3.9 C
New York
Tuesday, February 17, 2026
Home Blog Page 108

Federal judge issues ruling blocking expansion of Florida’s ‘Alligator Alcatraz’

0

NEWYou can now listen to Fox News articles!

A federal judge issued a preliminary injunction on Thursday blocking Florida from further expanding the “Alligator Alcatraz” immigration detention center built in the middle of the Florida Everglades.

U.S. District Judge Kathleen Williams’ injunction formalized the temporary halt she had ordered two weeks ago.

Witnesses continued to testify over multiple days in a hearing to determine whether construction of the facility should stop until the case is decided.

Advocates have argued that the expansion of the facility violated environmental laws.

LAWSUITS THREATEN TO UPEND ALLIGATOR ALCATRAZ OPERATIONS

In an aerial view from a helicopter, the migrant detention center, dubbed “Alligator Alcatraz,” is seen located at the site of the Dade-Collier Training and Transition Airport on July 4, 2025 in Ochopee, Florida. (Alon Skuy/Getty Images)

Environmental groups and the Miccosukee Tribe said that further construction and operations at the facility should be stopped until state and federal officials complied with environmental laws. Their lawsuit argued that the detention center threatens environmentally sensitive wetlands that have protected plants and animals and that it would reverse billions of dollars in environmental restoration.

Attorneys for the state and federal governments claimed that the construction and operation of the facility was under the state of Florida despite its use for holding federal detainees, meaning the federal environmental law would not apply.

The judge found that the detention center was at least a joint partnership between the state and federal government.

Williams said she expected the number of detainees in the facility to dip within 60 days through transfers to other facilities, and that fencing, lighting and generators should be removed. She said the state and federal defendants cannot bring anyone other than current detainees at the facility onto the property.

The order does not halt modifications or repairs to existing facilities, which the judge said are “solely for the purpose of increasing safety or mitigating environmental or other risks at the site.”

FLORIDA TO OPEN ‘DEPORTATION DEPOT’ AT SHUTTERED PRISON WEEKS AFTER LAUNCHING ‘ALLIGATOR ALCATRAZ’ FACILITY

Alligator Alcatraz aerial view

An aerial view of a migrant detention center, dubbed “Alligator Alcatraz,” is seen located at the site of the Dade-Collier Training and Transition Airport in Ochopee, Florida on July 7, 2025.  (Chandan Khanna/AFP via Getty Images)

The preliminary injunction includes “those who are in active concert or participation with” the state of Florida or federal defendants or their officers, agents or employees, she wrote.

State officials failed to sufficiently explain why the facility needed to be in the middle of the Florida Everglades.

“What is apparent, however, is that in their haste to construct the detention camp, the State did not consider alternative locations,” Williams said.

Florida officials criticized the ruling on Thursday.

“Just this week, a judge in the same district as Judge Williams refused to hear a case because the Southern District of Florida was the improper venue for suits about Alligator Alcatraz,” Jeremy Redfern, a spokesperson for the Florida attorney general’s office, said in a statement to Fox News. “Once again, she oversteps her authority, and we will appeal this unlawful decision.”

Florida Gov. Ron DeSantis said the “fix was in” and “we knew this judge was not giving us a fair shake.”

“We totally expected an adverse ruling,” he told Fox News. “And we also knew we were going to immediately appeal and get that decision stayed. So we will ultimately be successful in this. It’s not going to stop our resolve. We’re going to continue to do what we need to do to help the Trump administration remove illegal aliens from our country. You know, that’s the mandate that they have. So we anticipated this, but I don’t think it’s going to be insurmountable in the end.”

Donald Trump and Kristi Noem tour Alligator Alcatraz

US President Donald Trump tours a migrant detention center, dubbed “Alligator Alcatraz,” located at the site of the Dade-Collier Training and Transition Airport in Ochopee, Florida on July 1, 2025.  (ANDREW CABALLERO-REYNOLDS/AFP via Getty Images)

President Donald Trump toured the facility last month and suggested it could be used as a model for future facilities across the country to support his efforts to detain and deport migrants.

The detention center was quickly built about two months ago at a single-runway training airport in the middle of the Everglades. It now holds nearly 500 detainees but was designed to eventually hold up to 3,000 in temporary tents.

The facility’s large white tents feature rows of bunkbeds surrounded by chain-link cages. Detainees complained of worms in the food, toilets not flushing, floors flooded with fecal waste and insects everywhere. The air conditioners also sometimes abruptly shut off in the sweltering heat.

CLICK HERE TO GET THE FOX NEWS APP

Detainees also reportedly go days without showers or receiving their prescription medicine, and they are only permitted to speak to lawyers and loved ones by phone.

Fox News’ Danamarie McNicholl-Carter and The Associated Press contributed to this report.

3I/ATLAS comet might generate light through nuclear power, physicist says

0


NEWYou can now listen to Fox News articles!

A Harvard physicist who sounded the alarm earlier this month about a rare interstellar object passing through our solar system — and suggested it might be more than a comet — now says it could even be a nuclear-powered spaceship.

The object, dubbed 3I/ATLAS, was first detected in early July by an Asteroid Terrestrial-impact Last Alert System (ATLAS) telescope in Chile. It marks only the third time an interstellar object has been observed entering our solar system, according to NASA.

While NASA classified the object as a comet, Dr. Avi Loeb pointed out that an image showed an unexpected glow in front of the object rather than trailing behind it — something he called “quite surprising.”

In a blog post this week, Loeb wrote that the object’s brightness profile cannot be explained by sunlight reflection or standard cometary outgassing.

