9.3 C
New York
Wednesday, November 5, 2025
Home Blog Page 16

Fake invitation emails hide dangerous malware to steal your personal data

0


NEWYou can now listen to Fox News articles!

Cybercriminals are getting sneakier, and one of their latest tricks is using fake invitation emails that look like they’re coming from legitimate services. They promise you an “exclusive invite” or ask you to download and install something before you can see the details. If you’re not careful, that simple click could install malware on your computer.

Recently, I received one of these deceptive emails. It used a Gmail address, which made it look more authentic at first glance. But the red flag was in the language: “Save the invite and install to join the list.” No legitimate service should ever ask you to install software just to see an invite.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

Man typing on his laptop.

Cybercriminals use fake “invitation” emails to trick users into downloading malware. (Photo by Felix Zahn/Photothek via Getty Images)

How the fake invitation scam works

The email looks polished and even mimics well-known event platforms. When you click the link, it sends you to a site that pretends to host the invitation. Instead of showing event details, it pushes you to download an “invitation” file.

That file is likely malware. Once installed, it can:

  • Steal your personal information
  • Access your email contacts and spread the scam further
  • Hijack your system for criminal use

The link in my case pointed to a suspicious domain ending in “.ru.com.” At first glance, it mimicked a legitimate brand name, but the extra suffix is a clue it’s not official. Hackers often use look-alike domains to trick you into thinking the site is real.

Red flags that reveal fake invitation email scams

Here are some warning signs that should make you pause before clicking:

  • Unusual instructions like “install” or “save” just to view an invite
  • Urgent or exclusive language pushing you to act fast
  • Look-alike URLs that swap in extra characters or use different endings
  • Download prompts when all you expected was an online invite

If you see any of these, close the email and delete it.

SCAMMERS ARE ABUSING ICLOUD CALENDAR TO SEND PHISHING EMAILS

Hacker typing code.

Scammers mimic legitimate services, urging victims to “install” files that steal data. (Photo by Jens Büttner/picture alliance via Getty Images)

How to protect yourself from fake invitation email malware

These fake party invite emails are designed to trick you into downloading malware before you even realize what’s happening. Follow these steps to stay safe and keep your inbox secure.

1) Hover over links before clicking

Before you click on any “Download Invitation” button, hover your mouse over the link. Real invites use the company’s official domain. Scams like this often use odd endings such as “.ru.com” instead of “.ru” or “.com.” That small clue can help you avoid a big problem.

2) Use strong antivirus software

If you click by mistake, strong antivirus protection can detect and block malware before it spreads. Think of it as your last line of defense against a fake invite that sneaks into your inbox.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

3) Use a personal data removal service

Scammers often spread these emails by stealing contact lists from infected accounts. A personal data removal service reduces the amount of your personal information floating around online, making it harder for cybercriminals to target you in the first place.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

4) Keep your system updated

Hackers love outdated systems because they’re easier to exploit. Keeping your operating system and apps updated patches those holes and makes it much harder for malware to take hold.

5) Report suspicious emails

Don’t just delete a suspicious invite, report it to your email provider. This helps improve their filters, protecting you and others from future fake emails.

6) Enable multi-factor authentication (MFA)

Even if hackers get your password from a phishing attack, MFA adds an extra lock to your accounts. It makes breaking in nearly impossible without your phone or secondary code.

7) Back up your files regularly

If the worst happens and malware damages your computer, backups ensure you don’t lose everything. Use an external hard drive or a trusted cloud service for peace of mind.

NEW EVITE PHISHING SCAM USES EMOTIONAL EVENT INVITATIONS TO TARGET VICTIMS

A hacker typing into his laptop.

Hackers send polished emails with malicious links disguised as exclusive invites. (Photo by Thomas Trutschel/Photothek via Getty Images)

Kurt’s key takeaways

Fake invitation emails are designed to catch you off guard. Hackers count on you being in a hurry and clicking without thinking. Taking a moment to question an unexpected email could save you from installing dangerous malware.

