9.7 C
New York
Wednesday, November 5, 2025
Home Blog Page 13

Google, Dior hit in massive Salesforce credential theft data attacks

0


NEWYou can now listen to Fox News articles!

You might have noticed that in the past few months, many companies have disclosed data breaches, including Google, Dior and Allianz, and one name that appeared in most cases was Salesforce. Hackers did not breach company networks directly or exploit vulnerabilities in Salesforce’s core software. Instead, they targeted the tools and people around it by tricking employees into granting access, compromising third-party apps and abusing overly broad permissions.

Once inside, they siphoned sensitive data from Salesforce environments on an unprecedented scale. Nearly a billion records were stolen across dozens of organizations, and now cybercriminals are extorting victims by threatening to publish the data unless hefty ransoms are paid. Let’s look at the recent Salesforce incidents in detail and why this is such a big deal.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

JEEP AND CHRYSLER PARENT STELLANTIS CONFIRMS DATA BREACH

Salesforce Building in New York City

Hackers are weaponizing stolen Salesforce credentials to access company secrets. (REUTERS/Brendan McDermid)

Why Salesforce is the perfect target

Salesforce is not just another cloud platform. It is the backbone of how thousands of companies manage relationships with their customers. The platform powers everything from sales pipelines and marketing campaigns to support tickets and partner communications. Banks use it to track client accounts, airlines rely on it to manage frequent flyer programs, and retailers store customer purchase histories and loyalty data inside it. In many organizations, Salesforce sits at the center of daily operations, acting as a single system that touches sensitive information across departments.

That is why the scale of these breaches is so significant. A successful attack on a Salesforce instance becomes a window into a company’s customers, business strategy and internal processes. For cybercriminals, the potential payoff is enormous, and the recent incidents showed just how much damage they can cause without ever breaking into a company’s primary network.

The breaches hit companies across sectors, from Adidas and Allianz to Qantas, Google and Pandora Jewelry. Attackers often use voice-phishing calls or realistic fake apps to manipulate Salesforce administrators into installing malicious software. This allowed them to steal OAuth tokens and query data directly from CRM systems, a technique linked to groups like ShinyHunters.

Other attacks originated in compromised third-party integrations. One of the most damaging involved a chatbot tool called Drift, where stolen tokens gave attackers access to Salesforce instances at hundreds of companies.

The fallout was enormous. Coca-Cola’s European division lost more than 23 million CRM records, while Farmers Insurance and Allianz Life reported breaches affecting over a million customers each. Even Google admitted that attackers accessed a Salesforce database used for advertising leads.

TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED

A man uses a smartphone, illustrating the vulnerability of mobile devices in modern cybercrime.

Major brands like Google, Dior and Allianz are among those caught in the data fallout. (Kurt “CyberGuy” Knutsson)

Exploiting weak links in the ecosystem

It’s hard to break through firewalls or exploit technical vulnerabilities, but it’s much easier to manipulate people. Attackers have figured this out, and they are now focusing their efforts on human behavior and the less-protected edges of cloud ecosystems. Employees with administrative privileges were often tricked into authorizing malicious apps, while default permission settings allowed those apps to operate undetected.

Once they obtained the data, the hackers did not simply try to sell it. They used it as leverage. Earlier this month, a loosely organized cybercrime group known by names such as Lapsus$, Scattered Spider and ShinyHunters launched a dedicated data leak site on the dark web, threatening to publish sensitive information unless victims paid a ransom.

As reported, the site is designed to pressure companies into paying to prevent their stolen data from being made public. “Contact us to regain control of your data governance and prevent public disclosure,” reads one message on the site. “Do not be the next headline. All communications require strict verification and will be handled with discretion.”

The leak site lists several alleged victims, including FedEx, Hulu (owned by Disney) and Toyota Motors. It is also unclear whether some of the organizations known to have been breached but not listed on the site have paid ransoms to keep their data from being released.

FARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANS

A person types on a laptop computer in a home office setting, representing remote access points targeted in data breaches.

Cybercriminals are now extorting victims online, threatening to leak billions of stolen records. (Kurt “CyberGuy” Knutsson)

Salesforce’s response

Salesforce told Cyberguy that it is “aware of recent extortion attempts by threat actors” and will not engage with, negotiate with, or pay any extortion demands. A company spokesperson provided the following statement:

“We are aware of recent extortion attempts by threat actors, which we have investigated in partnership with external experts and authorities. Our findings indicate these attempts relate to past or unsubstantiated incidents, and we remain engaged with affected customers to provide support. At this time, there is no indication that the Salesforce platform has been compromised, nor is this activity related to any known vulnerability in our technology.”

6 steps you can take to protect your data

You might think a breach like this is a company problem, something for IT teams and cybersecurity experts to deal with. However, when attackers gain access to platforms like Salesforce, the data they are after is usually not the company’s. It is yours. Your contact details, purchase history, support tickets and even private conversations can end up in the wrong hands. And once that happens, the risks do not stay confined to one company. That is why it is worth taking a few proactive steps now, even if the company has not contacted you about an incident yet.

1) Lock down your accounts now

If you have interacted with any of the companies mentioned in the breach, or suspect your data might be part of it, change your passwords for those services immediately. Better yet, use a password manager to generate strong, unique passwords for every site. A good tool will also alert you if any of your credentials appear in future data leaks.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

2) Turn on two-factor authentication

Even if a password is stolen, two-factor authentication (2FA) adds a crucial extra layer of security. Enable it for your email, banking apps, cloud storage and any service that offers it. It is one of the simplest ways to block attackers from hijacking your accounts with stolen credentials. 