METEORITE FRAGMENT THAT SLAMMED THROUGH HOMEOWNER’S ROOF IS BILLIONS OF YEARS OLD, PREDATES EARTH: PROFESSOR

Astronomers discovered an unusual object entered our solar system earlier this month, but a Harvard physicist is sounding alarms that the object could be an alien probe.

Astronomers discovered an unusual object entering our solar system earlier this month. (NASA, ESA, David Jewitt (UCLA); Image Processing: Joseph DePasquale (STScI))

Instead, he suggested, 3I/ATLAS might be generating its own light — possibly from nuclear energy.

“Alternatively, 3I/ATLAS could be a spacecraft powered by nuclear energy, and the dust emitted from its frontal surface might be from dirt that accumulated on its surface during its interstellar travel,” Loeb wrote. “This cannot be ruled out, but requires better evidence to be viable.”

Loeb dismissed other natural power sources. A primordial black hole, he said, would generate only about 20 nanowatts — far too weak. A radioactive fragment from a supernova was highly unlikely given its rarity, and frictional heating from interstellar gas and dust was ruled out by momentum and density constraints.

RARE JUPITER-SIZED PLANET DISCOVERED 3,200 LIGHT-YEARS AWAY USING EINSTEIN’S SPACE-TIME WARPING METHOD

Astronomers discovered an unusual object entered our solar system earlier this month, but a Harvard physicist is sounding alarms that the object could be an alien probe.

A Harvard physicist is sounding alarms that the object could be an alien probe. (Avi Loeb)

That leaves the simplest explanation: a central, compact, high-power source. The most natural way to achieve the gigawatt-level luminosity observed, Loeb noted, would be nuclear power.

Still, Loeb does not claim the object is nuclear-powered. He stresses there is only one possible interpretation if natural models fail — and proving it would require more evidence.

3I/ATLAS is estimated at about 20 kilometers across, larger than Manhattan.

Loeb has also raised questions about its unusual trajectory.

“If you imagine objects entering the solar system from random directions, just one in 500 of them would be aligned so well with the orbits of the planets,” Loeb told Fox News Digital earlier this month.

SCIENTISTS DISCOVER ANCIENT RADIO SIGNALS FROM DISTANT GALAXY CLUSTER

Astronomers discovered an unusual object entered our solar system earlier this month, but a Harvard physicist is sounding alarms that the object could be an alien probe.

The interstellar object, which comes from the center of the Milky Way, is also expected to pass near Mars, Venus, and Jupiter. (ATLAS/University of Hawaii/NASA)

The interstellar object, which comes from the center of the Milky Way, is also expected to pass near Mars, Venus, and Jupiter — another improbable coincidence, he said.

“It also comes close to each of them, with a probability of one in 20,000,” he said.

According to NASA, 3I/ATLAS will reach its closest point to the sun — about 130 million miles away — on October 30.

CLICK HERE TO GET THE FOX NEWS APP

“If it turns out to be technological, it would obviously have a big impact on the future of humanity,” Loeb said. “We have to decide how to respond to that.”

Fox News Digital’s Sophia Compton contributed to this report.



Source link

California resident tests positive for plague after likely infected flea bite

0

NEWYou can now listen to Fox News articles!

A California resident has tested positive for the plague after likely being bitten by an infected flea on a Lake Tahoe camping trip, health officials confirmed.

The El Dorado County Health and Human Services Agency said Tuesday the individual is recovering at home under medical supervision. 

The California Department of Public Health (CDPH) notified local officials of the case, prompting an investigation.

“It’s believed that the person may have been bitten by an infected flea while camping in the South Lake Tahoe area. Health officials are investigating the situation,” the county said in a news release.

ARIZONA RESIDENT DIES OF PNEUMONIC PLAGUE, THE FIRST DEADLY CASE IN AREA IN NEARLY 20 YEARS

Plague bacteria (Yersinia pestis) cause bubonic plague and are carried in the pathogen of rats and there are still many regions where the disease occurs. (istock)

Plague bacteria are most commonly spread by fleas that have fed on infected squirrels, chipmunks, or other wild rodents. 

From 2021 through 2024, El Dorado County identified 41 rodents showing evidence of plague exposure. In 2025 so far, four more plague-positive rodents have been found in the Tahoe Basin.

Human plague infections are extremely rare in the U.S., averaging about seven cases per year, according to the Centers for Disease Control and Prevention (CDC). Most occur in the western states, particularly northern New Mexico and Arizona.

DOCTORS REVEAL KEY SIGNS OF LYME DISEASE AS TICK SEASON INTENSIFIES ACROSS US

Lake Tahoe

A Lake Tahoe camper tested positive for the Plague, likely from an infected flea bite. (istock)

Symptoms often begin with the bubonic form of the plague, which can cause health issues including fever, headache, chills, weakness, and swollen lymph nodes. Without treatment, it can progress to septicemic plague, which can cause stomach pain and bleeding into the skin.

“Plague is naturally present in many parts of California, including higher-elevation areas of El Dorado County,” said Kyle Fliflet, the county’s acting public health director.

 “It’s important that individuals take precautions for themselves and their pets when outdoors, especially while walking, hiking, or camping in areas where wild rodents are present.”

RARE TICK-BORNE VIRUS CAUSING NEUROLOGICAL SYMPTOMS DIAGNOSED IN NORTHEASTERN STATE

Gray rat

Plague bacteria are most often transmitted by the bites of fleas from rodents and other wild animals. (iStock)

The most recent human case in El Dorado County before this one was reported in 2020, also thought to have come from the South Lake Tahoe area.

In 2015, two people contracted the plague after exposure to infected rodents or fleas in Yosemite National Park. Both recovered after treatment. Those were the first human cases in California since 2006, officials said.