Have you ever received a fake invitation email that looked convincing? How did you handle it? Let us know by writing to us at Cyberguy.com/Contact

CLICK HERE TO GET THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

Copyright 2025 CyberGuy.com.  All rights reserved. 



Source link

Flock Safety drones aim to curb rising retail crime with sky guards

0


NEWYou can now listen to Fox News articles!

Shoplifting has long been a challenge for retailers, but a U.S. company now believes that flying drones could help combat the issue. Flock Safety, best known for its law enforcement camera systems, is promoting its new Flock Aerodome Drone as an Automated Security system to the private sector. The idea is simple: if a theft occurs, a drone launches, follows the suspect, and streams live video back to security teams or even police. With theft rates reportedly climbing 93% in 2024, the push for high-tech security has never been stronger.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/Newsletter  

A Flock Safety drone prepares to launch, ready to follow suspects within seconds

An example of a Flock Safety drone, ready to follow theft suspects within seconds (Flock Safety)

How the drones would work

Instead of dispatching a guard, Flock’s drones could launch within seconds after motion is detected. Equipped with HD and thermal cameras, the drones can zoom in, track suspects, and relay real-time visuals.

The company says the system:

  • Covers up to 38 square miles with a single dock
  • Integrates with existing security alarms and camera systems
  • Operates with FAA safety approvals and built-in geofencing
  • Reduces costs by replacing the need for multiple guards

In theory, the drones act as a “guard in the sky,” providing retailers with rapid coverage across large areas, such as malls, warehouses, or ports.

Equipped with HD and thermal cameras, the drones track movement across wide areas

The drone is equipped with HD and thermal cameras; they track movement across wide areas in order to follow suspects. (Flock Safety)

TEXAS COMPANY CREATES DRONES TO CONFRONT SCHOOL SHOOTERS IN SECONDS

Why retailers may be interested

Organized retail crime is a growing problem. Retailers have been reporting higher losses, tighter budgets, and fewer staff members available. Flock Safety argues its drone system can act as a deterrent simply by being visible, making criminals think twice before targeting a store. Beyond retail, the company is also pitching its drones to operators of hospitals, warehouse sites, and energy facilities that require large-scale surveillance.

Retailers may soon rely on drones as a visible deterrent against organized theft

Due to the drones’ helpful technologies, retailers may soon rely on them as a visible deterrent against organized theft. (Flock Safety)

HEGSETH TEARS UP RED TAPE, ORDERS PENTAGON TO BEGIN DRONE SURGE AT TRUMP’S COMMAND

What this means for you

For shoppers, this could mean visiting stores where drones are part of the security landscape. You might notice them overhead at malls or parking lots, watching for unusual activity. While some may view this as an added safety measure, others may worry about increased surveillance and loss of privacy. For retailers, drones could help protect profits, staff, and customers without the rising costs of hiring additional guards. But whether customers welcome drones buzzing around remains to be seen.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com/Quiz

Kurt’s key takeaways

Technology is quickly reshaping how companies approach security, and drones may soon play a bigger role in everyday shopping environments. With faster response times, broader coverage, and lower staffing costs, the idea has clear appeal for retailers. At the same time, questions about privacy and public acceptance will influence the extent to which this technology is adopted.

Would you feel safer shopping under drone surveillance, or would it make you uncomfortable? Let us know by writing to us at CyberGuy.com/Contact

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/Newsletter

CLICK HERE TO GET THE FOX NEWS APP

Copyright 2025 CyberGuy.com. All rights reserved.



Source link

Royal palace artifacts discovered in Poland’s Vistula River after centuries

0

NEWYou can now listen to Fox News articles!

Archaeologists recently unearthed the remnants of a historic royal palace from a Polish river, shedding light on a violent part of the country’s history.

The Museum of Polish History announced the discovery in a Sept. 10 press release. The artifacts were uncovered in the Vistula River in Warsaw, and were connected to the 17th-century royal residence Villa Regia.

Officials described Villa Regia as “one of the most magnificent palaces of 17th-century Europe,” before it was looted and destroyed during the Swedish Deluge, which lasted from 1655 to 1660.

