as for inspection and maintenance in flooded environments. The robot is also well-suited for industrial inspections across diverse settings and can contribute to research and development in robotics and locomotion.

Robot dog is making waves with its underwater skills

A group of Honey Badger 4.0 quadruped robots (MAB Robotics) (Kurt “CyberGuy” Knutsson)

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Kurt’s key takeaways

The Honey Badger 4.0’s ability to operate both on land and underwater showcases the potential for versatile and adaptable robots in various fields. As MAB Robotics continues to refine and improve their design, we can expect to see even more impressive capabilities from this tough little robot dog. The future of robotics is looking increasingly amphibious, and the Honey Badger is leading the pack.

As we develop more advanced robots like the Honey Badger 4.0, what concerns do you think we should keep in mind for our communities? Let us know by writing us at Cyberguy.com/Contact.

CLICK HERE TO GET THE FOX NEWS APP

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.



Source link

Melania Trump, with a new book out, reveals her mental health secrets

0

Melania Trump, former first lady, is the author of the current New York Times No. 1 bestseller, “Melania.” 

The personal memoir gives readers a rare look inside her life, starting with the moment she set foot on American soil as a 26-year-old and on through the assassination attempt on her husband, former President Donald J. Trump, this past summer in Butler, Pennsylvania. 

With the eyes of the nation this week focused on the outcome of Election Day 2024, what’s clear in her book is how Melania Trump protects her own mental and psychological health no matter the events she’s navigating.

IVANKA TRUMP SHARES THE FITNESS ROUTINE THAT HAS ‘TRANSFORMED’ HER BODY: ‘SAFE AND STEADY’ 

Whether she’s enjoying personal success or dealing with political chaos, whether she’s celebrating family triumphs or weathering times of national turbulence, she figured out long ago how to stay calm, even-keeled and focused on what matters most, she reveals.

“Life’s circumstances shape you in many ways, often entirely beyond your control — your birth, parental influences and the world in which you grow up,” she writes.

“Melania,” a personal memoir by Melania Trump, is a No. 1 New York Times bestseller. In her book, she shares that it’s essential “to be grounded in one’s own identity and values.” (Leon Neal/Getty Images; Amazon)

“As an adult, there comes a moment when you become solely responsible for the life you lead. You must take charge, embrace that responsibility, and become the architect of your own future.”

For her, she says, that moment was coming to America and New York City as a young woman full of “youthful confidence.”

Self-care is ‘essential’

That confidence, she indicates, had roots in her upbringing.

“The value of self-care remains a guiding principle in my life.”

Her mother, Amalija Knavs, born in 1945, taught her that “self-care was essential not only to a person’s well-being, but also to being able to effectively care for others,” she writes.

Her mother “instilled this conviction in me from an early age, teaching me the importance of attending to one’s appearance before venturing into the world.”

"Melania" by Melania Trump book

“Melania” by Melania Trump is published by Skyhorse Publishing.  (Fox News Digital)

Trump says her mother often told her, “If I don’t take care of myself, how would I know how to care for others?”

“The value of self-care,” she says, “remains a guiding principle in my life.”

‘Own unique journey’

Melania Trump says that even as a child, she embraced a sense of “organization and orderliness” — taking a “methodical approach” to whatever projects she was working on or involved with. 

GRATEFUL CHILDREN MAKE PARENTS HAPPIER AND LESS STRESSED, NEW STUDY SUGGESTS

Over time, she writes, “I learned that regardless of the circumstances or the company I found myself in, the most crucial relationship I could cultivate was the one I had with myself.” 

It’s essential, she shares, “to be grounded in one’s own identity and values. I embrace my individuality and confidently walk my own path.”

Melania Trump

Melania Trump on the set of “Fox & Friends” recently in New York City.  (Fox News)

This strength of character carried her through a time when she felt “targeted” for her appearance, she says, and was “perceived as being ‘too’ tall and ‘too’ skinny.”

She acknowledges that it felt like bullying — though it wasn’t described that way decades ago.

Today, Trump writes, “I have come to understand that genuine happiness is not found in material possessions, but rather in the depths of self-awareness and self-acceptance.”

Other lessons in mental strength

Melania Trump shares a number of other affirmations and beliefs in her book.