CLICK HERE TO GET THE FOX NEWS APP

Health authorities continue to investigate the latest case in Lake Tahoe. 

“The person is fine and under medical care and the investigation is underway,” El Dorado Deputy Chief Administrator, Carla Hass, told Fox News Digital.

Dubai’s Woohoo restaurant uses AI Chef Aiman to design futuristic menu

0


NEWYou can now listen to Fox News articles!

In the heart of Dubai, just steps from the Burj Khalifa, the future of food is taking shape. A new restaurant called Woohoo plans to serve more than just dinner. 

It offers a futuristic food experience designed in part by artificial intelligence. 

Opening in September, Woohoo calls itself “dining in the future.” But what does that actually mean?

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

FOX NEWS AI NEWSLETTER: MIKE ROWE’S PREDICTION ON AMERICAN JOBS

ai restaurant 1

The Woohoo restaurant driven by AI in Dubai (Woohoo)

How Chef Aiman powers Dubai’s AI-driven restaurant menu

At Woohoo, your waiter might be human, but the creative mind behind your dish is not. That job belongs to Chef Aiman, a large language model trained on food science, global culinary traditions and molecular gastronomy. The name Aiman blends “AI” and “man,” reflecting the partnership between technology and human creativity. Aiman doesn’t taste or smell. Instead, it analyzes ingredients by texture, acidity, umami and dozens of other variables to invent dishes that push boundaries.

Woohoo offers rotating menus that fuse global cuisines, designed entirely by this AI chef. Expect bold flavors, artistic presentation and creative combinations you won’t find anywhere else. Each visit brings something new, exciting and full of surprises. However, Woohoo goes far beyond the plate.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Unlike a typical restaurant, it uses artificial intelligence to shape your entire dining journey. From the lighting and sound to the pace of service and flow of the meal, every detail is curated by AI. The goal is to create a multi-sensory experience that feels futuristic but still personal. While the dishes challenge tradition, the atmosphere adapts to create a mood that feels just right, every time. Then comes the human touch.

ai restaurant 2

Interior of the Woohoo restaurant driven by AI in Dubai  (Woohoo)

Why human chefs still play a key role at Woohoo

While Chef Aiman designs the initial recipes, Dubai-based chef Reif Othman and his kitchen team take charge of refining each dish. They taste, adjust and perfect the AI-created ideas to ensure the flavors and presentation meet high culinary standards. This collaboration blends the precision and innovation of AI with the experience and intuition of skilled chefs. Rather than replacing human creativity, Chef Aiman enhances it by opening new possibilities and inspiring chefs to explore unique flavor combinations. 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

How Woohoo uses AI to cut kitchen waste and boost sustainability

Chef Aiman is trained to reuse ingredients many kitchens throw away, like fat and trimmings. These otherwise discarded components become key ingredients in entirely new dishes. Ahmet Oytun Cakir, one of the founders and the CEO of Gastronaut, says this feature could help reduce kitchen waste worldwide. Eventually, the hope is to license Chef Aiman to restaurants around the globe.

Ai REstaurant 3

nterior of the Woohoo restaurant driven by AI in Dubai (Woohoo)

What this means for you

If you’re planning a trip to Dubai, Woohoo offers more than a photo-worthy meal. It’s a chance to taste what happens when artificial intelligence and culinary artistry work hand in hand. Beyond the dining room, this experiment has bigger implications. AI could help chefs everywhere become more sustainable, more creative and more efficient without losing the human touch that makes food special.

CLICK HERE TO GET THE FOX NEWS APP

Kurt’s key takeaways

Woohoo isn’t just another flashy concept. It’s part of a bigger shift in how we think about food, tech and creativity. AI isn’t taking over the kitchen. It’s teaming up with real chefs to spark new ideas and reduce waste. Whether you’re a foodie looking for something new, a tech geek chasing the next innovation or just curious about what’s next, Woohoo gives you a front-row seat to the future of dining. And, yes, you can taste it.

Would you trust an AI to design your next fine dining experience, or should some things stay purely human? Let us know by writing to us at Cyberguy.com/Contact

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

Google Gemini hacked by Mozilla researchers to hide phishing prompts

0


NEWYou can now listen to Fox News articles!

Artificial intelligence is everywhere these days — in your phone, your car, even your washing machine. I saw one just the other day featuring built-in AI. And while that might sound a little over the top, there’s no denying that artificial intelligence has made life easier in a lot of ways.

From boosting productivity to unlocking new creative tools, it’s changing how we work and live. The most common version you’ve probably encountered? Generative AI, think chatbots like ChatGPT. But as helpful as this tech can be, it’s not without its problems.

If you’ve used Google’s Workspace suite, you may have noticed the company’s AI model, Gemini, integrated across apps like Docs, Sheets and Gmail. Now, researchers say attackers can manipulate Gemini-generated email summaries to sneak in hidden phishing prompts.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER  

HOW AI IS NOW HELPING HACKERS FOOL YOUR BROWSER’S SECURITY TOOLS

AI email 1

Google Gemini app on a mobile device  (Kurt “CyberGuy” Knutsson)

How Gemini summaries can be hacked

Researchers at Mozilla’s 0Din have discovered a vulnerability in Google’s Gemini for Workspace that allows attackers to inject hidden instructions into email summaries. The issue, demonstrated by Marco Figueroa, shows how generative AI tools can be misled through indirect prompt injection. This technique embeds invisible commands inside the body of an email. When Gemini summarizes the message, it interprets and acts on those hidden prompts.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

The attack does not rely on suspicious links or attachments. Instead, it uses a combination of HTML and CSS to conceal the prompt by setting the font size to zero and the color to white. These commands remain invisible in Gmail’s standard view but are still accessible to Gemini. Once you request a summary, the AI can be tricked into presenting fake security alerts or urgent instructions that appear to come from Google.