ANGLER EXPECTING A FISH PULLS UP RARE 700-YEAR-OLD SWORD: ‘REAL TREASURES’

The Swedish military occupied the Polish-Lithuanian Commonwealth during that time. Historians estimate that as much as a quarter of the population was lost, marking one of the deadliest chapters in the nation’s history.

In 1656, Swedish troops took valuables from the palace and attempted to sail away — but their vessel sank in the Vistula River before they made it out of Warsaw.

The Museum of Polish History announced the recovery of artifacts from Villa Regia, once among Europe’s grandest palaces before it was destroyed in the Swedish Deluge. (Muzeum Historii Polski / Maciej Cioch;)

“Architectural elements, from marble claddings and tiles to fragments of monumental staircases, were carried off and some were sunk in the Vistula,” the museum said. 

Among the artifacts retrieved was a fragment of an arcade arch that weighs more than 440 pounds.

SURPRISED ARCHAEOLOGISTS UNEARTH ANCIENT GRAVES CAUGHT BETWEEN PAGAN, CHRISTIAN RITUALS IN POLAND

Archaeologists also found the fragment of a pillar’s capital, or top, which was “previously unknown in the context of finds from this site,” per officials.

“[The finds] will allow new measurements and provide valuable information for reconstructing the royal residence Villa Regia,” the museum added.

Archaeologists pulling things from river

The artifacts were recovered from the riverbed after spending centuries submerged in the Vistula River. (Muzeum Historii Polski / Maciej Cioch)

“All recovered fragments have been secured and transferred to the collections of the Museum of Polish History, where they will undergo further conservation and research.”

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Krzysztof Niewiadomski, the Museum of Polish History’s deputy director of programs, said that he plans to reconstruct the palace staircase with the artifacts that were retrieved.

Archaeologists pulling heavy objects from Vistula

Officials said recovered artifacts include an arcade arch fragment weighing more than 440 pounds. (Muzeum Historii Polski / Maciej Cioch)

“With this monumental structure, we will tell the story of the power and wealth of the old Polish-Lithuanian Commonwealth, and, by referring to the Swedish Deluge, about the crisis of the state,” he noted.

MORE FROM FOX NEWS LIFESTYLE

“Acquiring such valuable artifacts would not have been possible without good cooperation with archaeologists, the city of Warsaw and the provincial heritage conservator.”

Smiling archaeologists next to recovered artifacts

All recovered fragments are being conserved and researched in Warsaw, the museum said.  (Muzeum Historii Polski / Maciej Cioch)

Poland has been the setting of several exciting archaeological discoveries in 2025.

Fox News Digital recently spoke with a hobbyist group in Poland that found ancient treasures while searching for World War II rockets.

CLICK HERE TO GET THE FOX NEWS APP

Earlier this summer, archaeologists in GdaÅ„sk uncovered an elite knight’s burial beneath a former ice cream parlor.

Dems slammed for ‘staggering’ silence after Virginia AG hopeful’s violent texts emerge

0

NEWYou can now listen to Fox News articles!

Abigail Spanberger, the Democratic candidate for Virginia governor, declined to call on her party’s attorney general hopeful, Jay Jones, to drop out of the race during a Thursday night debate. She stands among many other Democrats who have also declined to do so after text messages surfaced in which Jones fantasized about killing his Republican colleague in 2022.

Jones, a former delegate from Norfolk, Virginia, has faced mounting calls – mostly from Republicans – to bow out of the race for Virginia attorney general. But Virginia Democrats and other party leaders around the country have refused to cave to pressure they are getting to demand Jones drop out. 

The Jones’ text message scandal has become a flashpoint in Virginia’s elections, particularly considering it came at a time of heightened sensitivity to inflammatory and violent political rhetoric following the assassination of Charlie Kirk and two attempted assassinations of President Donald Trump. 