10 TIPS TO LIVE TO BE 100: ‘FAR MORE THAN WISHFUL THINKING,’ SAY LONGEVITY EXPERTS 

“Sometimes, in order to succeed,” she writes, “you must be willing to take risks and make tough decisions.”

She also says, “I value autonomy and believe in allowing people to live according to their wishes.”

Melania Trump

Melania Trump is shown arriving on the fourth day of the Republican National Convention at the Fiserv Forum on July 18, 2024, in Milwaukee, Wisconsin. (Leon Neal/Getty Images)

She writes that “in any relationship, whether as a mother to my son, a wife to my husband or a stepmother, I firmly believe in the principle, ‘Don’t control, communicate!'”

She also writes, “We seem to be living in an age where much of our lives is presented for public consumption on social media.”

CLICK HERE TO SIGN UP FOR OUR HEALTH NEWSLETTER

However, the author adds, “some moments in life are meant to be private and do not need to be shared with the world.”

“Each story shaped me into who I am today.”

She also says, “I have always believed it is critical for people to take care of themselves first … We are all entitled to maintain a gratifying and dignified existence.”

For more Health articles, visit www.foxnews.com/health

Having already served a term as first lady, she notes that she’s aware that the role “transcends formal duties. [The] mission [of first lady] turns to fostering human connections, showing empathy and offering support for those in need.” 

Melania Trump

Melania Trump attends a meeting of the President’s Task Force on Protecting Native American Children in the Indian Health System in the State Dining Room of the White House on July 23, 2020, in Washington, DC.  (Drew Angerer/Getty Images)

Her time in the White House, she says, has shaped her perspective and reinforced her “dedication to serve others.”

“Writing my memoir has been an amazing journey filled with emotional highs and lows,” Trump previously told Fox News Digital about her book. “Each story shaped me into who I am today.” 

CLICK HERE TO GET THE FOX NEWS APP

She also told Fox News Digital that “although daunting at times, the process has been incredibly rewarding, reminding me of my strength and the beauty of sharing my truth.” 

Brooke Singman of Fox News Digital contributed reporting.

Numera Global Embarks on Strategic ESG Partnership to Revolutionize Real-Time Data Integration

0
20241104 222307644
Numera Global Embarks on Strategic ESG Partnership to Revolutionize Real-Time Data Integration 56

New York City, Nov 4th, 2024 – In a forward-looking move that underscores its leadership in sustainable finance and technological innovation, Numera Global has revealed plans to forge a strategic alliance with top ESG-focused technology firms by early 2025. This partnership aims to enrich the capabilities of Numera’s Heimdall Algorithm, an advanced AI system renowned for driving impactful, precision-based investment decisions by leveraging extensive environmental and market data.

ESG—an acronym for Environmental, Social, and Governance—represents the pillars that measure the ethical and sustainable practices of companies. Integrating these factors into investment strategies the company ensures that financial endeavors are aligned not just with profitability, but with positive societal impact. For Numera Global, this partnership is a natural extension of its commitment to responsible investing that fuels long-term value while promoting transparency.

“The future of investment relies on our ability to interpret real-time ESG data seamlessly,” noted Simon Arseni, CEO of Numera Global. “Collaborating with leading technology partners will keep our Heimdall Algorithm at the cutting edge, ensuring that we remain proactive in aligning economic initiatives with environmental and social stewardship.”

Set to leverage continuous data streams through secure API integrations and blockchain-based data feeds, this partnership will equip the Heimdall Algorithm with the power to process both structured reports and unstructured data sources. This influx will allow the algorithm to dynamically adapt strategies to current trends, including regulatory changes and environmental shifts, and target investment opportunities that align with stringent ESG benchmarks.

Numera’s pursuit of real-time adaptability showcases its broader mission: integrating state-of-the art technology to redefine ethical investing. This step will bolster Numera Global’s capacity to identify promising ventures, enhance risk management, and champion a model of investment that prioritizes clarity and sustainability. “Our aim is to ensure that our strategies reflect not just the present, but anticipate the future needs of sustainable finance,” Arseni added.

With this enhanced data integration, Numera Global is set to reinforce its position as a trailblazer in combining AI, blockchain, and sustainability. This effort aligns with the company’s vision to transform complex datasets into actionable insights, paving the way for transparent growth that benefits both investors and global communities.

For complete information, visit:  https://www.numera.cc/

Media Contact:

Numera Global
Attn: Lara Altmann
hello@numera.cc