3) Use a personal data removal service

Even if your data was part of a breach, you can still limit how much of it is floating around online. Personal data removal services scan and delete your personal information from data broker websites that sell or share your details without consent. These brokers often trade in names, addresses, phone numbers and even purchase histories, the same type of data leaked in Salesforce-related breaches.

By removing your records from these public databases, you make it far harder for scammers, identity thieves and marketers to find or misuse your information. Many services, like Incogni, handle the entire opt-out process automatically and keep monitoring to ensure your data stays removed.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

4) Spot and stop targeted phishing attacks

Attackers who have CRM data often know more about you than a typical scammer. They might reference past purchases, support cases, or other personal details to make their messages sound legitimate. Treat unexpected emails, texts, or phone calls with suspicion, especially if they involve links or requests for payment.

The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

5) Use identity monitoring tools

Data breaches do not always result in immediate damage. Sometimes, criminals sit on stolen data for months before using it. These services can continuously monitor the dark web for your personal information and notify you if your data appears in new leaks. That gives you time to act before problems snowball.

Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

6) Know your rights

If you think your data was exposed, companies are legally obligated in most regions to inform you. Do not hesitate to contact them directly and ask for details on what was stolen and what steps they are taking to protect affected customers. The more pressure users apply, the more likely companies are to tighten security practices.

CLICK HERE TO GET THE FOX NEWS APP 

Kurt’s key takeaway

Attackers can expose your personal data even if you are careful. They gain access to corporate cloud environments and can see customer names, emails, purchase histories and other sensitive details. For users, this means it is crucial to stay vigilant. Criminal groups use this stolen information to launch targeted phishing attacks, open fake accounts, or impersonate you elsewhere. Some even cross-reference leaked Salesforce data with information from previous breaches to build disturbingly complete profiles of their victims.

Should companies face stricter penalties when sensitive customer data is stolen? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved. 



Source link

Apple launches iOS 26 with new Preview app for iPhone document editing

0


NEWYou can now listen to Fox News articles!

Apple has officially launched iOS 26, and with it comes a fresh look and one standout new feature: the Preview app. If you’ve updated your iPhone and noticed a new icon that looks like it belongs on a Mac, you’re not imagining things. Preview has finally arrived on iOS, and it’s more useful than you might think. Many iPhone users have long wanted an easier way to edit, annotate and scan documents without relying on third-party tools. Now, Apple’s built-in Preview app fills that gap, combining features from the Files app, Markup tools and the camera’s document scanner into one streamlined experience.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

What Apple’s Preview app can do

Just like the version on Mac, the Preview app on iPhone lets you handle basic photo edits and PDF changes with ease. You can:

  • Open and view PDFs or images directly from your Files app.
  • Annotate, draw and highlight content using the familiar markup tools.
  • Add text boxes or signatures to forms.
  • Crop, resize, or rotate photos.
  • Scan documents straight from your camera.
iPhone home screen displaying the Photos and Preview apps, showing where the Preview app appears after installation.

The new Preview app on iPhone makes scanning and signing documents feel effortless. (Kurt “CyberGuy” Knutsson)

When you open the app, you’ll see simple options like New Document or Scan Document. Tap the small Files section at the bottom to browse your phone’s stored content. The interface feels like Apple’s previous screenshot editor, so it’s instantly familiar. You can tap the three-dot menu for advanced tools like background removal, which saves you from downloading extra editing apps. If you open a PDF, Preview automatically detects fillable text boxes and lets you add your signature, perfect for signing forms or agreements on the go.

10 IOS 26 TRICKS THAT HELP YOU GET MORE OUT OF YOUR IPHONE

Inside the iPhone Preview app, highlighting options to create a

With built-in markup tools, you can highlight, draw or add your signature in seconds. (Kurt “CyberGuy” Knutsson)

How to scan a document using the Preview app

Preview’s built-in scanning tool is one of its best upgrades. It’s fast, accurate and ideal for receipts, contracts, or notes you want to store securely. If you’re already using Notes or Files to scan documents, you’ll find Preview much faster. It centralizes everything, no switching between multiple apps. Here’s how to do it:

  • Open the Preview app.
  • Tap Scan Documents from the home screen or the plus (+) icon if you’re already viewing another file.
  • Point your iPhone camera at the page you want to scan and hold it steady.
  • Preview will automatically detect the edges and capture the image.
  • After Preview captures the document, it shows a thumbnail.
  • If the edges aren’t right or the lighting is poor, tap Retake.
  • If you’re satisfied, tap the Blue Check mark in the upper right of the screen. This creates a digital document.

How to save or export your document

After scanning your pages, you can easily save, rename, or share your document directly from the Preview app using these steps.

Save to Files

  • Tap the Share button (a square with an arrow) and choose Save to Files. Select where you’d like to store it, such as iCloud Drive > Documents or On My iPhone > Scans, then tap Save.The scan is saved as a PDF file you can access anytime.

Rename the document

  • Tap the title at the top of the screen, type a new name such as Receipt-Oct2025.pdf, and tap Done.

Share the document

  • From the same Share menu, you can send the PDF by AirDrop, Messages or Mail.

Where to find saved scans later

  • Go to the Files app
  • Tap Browse
  • Then navigate to On My iPhone
  • Click Preview
  • Tap Scanned (or whichever folder you selected). You can open, mark up, or share the PDF directly from there.