SPANBERGER EXCORIATED ONLINE AS A ‘COWARD’ FOR REFUSAL TO DITCH ‘UNHINGED’ JAY JONES

Sens. Mark Warner, D-Va., remained silent when asked by Fox News Digital repeatedly if Jones should drop out of the race. Warner was also pressed on whether he would demand Jones return a $25,000 donation made to his campaign in August, or whether he regretted the show of support in light of the controversy about Jones’ violent political speech, but he once again averted his gaze and remained silent. 

Sen. Tim Kaine, D-Va., was also unwilling to call on Jones’ to drop out. He told Fox News Digital he’s still a supporter of the embattled candidate for his state’s attorney general seat. “I think those statements were not in character, and he has apologized — I wish other people in public life would sincerely apologize for stuff,” the 2016 Democratic vice presidential nominee said. “I’ve known Jay Jones for 25 years.”

Several other Democrats outside of Virginia who were approached by Fox News Digital similarly walked away, or refused to respond when asked about the Jones controversy, which revolves around a text message exchange he had in 2022 with another lawmaker. 

During the texts, Jones fantasized about putting “two bullets” into the head of then-Virginia House Speaker Todd Gilbert. He also quipped about murdering Gilbert’s children.  

“Three people, two bullets. Gilbert, Hitler and Pol Pot. Gilbert gets two bullets to the head,” Jones wrote. In a subsequent text, Jones also wrote, “Spoiler: put Gilbert in the crew with the two worst people you know and he receives both bullets every time.”

“Jay. Please stop,” the lawmaker on the receiving end of the tests from Jones said at the time. Jones has since apologized, calling the remarks “embarrassing and shameful,” and said he had reached out personally to Gilbert and his family.

Jay Jones, who is running to become Virginia’s attorney general in 2025, has come under fire for a series of text messages calling for the death of political opponents and remarks about police officers.  (Maxine Wallace/The Washington Post/Getty Images)

“I’m really not familiar with the situation in Virginia,” Sen. Richard Blumenthal, D-Conn., said when asked if Jones should drop out. 

“Haven’t given it a thought,” said Sen. Sheldon Whitehouse, D-R.I. 

Meanwhile, Sen. Ron Wyden, D-Ore., called the texts “horrifying,” but when pressed further on whether Jones should drop out, Wyden said, “I’m going to leave it at that, thank you.”

SANDERS, DEM LEADERS DODGE QUESTIONS ON VIRGINIA CANDIDATE WHO JOKED ABOUT SHOOTING GOP LAWMAKER 

Other Democrats who Fox News approached, such as Sens. Andy Kim, D-N.J., and Martin Heinrich, D-N.M., condemned political violence but admitted they were not following the matter involving Jones. 

“I can’t say that I’ve done my due diligence to really understand, but what I will say is that what I saw was absolutely horrible,” said Kim. “I hope that in a time right now, where there’s so much concern about political violence, we can say that, ‘Yes, we need to make sure that we are holding ourselves up to a high standard, especially those in elected office.’”

Republican responses to the Jones text scandal were starkly different. Speaking with Fox News Digital, Sen. Ted Cruz, R-Texas, called the text messages “staggering, particularly with the spate of political violence we have seen.” 

“There are far too many on the left that celebrate political violence,” Cruz continued, adding, “When Charlie Kirk was assassinated, we saw leftists, college professors, leftist schoolteachers, politicians, journalists celebrating that heinous murder.”

“And every Democrat in Washington is turning a blind eye,” Cruz added. “In my view, the notion that someone advocating for the murder of children because he disagrees politically with their father is manifestly unsuitable for public office, especially the chief law enforcement officer of Virginia. And I wish there were even one Democrat with the courage to say that publicly.”

Democratic Party senators pressed on whether Jay Jones should drop out

From left to right: Sen. Martin Heinrich, D-N.M., Sen. Sheldon Whitehouse, D-R.I., Sen. Richard Blumenthal, D-Conn., Sen. Ron Wyden, D-Ore.  (Getty Images)

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

“It’s really sickening calling for the assassination of a rival, calling for the death of his children. I mean, I think, hopefully, all of us can agree that’s beyond the bounds of what is reasonable here, and he ought to step down,” Sen. Eric Schmitt, R-Mo., said when asked about the controversy. “What’s amazing though, is, I’ve not heard one Democrat – hopefully you’re asking that question to other Democrats. I’ve not heard anybody say anything about it, which is pretty sad.”