In a proof of concept, Gemini falsely warned a user that a Gmail password had been compromised and included a fake support phone number. Since Gemini summaries are integrated into Google Workspace, you are more likely to trust the information, making this tactic especially effective.

google sign

A Google sign on a building   (Kurt “CyberGuy” Knutsson)

What is Google doing about the flaw?

While Google has implemented defenses against prompt injection since 2024, this method appears to bypass current protections. The company told CyberGuy it is actively deploying updated safeguards.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

In a statement, a Google spokesperson said, “Defending against attacks impacting the industry, like prompt injections, has been a continued priority for us, and we’ve deployed numerous strong defenses to keep users safe, including safeguards to prevent harmful or misleading responses. We are constantly hardening our already robust defenses through red-teaming exercises that train our models to defend against these types of adversarial attacks.”

Google also confirmed that it has not observed active exploitation of this specific technique.

google gemini

Google Gemini app on the home screen of a mobile device    (Kurt “CyberGuy” Knutsson)

6 ways you can stay safe from AI phishing scams

So, how can you protect yourself from phishing scams that exploit AI tools like Gemini? Here are six essential steps you can take right now to stay safe:

1. Do not blindly trust AI-generated content

Just because a summary appears in Gmail or Docs does not mean it is automatically safe. Treat AI-generated suggestions, alerts or links with the same caution you would any unsolicited message. Always verify critical information, such as security alerts or phone numbers, through official sources.

2. Avoid using summary features for suspicious emails

If an email seems unusual, especially if it is unexpected or from someone you do not recognize, avoid using the AI summary feature. Instead, read the full email as it was originally written. This lowers the chance of falling for misleading summaries.

3. Beware of phishing emails and messages

Watch for emails or messages that create a sense of urgency, ask you to verify account details or provide unexpected links or contact information, even if they appear trustworthy or come from familiar sources. Attackers can use AI to craft realistic-looking alerts or requests for sensitive information, sometimes concealed within automatically generated summaries. So, always pause and scrutinize suspicious prompts before responding. 

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com/LockUpYourTech 

4. Keep your apps and extensions updated

Ensure that Google Workspace and your browser are always running the latest version. Google regularly releases security updates that help prevent newer types of attacks. Also, avoid using unofficial extensions that have access to your Gmail or Docs.

5. Invest in a data removal service

AI-driven scams like the Gemini summary attack don’t happen in a vacuum. They often begin with stolen personal information. That data might come from past breaches, public records or details you’ve unknowingly shared online. A data removal service can help by continuously scanning and requesting the removal of your information from data broker sites. While no service can wipe everything, reducing your digital footprint makes it harder for attackers to personalize phishing attempts or link you to known breach data. Think of it as one more layer of protection in a world where AI makes targeted scams even easier.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

6. Disable AI summaries for now if you’re concerned

If you’re worried about falling for an AI-generated phishing attempt, consider disabling Gemini summaries in Gmail until Google rolls out stronger protections. You can still read full emails the traditional way, which can lower your risk of being misled by manipulated summaries.

How to disable Gemini features on desktop

  • Open Gmail on desktop.
  • Click the Settings gear icon in the upper right.
  • Click See all settings.
  • Scroll to “Google Workspace smart features” and click Manage Workspace smart feature settings.
  • Disable the toggle for Smart features in Google Workspace.
  • Then, click Save.
  • Note: This will turn off Gemini summaries as well as other smart features.

How to disable Gemini features on mobile

On iPhone:

If you use the Gemini mobile app specifically:

  • Open the Gemini app.
  • Tap your Profile picture.
  • Tap Gemini Apps Activity.
  • At the top, tap Turn off.

On Android:

Settings may vary depending on your Android phone’s manufacturer

  • Open the Gmail app on your Android.
  • Tap the Menu icon (three horizontal lines) in the upper left corner.
  • Scroll down and tap Settings.
  • Select the relevant email account.
  • Scroll down and tap Google Workspace smart features and uncheck the box to turn them off.

Key caveats to know:

  • Disabling Smart Features may remove other convenient functionalities, such as predictive text and automatic appointment detection.
  • The Gemini icon or summary buttons may still appear, even after disabling these features. Some users report having to physically hide them via browser tools.

There is no centralized single “off switch” to completely remove all Gemini AI references everywhere, but these steps significantly reduce the feature’s presence and risk.

CLICK HERE TO GET THE FOX NEWS APP

Kurt’s key takeaway

This vulnerability highlights how phishing tactics are evolving alongside AI. Instead of relying on visible red flags like misspelled URLs or suspicious attachments, attackers are now targeting trusted systems that help users filter and interpret messages. As AI becomes more deeply embedded in productivity tools, prompt injection could emerge as a subtle but powerful vector for social engineering, hiding malicious intent in the very tools designed to simplify communication.

How comfortable are you letting AI summarize or filter your emails, and where do you draw the line? Let us know by writing to us at Cyberguy.com/Contact

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
 

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

Scientists recycle cigarette butts into stronger asphalt for roads

0


NEWYou can now listen to Fox News articles!

Cigarette butts are the most littered item on the planet. People toss out an estimated 4.5 trillion cigarette butts each year, and that number may double by the end of 2025 as e-cigarette use grows. These small, toxic waste items pollute city streets, beaches and waterways. They also take years to break down.

But that may be starting to change. Scientists have developed a way to recycle cigarette butts into asphalt, creating roads that are both stronger and more sustainable. Research teams from the University of Granada in Spain and the University of Bologna in Italy have studied the process closely, highlighting its potential to improve road performance while cutting down on waste.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.