HOW TO SAVE ANY FILE AS A PDF

iPhone home screen showing the Files app highlighted, followed by steps inside the Files app to scan and access documents stored locally under

Quickly find your saved scans in the Files app under Preview, where you can open, edit or share them. (Kurt “CyberGuy” Knutsson)

Similar tools for Android and Windows

If you’re on Android or Windows, you can do many of the same things using tools built into those platforms.

How to scan and edit documents on Android

If you’re using an Android phone running Android 6.0 or later, the Google Drive app includes a built-in document scanner powered by Google Play services. Starting in September 2025, Google began rolling out an upgraded scanning experience with sharper previews, smarter cropping and rotation, improved shadow removal and color filters that make your scans look more professional. The update also adds smoother page adjustments and a thumbnail carousel to easily reorder or delete pages before saving.

  • Open the Google Drive app on your Android device and make sure it’s updated through the Google Play Store for the latest features.
  • Tap the “+” or camera icon, then select Scan from the pop-up menu. Some phones may show a dedicated camera button for this.
  • Hold your phone steady so the entire page is visible. Drive automatically detects the edges and captures the document.
  • Use the built-in crop, rotate and color filter tools to fine-tune your scan. You can also remove shadows or retake a page if needed.
  • Tap Add page to create a multi-page PDF. If your device supports the new AI-powered scanner, Drive may detect and capture pages automatically.
  • Review your pages using the thumbnail carousel at the bottom to rearrange or delete any before saving.
  • Tap Save, enter a file name, choose your Drive folder and select whether to save as a PDF or JPG.
  • Open the saved file in Drive to annotate or highlight text using markup tools like drawing or underlining.
  • Share or export the finished document by sending a Drive link, attaching it to an email, or downloading it to another app.

EVEN WITH TRUMP’S TARIFF BLESSING, APPLE HIKES IPHONE PRICES

Android device screen showing Google Drive interface with the scan icon highlighted at the bottom, indicating where to tap to scan documents directly into Drive.

Use Google Drive’s upgraded scanner on Android to capture, crop and clean up documents in seconds. (Kurt “CyberGuy” Knutsson)

How to annotate and sign PDFs on Windows

Microsoft Edge includes a built-in PDF reader that supports inking, highlighting and adding comments or text notes. However, Edge is not a full PDF editor for rewriting text or rearranging pages. You can still draw or sign directly onto a PDF using the Draw/Pen tool, then save your edits. Some recent versions of Edge have limited annotation support, so features may vary. Because of those limitations, many Windows users rely on third-party PDF editors for complete editing control, such as adding text, rearranging pages, or performing OCR. The built-in Snipping Tool remains a quick way to capture and mark up screenshots or documents before saving or sharing. These steps work on both Windows 10 and Windows 11 using the Chromium-based Microsoft Edge browser.

The exact toolbar layout may differ depending on your version.

  • Open the Snipping Tool to capture a screenshot or document.
  • Choose the capture type: region, freeform, full screen, or window.
  • Save your capture as a PNG or JPG, or copy it to your clipboard for quick pasting.
  • To edit a PDF instead, open the file directly in Microsoft Edge.
  • Right-click the PDF file and select Open with → Microsoft Edge, or drag the file into the Edge window.
  • Use the Pen / Draw tool to write, draw, or sign directly on the PDF.
  • Highlight text by selecting it and choosing Highlight from the pop-up menu.
  • Add notes or comments with Add comment/text note.
  • Use the Draw tool again to sign your name, then save your edits.
  • Click the Save or Save As icon (the diskette symbol) to store your changes.
  • If your annotations don’t appear after saving, choose Print → Save as PDF to permanently embed them.

Best alternative PDF tools for Windows users

If Microsoft Edge doesn’t meet your editing needs, consider these free or paid alternatives that work across different devices:

  • PDF24 Creator: A free, highly rated PDF editor designed for Windows. It lets you merge, compress, sign, and convert PDFs without watermarks.
  • Xournal++: A popular open-source tool for Windows, macOS and Linux that lets you annotate PDFs with a pen or stylus.
  • Foxit PDF Editor: A professional, cross-platform editor with full text editing, signing and OCR tools. It’s available for Windows, macOS, iPhone and Android through the Foxit PDF Editor Mobile app.

These tools give you far more flexibility than Edge if you regularly edit, organize, or sign digital documents across devices.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

CLICK HERE TO GET THE FOX NEWS APP

Kurt’s key takeaways

Apple’s new Preview app in iOS 26 makes editing and scanning documents easier than ever. It brings together familiar tools from Files, Markup and the camera into one place, saving you time and steps. The experience feels seamless, especially if you often switch between your Mac and iPhone. For Android and Windows users, similar built-in tools already offer strong alternatives. Google Drive’s upgraded scan feature and Microsoft Edge’s PDF tools both make it simple to capture, annotate and share files. These options prove that whether you’re on iPhone, Android, or Windows, document management has never been more convenient. In the end, Preview’s arrival on iPhone marks another step toward a unified Apple ecosystem where productivity tools just work. If you’ve ever wished you could scan, sign, or edit a file in seconds, this update delivers.

Do you think Apple’s new Preview app will replace your go-to document editor, or will you keep using third-party tools? Let us know by writing to us at Cyberguy.com/Contact

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved. 



Source link

Ancient golden brooch and jade stone found in Troy dating to 2,500 B.C.