During a debate Thursday night between Republican and Democrat candidates for governor in Virginia, Republican candidate Winsome Earle-Sears repeatedly pressed her Democratic opponent, Spanberger, to call on Jones to step down. 

“Jay Jones advocated the murder — Abigail — the murder of a man, a former speaker, as well as his children who were 2 years and 5 years old. You have little girls. Would it take him pulling the trigger? Is that what would do it?” Earle-Sears asked Thursday night. “Please ask him to get out of the race. Have some courage.” 

Fox News Digital’s Peter Pinedo and Charles Creitz contributed to this report.

US State Department issues Level 2 terrorism warning for Maldives travel

0

NEWYou can now listen to Fox News articles!

The U.S. State Department issued a revised travel advisory pertaining to the Republic of the Maldives Oct. 7.

“Exercise increased caution in [the Maldives] due to terrorism,” the Level 2 travel warning notes. 

The advisory indicates that “terrorist groups may attack with little or no warning.”

TOURISTS TOLD TO VISIT ICONIC DESTINATION ‘ON DOCTOR’S ORDERS’ AS PUSHBACK EMERGES

Tourist locations, transportation hubs, markets, shopping malls and local government facilities are listed as possible targets. 

The U.S. State Department issued a Level 2 travel advisory for the Maldives on Oct. 7, warning travelers to exercise increased caution due to terrorism threats. (iStock)

Officials warn that attacks may also occur on remote islands, lengthening the response time of authorities in the event of an emergency.

For more Lifestyle articles, visit foxnews.com/lifestyle

Travelers who have trips planned are encouraged to monitor local and breaking news.

While in the Maldives, visitors should stay aware of their surroundings and avoid demonstrations and crowds, officials said.

madives 2

Tourist locations, transportation hubs, markets, shopping malls and local government facilities are listed as possible targets.  (Getty Images)

Purchasing travel insurance is also strongly recommended. 

CLICK HERE TO GET THE FOX NEWS APP

In 2024, over 2 million people visited the Maldives, according to that government’s database. 

maldives

In 2024, over 2 million people visited the Maldives. (iStock)

The island is in South Asia near the eastern Arabian Sea within the northern Indian Ocean.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

The Maldives is made up of 1,192 islands — only 200 are inhabited — that stretch along a length of over 500 miles, according to the location’s tourist site. 

Tampa bus driver stops to save barefoot toddler wandering alone on busy Florida street

0

NEWYou can now listen to Fox News articles!

A quick-thinking bus driver is receiving praise for springing into action after she spotted a young child wandering alone and barefoot in the middle of a busy street in Florida.

Barbara Baker, a driver and grandmother, stopped her bus on Route 12 in Tampa just after 7 a.m. on Aug. 31 to help the child, who was wearing pajamas, according to video posted by the Hillsborough Transit Authority (HART) on Wednesday.

Oh my God,” Baker can be heard saying in video footage that was taken from inside the bus. “Look at the baby out there by himself,” she said. 

PASTOR PRAYS FOR PIZZA DRIVER WHO DELIVERED WRONG ORDER, SPARKING VIRAL FUNDRAISER

She stopped the bus and hurried out its front door to help the child.

“Come here, baby,” she said to the little boy before scooping up the child, who by then had made his way to the side of the road. 

A young boy had walked more than two blocks from his home and was spotted by a veteran bus driver. (Courtesy Hillsborough Area Regional Transit)

The boy was unable to communicate where his home was, so Baker returned to the bus with him in her arms.

“Give me one second, please,” she told the passengers aboard her bus as she called HART operations and waited for the police to come.

“Mama,” the boy can be heard saying in the video. His age was not immediately clear. 

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Baker held him on her hip and continued to speak soothingly to him while they waited for help.