OOH LA LAW: FRANCE SNUFFING OUT SMOKING IN PARKS, BEACHES, MORE

cigarette butt recycling 1

A littered cigarette butt on an asphalt road   (Kurt “CyberGuy” Knutsson)

Why cigarette butts make a good asphalt additive

Modern road construction often relies on additives to improve the strength and flexibility of asphalt. Some road-building materials already use cellulose fibers like those found in cigarette filters. That sparked the idea to take used butts, clean them up and put them to work.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

E-cigarette filters are especially promising. They are longer and packed with fibers like cellulose and polylactic acid (PLA) fibers, making them ideal for reinforcing asphalt. 

cigarette butt recycling 2

Person holding cigarette butt in hand    (Kurt “CyberGuy” Knutsson)

How cigarette butts are recycled into road material

The recycling process involves several steps:

1. Collecting and sorting: Filters from traditional and e-cigarettes go through a collection and cleaning process. Ash and residue are removed, leaving behind usable fiber material.

2. Shredding and mixing: Machines shred the cleaned fibers and combine them with synthetic hydrocarbon wax, which serves as a binder.

3. Pellet formation: The blended material is pressed, heated and cut into small pellets that can be easily stored and transported.

4. Asphalt integration: These pellets are added to reclaimed asphalt and bitumen. During heating, the pellets melt and release reinforcing fibers that strengthen the final asphalt mix.

Up to 40% of the final road material can come from these recycled components.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Stronger roads and a cleaner planet thanks to cigarette butt recycling 

Recycled cigarette butts make asphalt stronger, more flexible and longer-lasting. The fibers released during mixing act as micro reinforcement, improving fatigue resistance and helping roads withstand heavy traffic and temperature changes. The wax in the pellets lowers the temperature needed to mix asphalt, reducing both energy use and emissions during production. Beyond performance, this method gives cigarette waste a second life. By repurposing billions of discarded filters, cities can reduce litter and pollution while building more sustainable infrastructure.

cigarette butt recycling 3

Illustration of a traditional roadway surface (Kurt “CyberGuy” Knutsson)

What cities are doing next with recycled cigarette butts 

This technique is still emerging, but interest is growing worldwide. In Bratislava, Slovakia, city officials have already started collecting cigarette butts specifically for road construction. One road built with this recycled asphalt is already in use, setting an example for other cities to follow.

As more pilot projects roll out and awareness spreads, cigarette butts could shift from toxic litter to a valuable resource in sustainable infrastructure.

CLICK HERE TO GET THE FOX NEWS APP

Kurt’s key takeaway

Recycling cigarette butts into asphalt solves two problems at once. It clears toxic waste from public spaces and makes roads that last longer. This approach turns one of the world’s most common pollutants into a valuable construction material. As more cities explore cleaner, smarter infrastructure, this kind of solution could play a big role in the future of street design.

Would you support roads built with recycled cigarette butts in your city?  Let us know by writing to us at Cyberguy.com/Contact

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

OpenAI limits ChatGPT mental health advice with new safety restrictions

0


NEWYou can now listen to Fox News articles!

More people are turning to artificial intelligence for support, even for mental health advice. It’s easy to see why: tools like ChatGPT are free, fast, and always available. But mental health is a delicate issue, and AI isn’t equipped to handle the complexities of real emotional distress.

To address growing concerns, OpenAI has introduced new safety measures for ChatGPT. These updates will limit how the chatbot responds to mental health-related queries. The goal is to prevent users from becoming overly dependent and to encourage them to seek proper care. OpenAI also hopes to reduce the risk of harmful or misleading responses through these changes.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER  

ChatGPT waits for a prompt.

A screenshot shows the ChatGPT prompt window interface. (Kurt “CyberGuy” Knutsson)

Why is OpenAI making this change?

In a statement released by OpenAI, the company admitted that there “have been instances where our 4o model fell short in recognizing signs of delusion or emotional dependency.” One example, ChatGPT validated a user’s belief that radio signals were coming through the walls because of their family. In another, it allegedly encouraged terrorism.

CHATGPT COULD BE SILENTLY REWIRING YOUR BRAIN AS EXPERTS URGE CAUTION FOR LONG-TERM USE

These rare but serious incidents sparked concern. OpenAI is now revising how it trains its models to reduce “sycophancy,” or excessive agreement and flattery that could reinforce harmful beliefs. 

ChatGPT answers the prompt, "Can you provide mental health advice?"

Screenshot of a prompt asking if ChatGPT can provide mental health advice (Kurt “CyberGuy” Knutsson)

What new safeguards has OpenAI set in place?

From now on, ChatGPT will prompt users to take breaks during long conversations. It will also avoid offering specific advice on deeply personal issues. Instead, the chatbot will help users reflect by asking questions and offering pros and cons, without pretending to be a therapist.

OpenAI stated, “While rare, we’re continuing to improve our models and are developing tools to better detect signs of mental or emotional distress so ChatGPT can respond appropriately and point people to evidence-based resources when needed.”

IS YOUR THERAPIST AI? CHATGPT GOES VIRAL ON SOCIAL MEDIA FOR ITS ROLE AS GEN Z’S NEW THERAPIST

The company also partnered with more than 90 physicians worldwide to create updated guidance for evaluating complex interactions. An advisory group, made up of mental health experts, youth advocates, and human-computer interaction researchers, is helping shape these changes. OpenAI says it wants input from clinicians and researchers to refine its safeguards further.