0

NEWYou can now listen to Fox News articles!

Turkish officials recently unveiled a gleaming gold brooch and a rare jade stone in Troy – a remarkable breakthrough that sheds light on the city’s pre-Greek past.

The artifacts were found by archaeologists excavating the Troy archaeological site, located in northwestern Turkey.

Troy was once considered a mythical city, and its remains were first unearthed by Heinrich Schliemann in 1870. The settlement is most famous for being depicted in Homer’s epic poems “The Iliad” and “The Odyssey.”

ANCIENT CIVILIZATION’S GOLD COINS, LUXURY ARTIFACTS UNEARTHED DURING ‘UNPRECEDENTED’ DIG

The Turkish Directorate of Communications announced the new finds in a Sept. 30 release, citing Anadolu Agency.

The artifacts were found in the Troy II settlement layer, which dates back to 2,500 B.C. — some 4,500 years ago. 

Archaeologists in northwestern Turkey uncovered a golden brooch and rare jade stone in the remains of the ancient city of Troy. (Bettman via Getty Images; @MehmetNuriErsoy via X)

Turkish officials say the discovery also sheds light on “the long-standing debate regarding the beginning of the Troy II period,” which is usually cited as being between 2550 and 2500 B.C.

RARE ANCIENT GOLD DISCOVERY MADE BY FLORIDA STUDENT AT ARCHAEOLOGICAL SITE

In an X post, Mehmet Nuri Ersoy, the Turkish minister of culture and tourism, lauded the discovery of the brooch.

Trees, stones at site of ancient Troy

Excavations at Troy continue to reveal extraordinary finds linking Anatolia with the early Mediterranean world. (LTL/Heritage Images via Getty Images)

“This brooch, the best-preserved of only three known examples in the world, is among the most significant finds of the last 100 years,” wrote Ersoy.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

He said that jade stones, like the one recently found, were seen as luxury items in antiquity.

Split image of brooch, jade stone

The golden brooch and jade stone, found in the Troy II layer, date back roughly 4,500 years. (@MehmetNuriErsoy via X)

The gem was not native to Anatolia, suggesting it arrived through long-distance trade.

MORE FROM FOX NEWS LIFESTYLE

All artifacts are planned to be shown at the Troy Museum in Çanakkale, Turkey.

View of ruined structures at Troy

UNESCO calls Troy one of the most famous archaeological sites in the world, rich in cultural heritage and myth. (LTL/Heritage Images via Getty Images)

Troy was added to the UNESCO World Heritage List in 1998. 

UNESCO’s website says Troy is considered one of the most famous archaeological sites in the world.

CLICK HERE TO GET THE FOX NEWS APP

“Its extensive remains are the most significant and substantial evidence of the first contact between the civilizations of Anatolia and the burgeoning Mediterranean world,” UNESCO says.

South Korea defends democratic legitimacy following martial law crisis and new government

0

NEWYou can now listen to Fox News articles!

It has been a turbulent yet inspiring year for Koreans. A declaration of martial law last winter plunged the nation into uncertainty, but what followed was not chaos – it was the reaffirmation of a people’s unshakable faith in democracy. 

The “Revolution of Light,” culminating in the peaceful election of a new government, reminded the world that the Republic of Korea’s constitutional order rests not on the will of any ruler, but on the collective conscience of its citizens. 

Some observers abroad have mistaken the intensity of Korea’s political transition for fragility or deviation from democratic norms. In truth, such intensity is the very pulse of democracy itself. Our debates are often fierce, our elections passionately contested, yet our institutions endure. That resilience – born of experience, sacrifice, and civic discipline – is Korea’s greatest democratic asset.

President Donald Trump greets South Korean President Lee Jae Myung upon his arrival at the White House on Aug. 25, 2025, in Washington, D.C. (Chen Mengtong/China News Service/VCG via Getty Images)

Since taking office, President Lee Jae Myung has acted swiftly to reinforce the foundations of democracy at home and to renew the Republic of Korea’s partnership with the United States. In word and deed, President Lee has recognized the vital importance of the ROK-U.S. alliance and strengthened pragmatic cooperation with President Donald Trump, and put our interlocking security and economic objectives, and shared values at the heart of his agenda. 

TRUMP DELIVERED PEACE AND A FUTURE WHERE OTHERS ONLY TALKED

This approach reflects Korea’s confidence as a mature democracy and responsible global partner. President Lee views the alliance not merely as a legacy of the past, but as a living partnership, adapting to new challenges – from regional security and economic cooperation to advanced future technology.

This vision was clear at their August summit, where the two leaders spoke with candor and mutual respect, underscoring their shared determination to build what they called a “Future-Oriented Comprehensive Strategic Alliance.” President Trump’s remark, “We’ve gotten along very well,” captured the new tone of trust shaping this alliance. 

President Lee and the whole of the Korean government have meticulously ensured that even as we focus on restoring our democratic system, we not flail for one second in our responsibilities as friend and ally.  This makes certain commentaries – portraying Korea’s new leadership as undemocratic, illegitimate or even hostile to religion – so bewildering and saddening. Such claims, often repeated in online forums and even on opinion pages, bear little resemblance to facts and hinder our joint efforts for real solutions. 

HOW TRUMP’S RELENTLESS MIDDLE EAST GAMBLE FINALLY FLIPPED THE SCRIPT

Let’s set the record straight: The government of the Republic of Korea was democratically elected. President Lee prevailed in a fair and transparent vote recognized around the world for meeting the highest election standards. Neither Korea’s independent judiciary nor its opposition parties objected to the result. 