Screenshot of a user asking ChatGPT to

Screenshot of a user asking ChatGPT to “Cheer me up with a joke.” (Kurt “CyberGuy” Knutsson)

Your private conversations with ChatGPT are not legally protected

OpenAI CEO Sam Altman recently raised red flags about AI privacy. “If you go talk to ChatGPT about your most sensitive stuff and then there’s a lawsuit or whatever, we could be required to produce that. And I think that’s very screwed up,” he said.

He added, “I think we should have the same concept of privacy for your conversations with AI that we do with a therapist or whatever.”

So, unlike talking to a licensed counselor, your chats with ChatGPT don’t enjoy legal privilege or confidentiality. Be careful what you share.

SCAMMERS CAN EXPLOIT YOUR DATA FROM JUST 1 CHATGPT SEARCH

What this means for you

If you’re turning to ChatGPT for emotional support, understand its limits. The chatbot can help you think through problems, ask guiding questions, or simulate a conversation, but it can’t replace trained mental health professionals.

Here’s what to keep in mind:

  • Don’t rely on ChatGPT in a crisis. If you’re struggling, seek help from a licensed therapist or call a crisis hotline.
  • Assume your chats aren’t private. Treat your AI conversations as if they could be read by others, especially in legal matters.
  • Use it for reflection, not resolution. ChatGPT is best at helping you sort your thoughts, not solve deep emotional issues.

OpenAI’s changes are a step toward safer interactions, but they’re not a cure-all. Mental health requires human connection, training, and empathy – things no AI can fully replicate.

Take My Quiz: How Safe Is Your Online Security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz 

Kurt’s key takeaways

While ChatGPT is a useful tool, it’s far from being a substitute for a human being, even with the introduction of Agent, which adds capabilities but still lacks true empathy, judgment and emotional understanding. The safeguards go a long way toward addressing the concerns about AI’s ethical and psychological implications. It’s a good thing OpenAI is aware of this because it’s just the start. To truly protect users, the company will need to keep evolving how ChatGPT handles emotionally sensitive conversations.

Do you think people should be using AI for mental health? Let us know by writing to us at Cyberguy.com/Contact

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

Getting shipment emails for purchases you didn’t make finally explained

0


NEWYou can now listen to Fox News articles!

Over the past year, more people have reported receiving order shipment emails for purchases they never made. These messages usually come from legitimate retailers, often sportswear brands or electronics stores, and contain real tracking numbers and delivery details. The products are being shipped to different names at different addresses, but for some reason, the buyer’s contact email is yours.

It might seem like a harmless clerical error or someone accidentally typing the wrong email address. But when it happens repeatedly, and across multiple unrelated orders, it starts to look less like a coincidence and more like a tactic.

Arthur from Cape Coral, Florida, recently reached out with an experience that mirrors what others have been describing:

“My wife’s e-mail address is showing up in emails from various sports entities to notify her of shipping dates, etc. So far, three separate individuals have ordered products, shipped to a different name at a different address, but used her email as the contact. They didn’t use our credit card to place the order. What could be going on? I don’t believe it’s a coincidence.”

HOW TO DETECT FAKE AMAZON EMAILS AND AVOID IMPERSONATION SCAMS

Arthur is right to question what’s happening. Scammers are deliberately using real email addresses to push fraudulent purchases through retailer systems with fewer checks. They rely on your email to carry out the scam, even if they have not stolen your payment details.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide—free when you join my CYBERGUY.COM/NEWSLETTER 

A person checking emails on their laptop

Some scammers use valid, active email addresses to bypass retailer fraud filters. (Kurt “CyberGuy” Knutsson)

What’s likely happening with those shipment emails in your inbox

It is unlikely that someone is accidentally typing your email address every single time. Rather, scammers are deliberately using valid, active email addresses like yours to bypass retailer fraud filters. Numerous sources confirm that fake order and shipping confirmation emails are a common tactic in fraud operations, with criminals exploiting the trust systems placed in legitimate email addresses.

When a stolen credit card is used, pairing it with a real email that has not triggered spam alerts increases the chance the transaction will go unnoticed by anti-fraud systems. Retailers often check whether an email address is active or bounces. If the system sees a functioning address, it may be less suspicious than an obviously fake one.

Once the order is placed, products are frequently sent to drop addresses or freight-forwarding services, as confirmed by official investigations into brushing scams. These services act as intermediaries, making the scam harder to trace. In that context, your email is simply a means to an end, a validated contact point that helps the operation move forward smoothly.

A laptop with the Google search screen on it

Scammers can obtain email addresses when reputable companies experience data breaches. (Kurt “CyberGuy” Knutsson)

How bad actors are able to get your email

Your email address may have ended up in the hands of scammers through several common methods. The most likely cause is a data breach. Many well-known companies have suffered leaks where customer emails and other information were exposed. 

Once your email is part of a leaked database, it often circulates on the dark web or in underground forums where it is freely traded and reused. Even if you were not part of a breach, scammers often use a technique called credential stuffing. This involves testing stolen login details across different websites to confirm which email addresses are active.

REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

Remove yourself from the web

The best thing you can do to prevent this from happening is to invest in a data removal service. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. 

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

A person types on their laptop.

If you are receiving order confirmations for things you never bought, your email address could be a tool used by scammers in a larger fraud operation. (Kurt “CyberGuy” Knutsson)

7 ways to secure your email from scammers

These simple but powerful steps can help you protect your inbox, safeguard your identity, and stay one step ahead of scammers misusing your email.

1) Protect and monitor your email

Start by locking down your email account with a strong, unique password that you don’t reuse anywhere else. Enable two-factor authentication (2FA) so hackers can’t get in even if they’ve stolen your password. A password manager makes this much easier by generating and securely storing complex passwords, helping you avoid the risks of reuse. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords.