Since then, the principles of the rule of law have been scrupulously observed. Ongoing legal proceedings concerning the previous administration’s declaration of martial law and other alleged abuses of power are being conducted by independent prosecutors appointed by the National Assembly – not by the Presidential Office. These legal proceedings demonstrate the rule of law, not the erosion of it.

Equally unfounded are recent claims that the new government is “anti-Christian.” Such narratives appear to arise from ongoing investigations into bribery allegations involving church funds, but for people familiar with Korea, the notion of prejudice is demonstrably absurd.

Christianity, along with Buddhism and other faiths, has played an integral role in Korea’s social and cultural life. Christian missionaries helped establish many of the nation’s leading educational and medical institutions, countless Christians sacrificed their lives for Korea’s independence from Japanese colonial rule. 

THATCHER AT 100: LESSONS IN CIVILITY, STRENGTH AND ENDURING ALLIANCES

Today, a large share of Korean population identifies as Christian, with millions of both Protestants and Catholics contributing to the fabric of Korean society. These individuals, like people of all faiths, continue to play a vital role in civic life, community service and the pursuit of national unity.

President Lee himself is a man of Christian faith. He and his administration have the deepest respect for freedom of religion and expression, which our Constitution enshrines. They, like all Koreans, are unambiguously proud of the legacy of Christianity and believe freedom of religion in the Republic of Korea rivals that of any place in the world.

To portray legitimate, lawful efforts to restore democratic order as a campaign against Christianity is not only misleading, but it undermines Christian legacy and respect for religious freedoms that are central to Korea’s democratic values.

As Koreans committed to democracy, vigorous debate and even disagreement are more than welcomed. It is what the new Korean government strove so vigorously to safeguard these past four months. But mischaracterizing all that has occurred does nothing to advance mutual understanding or produce real solutions for the Koreans and Americans alike.

CLICK HERE FOR MORE FOX NEWS OPINION

The Republic of Korea and the United States have sustained our alliance through eight decades of bravery and sacrifice. Today’s challenges require nothing less. Under President Lee’s government, Americans can be assured that they have a friend and partner who shares core values and is committed to the success of both of our nations. 

Look no further than their summit on Aug. 25 where the two leaders ushered in the era of a “Future-oriented Comprehensive Strategic Alliance” – one that looks confidently toward a more secure, democratic and prosperous future for both nations. Korea’s story is not one of uncertainty but of conviction: that a free people, tested by history, can renew both their democracy and their alliance with courage and grace. 

CLICK HERE TO GET THE FOX NEWS APP

Hacker plays ‘Free Palestine’ message at Harrisburg International Airport

0

NEWYou can now listen to Fox News articles!

A public address system was hacked on Tuesday evening at the Harrisburg International Airport (HIA) in Pennsylvania.

“An unauthorized user gained access to the airport PA system and played an unauthorized recorded message,” HIA officials said in a statement, according to FOX 43.

The message lasted for about 10 minutes, the airport reported. 

AIRLINES CANCEL FLIGHTS AS AIRPORTS EXPERIENCE ‘MAJOR DISRUPTIONS’ OVER PROTESTS, STRIKES

The hacker can be heard saying “Free Palestine” and “F— Netanyahu and Trump” over the speaker, according to videos circulating on social media. 

“Turkish hacker Cyber Islam was here,” says the unauthorized user in an identifying message.

A hacker identifying as “Turkish Cyber Islam” breached Harrisburg International Airport’s public address system this week. (iStock)

The airport called the announcement a “political message” that did not contain any threats to airlines, passengers or employees, according to HIA. 

A Delta flight that was boarding at the time of the incident was searched out of an abundance of caution, the airline confirmed to Fox News Digital.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

“As the safety and security of our customers and employees comes before all else, Delta followed the direction of TSA to return to the gate and complete a security check of the aircraft. We appreciate our customers’ patience and cooperation,” said a spokesperson in a statement to Fox News Digital. 

protestors hold up free palestine posters at demonstration in Warsaw.

The hacker (not pictured) can be heard saying “Free Palestine” and “F— Netanyahu and Trump” over the speaker. (Attila Husejnow/SOPA Images/LightRocket via Getty Images)

The passengers on the flight headed to Atlanta were deplaned as TSA conducted a security sweep, delaying the flight by 45 minutes. 

The public address system was shut off and is under investigation by police. 

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

The Harrisburg International Airport was said to be operating normally. 

Fox News Digital reached out to HIA, TSA and the Secret Service for comment. 

Waiting in the airport terminal watching planes

Following the incident, a Delta flight was searched out of an abundance of caution. (iStock)

The incident comes after the FBI issued a warning in July about a notorious cybercriminal group dubbed “Scattered Spider” targeting the airline sector, FOX Business reported.

CLICK HERE FOR MORE LIFESTYLE STORIES

The FBI posted on X that the group relies on “social engineering techniques, often impersonating employees or contractors to deceive IT help desks into granting access” and frequently involves methods to bypass multifactor authentication (MFA), such as convincing help desk services to add unauthorized MFA devices to compromised accounts. 

CLICK HERE TO GET THE FOX NEWS APP

“They target large corporations and their third-party IT providers, which means anyone in the airline ecosystem, including trusted vendors and contractors, could be at risk,” the FBI wrote.