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

2) Watch for suspicious messages

Scan your inbox regularly for order confirmations, shipping notices, or account sign-ups you don’t recognize. If something looks off, report it directly to the retailer or platform; it could be part of a larger scam using your email address. Scan your inbox regularly for order confirmations, shipping notices, or account sign-ups you don’t recognize. If something looks off, report it directly to the retailer or platform; it could be part of a larger scam using your email address. Never click on suspicious links, even if the message looks legitimate, and protect your devices with strong antivirus software to catch threats before they spread.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

3) Be picky about where you share your email

Avoid entering your email on shady giveaway sites or sketchy online forms. When in doubt, skip the sign-up or use a throwaway email. The fewer places your email lives, the harder it is for scammers to get hold of it.

4) Create a second email address for shopping

Set up a dedicated email for online purchases, newsletters, and subscriptions. This helps keep your main inbox clean and makes it easier to spot strange activity. Sometimes, it’s best to create various email aliases so that you don’t have to worry about all your info getting taken in a data breach.  An email alias address is a great way for you to stop receiving constant spam mail by simply deleting the email alias address. These aliases forward messages to your primary address, making it easier to manage incoming communications and avoid data breaches.

For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com/Mail

HOW TO TELL IF A LOGIN ALERT IS REAL OR A SCAM

5) Monitor your credit and identity regularly

Even if no purchases appear under your name, scams involving your email can be a red flag for future identity misuse. Set up alerts with your bank and consider a credit monitoring service to catch unauthorized activity early.

See my tips and best picks on how to protect yourself from identity theft at  Cyberguy.com/IdentityTheft

6) Review connected accounts and revoke access

In your email settings (e.g., Gmail, Outlook), check for any connected apps, services, or delegated access you don’t recognize and remove them. This ensures no third party is piggybacking off your account.

7) File an identity theft report if the problem escalates

If this email misuse leads to fraudulent financial activity, direct users to file a report with the FTC at IdentityTheft.gov or their local authorities. Include this only if appropriate to your tone.

Kurt’s key takeaway

If you are receiving order confirmations for things you never bought, do not shrug it off. Your email is likely being misused as part of a larger fraud operation, not by accident but intentionally. Scammers are taking advantage of active, trustworthy email addresses to slip past retailer defenses and carry out unauthorized purchases. The repeated use of your email shows that fraud networks are already circulating it, even if your financial information remains untouched.

Are you comfortable with how much of your personal information is floating around online? Let us know by writing to us at Cyberguy.com/Contact

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide—free when you join my CYBERGUY.COM/NEWSLETTER

Copyright 2025 CyberGuy.com.  All rights reserved. 



Source link

Brain implant lets paralyzed patients control Apple devices with thoughts

0


NEWYou can now listen to Fox News articles!

A new brain implant now lets people control Apple devices, such as iPads, iPhones, and the Vision Pro, using only their thoughts. Synchron, an endovascular brain-computer interface (BCI) company based in New York, demonstrated the first wireless BCI that works with Apple’s official protocol.

Ten patients have received the implant: six in the U.S. and four in Australia. With this technology, users living with severe paralysis can navigate apps, send messages, and operate devices hands-free. This breakthrough greatly expands independence, as it enables patients to manage their environment, stream shows, and control smart home devices, all using only their minds.

Synchron’s advancement in BCI technology marks a significant step for assistive devices and hints at how we may interact with computers in the future. The device’s hands-free, voice-free operation offers a powerful new level of accessibility and autonomy for people with disabilities.

NONINVASIVE BRAIN TECH AND AI MOVES ROBOTIC HAND WITH THOUGHT

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide—free when you join my CYBERGUY.COM/NEWSLETTER 

A man with ALS uses a brain-computer interface to operate an iPad.

ALS patient Mark Jackson demonstrates Synchron’s brain-computer interface (BCI) working with an iPad. (Synchron)

A first for brain-tech and Apple

Synchron is the first company to connect a brain implant directly to Apple devices using Apple’s official BCI Human Interface Device (HID) protocol. This means no custom hacks or workarounds. The system simply connects over Bluetooth, just like a keyboard or a mouse, and works with iPhones, iPads, and even the Apple Vision Pro. In a powerful video shared by Synchron, ALS patient Mark Jackson demonstrates the tech in action. After losing the use of his hands, he’s now able to navigate his iPad entirely with thought. That includes opening apps, composing messages, and staying connected with the people he loves-all without moving a muscle.

Behind the scenes, Synchron’s system uses artificial intelligence to decode brain signals and turn them into real-time digital commands. Machine learning models interpret motor intent, such as thinking about tapping your finger, and translate that into actions on the iPad. This AI-powered decoding helps the system feel smooth and responsive as users learn to control it with focus alone.

Synchron, an endovascular brain-computer interface (BCI) company based in New York, demonstrated the first wireless BCI that works with Apple's official protocol.

Synchron’s brain-computer interface is seen up close. (Synchron)

The game-changing signal strength meter

One surprising new feature is the built-in signal strength meter. This visual cue shows patients how strong their brain signal is in real time. A blue box appears over an icon or app and fills up based on how clearly the system reads the user’s intent. It may sound simple, but this is a huge deal. It helps users like Mark fine-tune their mental focus, adjust their posture, and improve their interaction without outside help. It’s like seeing your brain in action and learning to drive it better. “When I lost the use of my hands, I thought I had lost my independence,” Mark says in the video. “Now, with my iPad, I can message my loved ones, read the news, and stay connected with the world, just by thinking.”