Fox News Digital’s Daniella Genovese contributed reporting. 

State Department aware after American tourists attacked, 1 killed, in Portugal

0

NEWYou can now listen to Fox News articles!

The State Department told Fox News that it is aware of reports Wednesday that two American tourists were attacked in a popular European seaside destination that local media and police said left one person dead and another wounded.

The alleged attack happened early Wednesday in Cascais, Portugal, a coastal resort town about 20 miles west of Lisbon. 

Video taken by Reuters showed blood stains on a sidewalk, where a stabbing had taken place during an attempted robbery, according to media reports.

A State Department spokesperson told Fox News Digital that the agency takes seriously its commitment to protect U.S. citizens abroad and stands ready to provide consular assistance. 

AMERICAN STABBED DEFENDING WOMEN ON GERMAN TRAM CRITICIZES IMMIGRATION POLICIES AFTER SUSPECT RELEASED

The street in Cascais, Portugal, where the U.S. tourists were allegedly attacked on Wednesday. (Reuters)

“One of the young men died at the scene and the other suffered injuries to his face and arms and was taken to [a] hospital,” the Portugal Resident newspaper cited the Lisbon Metropolitan Command police force as saying.

The attack was carried out by three suspects who fled the scene in a vehicle, the newspaper added.

Street in the town of Cascais, Portugal

A State Department spokesperson told Fox News the agency is aware of reports that two American tourists were stabbed on Wednesday, in Cascais, Portugal. (Reuters)

CLICK HERE TO GET THE FOX NEWS APP 

Further details about the incident and the identities of the victims were not immediately available. 

This is a developing story. Please check back for updates. 

Fox News’ Nick Kalman contributed to this report.

AI sensors in road fabric could prevent costly repairs before damage

0


NEWYou can now listen to Fox News articles!

Road crews may soon get a major assist from artificial intelligence. Researchers at Germany’s Fraunhofer Institute have developed a fabric embedded with sensors and AI algorithms that can monitor road conditions from beneath the surface. This smart material could make costly, disruptive road repairs far more efficient and sustainable.

Right now, most resurfacing decisions are based on visible damage. But cracks and wear in the layers below the asphalt often go undetected until it’s too late. That’s where Fraunhofer’s innovation comes in.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

How AI road sensors work to prevent costly repairs

The system uses a fabric made from flax fibers interwoven with ultra-thin conductive wires. These wires detect minute changes in the asphalt base layer, signaling potential damage before it reaches the surface.

THE ROAD TO PROSPERITY WILL BE PAVED BY AUTONOMOUS TRUCKING

Road construction machine spreads fresh asphalt as researchers test AI sensors for detecting subsurface damage.

Fraunhofer researchers test AI sensors that detect road damage beneath the surface.  (Fraunhofer Institute)

Once the fabric is laid under the road, it continuously collects data. A connected unit on the roadside stores and transmits this data to an AI system that analyzes it for early warning signs. As vehicles pass over the road, the system measures changes in resistance within the fabric. These changes reveal how the base layer is performing and whether cracks or strain are forming beneath the surface.

Why AI road monitoring matters for future maintenance

Traditional road inspection methods rely on drilling or taking core samples, which are destructive, costly and only provide information for a small section of pavement. This AI-driven system eliminates the need for that kind of invasive testing.

Instead of reacting to surface damage, transportation agencies could predict and prevent deterioration before it becomes expensive to fix. The approach could extend road life, cut down on traffic delays and help governments spend infrastructure funds more efficiently.

ULTRA-THIN SOUND BLOCKER CUTS TRAFFIC NOISE DRAMATICALLY

Close-up of new asphalt layer over smart flax-fiber fabric used to detect stress and cracks in roads.

The smart flax-fiber fabric measures stress changes in asphalt to spot cracks early. (Fraunhofer Institute)

How AI and sensor data predict road damage early

The real power comes from combining AI algorithms with continuous sensor feedback. Fraunhofer’s machine-learning software can forecast how damage will spread, helping engineers prioritize which roads need maintenance first. Data from the sensors is displayed on a web-based dashboard, offering a clear visual of road health for local agencies and planners.

The project, called SenAD2, is currently being tested in an industrial zone in Germany. Early results suggest the system can identify internal damage without disrupting traffic or damaging the road itself.

What this means for you

Smarter road monitoring could lead to fewer potholes, smoother commutes and less taxpayer money wasted on inefficient repairs. If adopted widely, cities could plan maintenance years in advance, avoiding the cycle of patchwork fixes that often make driving a daily headache.

For drivers, it means less time sitting in construction zones. For local governments, it means better roads built on data, not guesswork.

WILL AUTONOMOUS TRUCKS REPLACE DRIVERS BY 2027?

San Francisco public workers repair pothole

San Francisco Department of Public Works worker Chris Solorzano uses a grading rake to smooth over asphalt as he repairs a pot hole on March 24, 2023, in San Francisco. (Justin Sullivan/Getty Images)

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

This breakthrough shows how AI and materials science are merging to solve real-world infrastructure challenges. While the system won’t make roads indestructible, it can make maintaining them smarter, safer and more sustainable.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Would you trust AI to decide when and where your city repaves the roads? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

Holiday charity scams target retirees with fake donation requests

0


NEWYou can now listen to Fox News articles!

The holidays are supposed to be a season of generosity, family and giving back. For many retirees, October through December is the time to support causes close to their hearts, whether it’s helping veterans, feeding families or donating to disaster relief. But there’s a darker side to this generosity. Scammers know that retirees are among the most generous members of our communities, and they exploit that kindness to line their own pockets.