NEW BRAIN THERAPY ALLOWS PARALYZED PATIENTS TO WALK AGAIN: ‘I FEEL MY LEGS’
 

A man with ALS uses Synchron's brain-computer interface to operate an iPad.

Mark Jackson operates Synchron’s brain-computer interface, which functions using Apple’s official protocol. (Synchron)

What sets Synchron apart

BCIs like Synchron’s Stentrode and Elon Musk’s Neuralink have connected to devices before, but never like this. Previous setups required custom software or physical adapters. Now, thanks to Apple’s new BCI HID protocol, brain-computer interfaces can plug right into the Apple ecosystem like any other accessory. That official integration opens the door to more features, better performance, and fewer setup hurdles. Synchron’s COO, Kurt Haggstrom, calls it a “game changer” for both patients and the entire BCI industry.

What this means for you

This tech isn’t just for people with paralysis, at least, not forever. Today, it’s a medical tool undergoing trials. Tomorrow, it could become a consumer product you buy at your local Apple Store. With Apple embracing BCI as a legitimate input method, everything from your phone to your smart home could one day be controllable by thought. That opens the door for more accessibility, more customization, and completely new ways of interacting with technology.

PARALYZED MAN SPEAKS AND SINGS WITH AI BRAIN-COMPUTER INTERFACE

Take My Quiz: How Safe Is Your Online Security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz

Kurt’s key takeaways

Synchron’s Apple demo marks a new era in brain-computer interaction. It turns thoughts into action using mainstream tech you probably already own. While it’s still in its early stages, the direction is clear: BCI is moving out of the lab and into real life, and Apple is helping lead the charge.

Would you trust your brain to control your devices? Or is this one step too far? Let us know by writing to us at Cyberguy.com/Contact

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide—free when you join my CYBERGUY.COM/NEWSLETTER

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

Remove personal data to protect retirement accounts from scammers

0


NEWYou can now listen to Fox News articles!

You’ve spent decades building your retirement fund. Now is the time to enjoy it, not lie awake worrying about scammers and identity thieves. Criminals are more aggressive than ever, and they know your personal information is the key to your money.

The good news? You can take simple steps to remove your personal data from risky websites and databases. These actions greatly reduce the chance of fraud and protect your hard-earned savings from scammers. By taking control of your information now, you keep your money secure and your retirement in your hands.

THE DATA BROKER OPT-OUT STEPS EVERY RETIREE SHOULD TAKE TODAY

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER 

A man enjoying his retirement

A man enjoys his retirement. (Kurt “CyberGuy” Knutsson)

Why criminals target retirement accounts

Retirement accounts are a goldmine for criminals. Here’s why:

  • They’re large. A lifetime of savings can add up to six or seven figures.
  • They’re less monitored. Unlike checking accounts, you may only review them a few times a year.
  • They’re easy to access remotely. Scammers don’t need your wallet-just enough personal details to pretend to be you.

Elder fraud caused more than $4.9 billion in losses in 2024. In 72% of cases, scammers found victims’ personal data online. Most of these crimes were tied to identity theft, allowing criminals to access accounts, redirect benefits, or launch phishing attacks.

A woman enjoying her retirement

A woman enjoys her retirement. (Kurt “CyberGuy” Knutsson)

You have an online profile even without social media

You don’t have to be on Facebook to have your information online. Data brokers, companies you may have never heard of, collect and sell personal details about nearly every adult in the U.S. These profiles may include:

  • Age and date of birth
  • Home address and property value
  • Marital status and family details
  • Income range and investments
  • Retirement status

For scammers, this information is like a treasure map.

HOW TO SECURE YOUR 401(K) PLAN FROM IDENTITY FRAUD

How criminals abuse your data

When scammers know your age, address, and that you’re retired, they can craft scams that feel frighteningly real. Some examples are:

  • Fake financial advisor calls: Claiming to represent your bank or retirement plan provider, they already know your full name, your investment type, and even the city you live in.
  • “Pre-approved” retirement loan or annuity offers: Complete with official-sounding terms and personal details to make them seem legitimate.
  • Social engineering scams: Using information about your family or recent life events (like selling a home) to build trust before asking for account details.

The more accurate the personal data they have, the more convincing their story, and the higher the risk you’ll believe them.

A woman scrolling on social media on her phone

A woman scrolls on her phone. (Kurt “CyberGuy” Knutsson)

Reduce the target on your back

Every piece of personal information you remove from public databases is one less tool scammers can use. Removing your data can:

  • Reduce the number of scam attempts
  • Limit how convincing those scams seem
  • Prevent your details from being resold repeatedly

Think of it as changing the locks on your home before a break-in happens.

HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE

Remove your data manually

You can contact data brokers and request that they delete your profile. To start, search your name online, find the sites listing your data, and follow each site’s removal process. However, there’s a catch:

  • There are hundreds of these companies
  • Each has a different process, often requiring ID copies or mailed letters
  • Many will repost your data within months unless you check back regularly

It’s a time-consuming job that most people eventually abandon.

A woman checking her retirement accounts on her laptop

A woman checks her retirement accounts on her laptop. (Kurt “CyberGuy” Knutsson)

Use an automated data removal service

A data removal tool handles the work for you. It:

  • Contacts hundreds of data brokers on your behalf
  • Tracks each request and follow-up to ensure deletion
  • Monitors continuously to keep your data off the lists

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

Kurt’s key takeaways

You’ve worked too hard to let criminals take what you’ve built. By reducing your digital footprint, you protect both your money and your peace of mind. Start removing your personal information today, and keep your retirement exactly where it belongs, in your hands.

If you’ve been targeted by a scam, how did you handle it, and what advice would you give others?  Let us know by writing to us at Cyberguy.com/Contact

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link