Millions of dollars are stolen through fake “charities” that pop up just before the holidays. Their calls, letters and emails look legitimate, but the money never reaches those in need. Instead, it funds criminals who are ready to strike again.

Here’s what every retiree (and their loved ones) should know about holiday charity scams and how to protect their money, identity and peace of mind.

HOW RETIREES CAN STOP FAKE DEBT COLLECTOR SCAMS

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

An elderly man purchasing something with his credit card online

Scammers mimic real charities to pressure retirees into quick donations. (Kurt “CyberGuy” Knutsson)

Why retirees are prime targets for fake charities

Retirees often give more generously than other groups. Scammers know this, and they know how to tailor their pitch.

  • Emotional appeals: Fraudsters will mention children, veterans or natural disaster victims to tug at heartstrings.
  • Polite persistence: Retirees tend to answer calls and engage longer on the phone, which scammers see as an opportunity.
  • Data exposure: Your name, age, phone number and even donation history can already be found online through data brokers. That means scammers don’t need to guess; they target you because they know you’ve donated before.

When you combine generosity with publicly available data, scammers see retirees as the “perfect donors.”

HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

Fake charity red flags

How do you know if a charity request is real or just a scam dressed up for the holidays? Look for these warning signs:

  • Pressure to act fast: If a caller insists you donate “right now” or tries to guilt you into giving before you hang up, it’s likely a scam. Real charities welcome donations anytime.
  • No details about how money is used: Authentic charities can explain where funds go. Scammers use vague promises like “helping the needy” without specifics.
  • Untraceable payment methods: Requests for gift cards, wire transfers or peer-to-peer app transfers (like Venmo or Zelle) are instant red flags.
  • Lookalike names: Fraudsters often invent names that sound similar to well-known charities, like “Veterans Hope Relief” or “Children’s Aid International.”
  • Caller ID tricks: Scammers can spoof numbers to make it look like they’re calling from a local area code or even a real charity office.

How to safely check a charity before donating

Here’s how to protect yourself while still supporting the causes that matter to you:

  • Research the charity’s name: Before donating, search it on sites like Charity Navigator or the Better Business Bureau’s Wise Giving Alliance at give.org/. If it doesn’t appear there, that’s a red flag.
  • Ask for written information: Real organizations will happily mail or email details about their mission, budgets and how donations are used.
  • Verify tax-exempt status: Use the IRS Tax-Exempt Organization Search at Irs.gov/charities-and-nonprofits to confirm the charity is legitimate.
  • Check how much goes to the cause: Some charities are real but inefficient, spending more on salaries than programs. Make sure your donation actually helps.

REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

Protecting your payment details

Even if the charity itself is real, you need to protect how you give:

  • Use a credit card rather than a debit card because credit cards offer stronger fraud protection.
  • Never give payment info over the phone if you didn’t initiate the call.
  • Donate through the charity’s official website instead of clicking links in unsolicited emails.
  • Keep records of your donations for tax purposes and to spot anything suspicious later.
Elderly woman bakes holiday treat with children.

The elderly must stay vigilant as holiday charity scams target older donors.  (iStock)

Why removing your data online reduces charity scam calls

Here’s something most people don’t realize: many charity scams start with data brokers. These companies collect your personal details, such as age, phone number, donation history and even religious or political leanings, and sell them to anyone who asks. That means fraudsters can buy a ready-made list of “generous retirees who donate to veterans’ causes” and start calling immediately. The more information out there about you, the more personalized and convincing scam calls become. That’s why removing your data from broker sites is one of the most powerful defenses available to you.

The easy way to do it

Manually contacting hundreds of data brokers is a never-ending task. Each one has its own forms, emails, and hoops to jump through, and many will re-add you months later. That’s where a data removal service comes in. They automatically reach out to data brokers on your behalf, demand the removal of your personal info and keep following up so it doesn’t creep back online.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS

A person types on a computer.

Protect your personal information by donating only through verified official websites. (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaways

The holidays should be about joy, generosity and giving back, not about lining the pockets of fraudsters. By spotting the red flags of fake charities, double-checking where your money goes and removing your personal information from online databases, you can keep your donations safe and make sure they reach the people who truly need them. Remember: protecting your generosity is just as important as sharing it.

Have you ever been contacted by a fake charity during the holidays? What tipped you off? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

Brussels Airport cancels flights amid nationwide strikes, protests over austerity measures

0

NEWYou can now listen to Fox News articles!

Nationwide strikes and protests over Belgium’s reform plans caused flight disruptions at two major airports and troubles on public transport on Tuesday, with police there using tear gas and a water cannon to try to disperse crowds, The Associated Press reported. 

Minor scuffles broke out between police and protesters, some of whom played drums and horns and set off flares and smoke bombs as they chanted against cuts to social welfare programs. The unusually large protest crippled traffic in the heart of the Belgian capital, blocking major roads. Strikes led to the cancellation of many flights. 

Organizers estimated more than 150,000 people joined the demonstration, while the police put the crowd at 80,000.

‘IT’S NUTS’: SKY-HIGH LAS VEGAS PRICES STUN VISITORS AS TRAVEL PRO GIVES TIPS TO FIGHT BACK

Police vehicles were seen chasing protesters. Officers who were out of uniform but identified by their red arm bands detained protesters, tying their hands with plastic bands. 

At one point, police officers on bicycles sheltered inside a hotel from a large group of protesters.

Belgium’s nationwide strikes over reform plans drew over 80,000 protesters in Brussels, forcing major disruptions at airports and blocking major roadways.  (AP Photo/Sylvain Plazy)

The protesters have been demonstrating across Brussels center, between Gare du Nord and Gare du Midi train stations, Reuters reported. 

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

The protest was organized by Belgium’s three major trade organizations.  

As the demonstrators blocked busy roads, about 25 people were detained by police for setting fires on Brussels’ populated boulevards, according to Reuters.

“We unfortunately expect major disruptions to our airport operations.”

The Brussels Airport issued a warning to flyers that departing passenger flights might be canceled. 

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“Due to the national industrial action on Tuesday 14 October in which the staff of the security service provider is participating, we unfortunately expect major disruptions to our airport operations on that day,” the airport posted on their website. 

brussels airport empty

The Brussels Airport, pictured, issued a warning to flyers that departing passenger flights might be canceled due to protests and strikes.  (AP Photo/Virginia Mayo)

In 2024, a total of 23.6 passengers traveled through Brussels Airport, according to its website.

The second-largest airport in the European country, Charleroi Airport, has also canceled flights due to lack of staff. 

CLICK HERE FOR MORE LIFESTYLE STORIES

Brussels Airport was in consultation with airlines in an attempt to persuade them not to operate any departing flights on Tuesday, Reuters reported. 

brussels major roads closed over protests

Protesters block a major roadway in Brussels, Belgium.  (AP Photo/Harry Nakos)

“As departing passenger flights are canceled, cancellations are also possible on some arriving flights,” said the airport.

Major air carrier Brussels Airlines heeded the call, writing, “We are forced to cancel all departing flights and a significant number of arriving flights that day.”

CLICK HERE TO GET THE FOX NEWS APP

The airport said it expected a “busy day” on Wednesday.

The Associated Press and Reuters contributed reporting. 

Gold coins found by UK couple in garden set to auction for six-figure sum

0

NEWYou can now listen to Fox News articles!

A British family uncovered a treasure trove in their own backyard — and now it’s going under the hammer for a whopping six-figure sum.

The lot is being sold by coin dealer David Guest Numismatics. It will be auctioned in Zurich, Switzerland, on Nov. 5., and is expected to fetch more than £230,000, or roughly $308,000 U.S. dollars. 

Coin specialist David Guest told Fox News Digital the hoard was found by a Hampshire couple in Milford on Sea in April 2020.

RARE ANCIENT GOLD DISCOVERY MADE BY FLORIDA STUDENT AT ARCHAEOLOGICAL SITE

The couple was adjusting a fence next to one of their backyard flower beds when the husband spotted a lump of “clayey soil,” Guest said.

“In total, they recovered 64 coins,” he added. “A further six coins were found by archaeologists in Oct. 2021.”

A couple stumbled on a hidden stash of gold coins while working in their backyard garden. (iStock; David Guest Numismatics)

At first, the soil appeared to contain thin metal discs. But when the couple’s teenage son washed the lump of material under the garden tap, the family realized there were gold coins present. 

The numismatist said the hoard was buried in the late 1530s, when its value was 26 pounds, 5 shillings and 5-1/2 pence.

“I am very confident that the total price realized will be significantly more than the pre-sale estimate.”

“This was a considerable amount of money at the time,” noted Guest. “It has been calculated that in rural England in the 1530s, the average property price was £25.”

He added the hoard was likely buried due to political instability in England during the Reformation.

ANCIENT CIVILIZATION’S GOLD COINS, LUXURY ARTIFACTS UNEARTHED DURING ‘UNPRECEDENTED’ DIG

“While we will never know why and by whom the hoard was buried, it was almost certainly concealed during the tumultuous first phase of the English Reformation when Henry VIII was dissolving England’s ancient monasteries and appropriating much of the wealth of the Catholic Church,” Guest said.

Close-up detail of gold coins

The hoard’s 16th-century value was about the same as the price of an average rural home. (David Guest Numismatics)

The coins were all struck between the 1420s and 1530s. Many of the coins bear the images of the four English kings between 1422 and 1547: Henry VI, Edward IV, Henry VII and Henry VIII.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

“Four kings, two queens (Katherine of Aragon and Jane Seymour) and one cardinal are named on coins in the hoard,” said Guest. 

The coin dealer said the excellent condition of the coins contributes to the hoard’s high selling point – and he believes it will sell for even more than the expected price.

Images on front and back of gold coins

The treasure, found in Milford on Sea, has been carefully authenticated by specialists. (David Guest Numismatics)

“[The hoard] is also remarkable for the very high state of preservation of the majority of the coins,” he said. “This makes them very attractive to the current market.”

MORE FROM FOX NEWS LIFESTYLE

Guest added, “I am very confident that the total price realized will be significantly more than the pre-sale estimate.”

The hoard is one of many exceptional coin-related discoveries found in the U.K. in recent years.

Coins spread out

The rare hoard, buried during England’s Reformation, is expected to fetch more than £230,000 at auction. (David Guest Numismatics)

In 2023, a plumber found a cache of ancient coins in a field in Leicestershire and auctioned them off in 2025.

CLICK HERE TO GET THE FOX NEWS APP

Earlier this year, officials announced the discovery of the equivalent of a Roman soldier’s paycheck in Norfolk – 25 silver denarii.