After knocking on doors in the neighborhood, police found the mother of the child within 20 minutes of the incident. The family lived two-and-a-half blocks away from where the child was found, according to HART.

Tampa bus driver Barbara Baker seen from behind on bus holding little boy who she saved from wandering along in the street

Barbara Baker, a longtime bus driver, waited with the little boy in her arms until police arrived.  (Courtesy Hillsborough Area Regional Transit)

In an interview with HART following the incident, Baker said her “heart dropped” as soon as she saw the boy in the street.

“When the police came, it’s like I almost wanted to cry because I thought about my grandbabies, and I’m like, ‘Oh, cars [are] passing, and nobody is helping this baby in the road.” 

Her “heart dropped” as soon as she saw the boy in the street. 

Baker said that just recalling the incident made her emotional. “But knowing that the baby is home — that’s a big thing for me,” she said.

In the video posted on Facebook, HART lauded Baker, saying, “Transit workers do more than drive — they safeguard the community every mile of the way.”

Barbara Baker, who has worked for the Hillsborough Area Regional Transit Authority since 2012, is being praised for stopping her bus to rescue a little boy wandering a Florida street along, barefoot and in pajamas.

In an interview with HART, Baker said her “heart dropped” when she saw the little boy alone in the street. Social media users have been praising her for her quick thinking and actions.  (Courtesy Hillsborough Area Regional Transit Authority)

In a statement, HART’s CEO, Scott Drainville, said, “Operator Baker’s courage and attentiveness exemplify the dedication and heart that define our team.”

MORE FROM FOX NEWS LIFESTYLE

Operators are trained to stay vigilant and remain “situationally aware” of lost children, human trafficking and more, according to the agency.

In the interview with HART, Baker said she first started working for the agency in 2005 before leaving to drive trucks. She then returned in 2012, working there for the last 14 years.

CLICK HERE TO GET THE FOX NEWS APP

Social media users joined in applauding her. “You’re a true hero, Ms. Baker!” one woman wrote on Facebook. 

“You are indeed what we need more of — unselfish, caring individuals who care about their community,” said another.

Archaeologists discover 13th-century sandal in bearded vulture nest in Spain

0

NEWYou can now listen to Fox News articles!

Archaeologists in Spain recently published findings revealing the remarkable contents of bearded vultures’ nests – including traces of the Middle Ages.

The results, published in the journal Ecology on Sept. 11, centered around the nests of bearded vultures in southern Spain, specifically the mountain ranges of Andalusia.

The species disappeared from southern Spain over 70 years ago. In a Sept. 18 press release, the University of Granada (UGR) said the vultures’ nests “are true natural museums, preserving traces from hundreds of years ago.”

DIVERS UNCOVER ‘EXTRAORDINARY’ MILITARY TREASURE TIED TO LEGENDARY ROMAN BATTLE

During his field work, researcher Sergio Couto and his team found a complete esparto sandal – made from esparto grass native to the Mediterranean region – in the nests. The medieval shoe dates back to the late 13th century.

The researcher also found a fragment of tanned, painted leather that “resembl[ed] a mask,” per the university, along with an 18th-century piece of basketry and a crossbow arrow.

Archaeologists in Spain uncovered rare artifacts inside bearded vultures’ nests, including a 13th-century sandal and centuries-old leather fragments. (Sergio Couto; Sven Hoppe/picture alliance via Getty Images)

The vultures’ dwellings also held ropes, horse tack and thousands of bone fragments and eggshells.

The bones belonged to hooved animals — a major part of vultures’ diets.

SURPRISED ARCHAEOLOGISTS UNEARTH ANCIENT GRAVES CAUGHT BETWEEN PAGAN, CHRISTIAN RITUALS IN POLAND

The discoveries were made between 2008 and 2014; they were not released to the public until now. 

Of the 2,483 artifacts recovered, a whopping 2,117 were bone fragments. 

View of ancient artifacts found in nests, including leather remains

Researchers documented handmade objects inside bearded vultures’ nests, including part of an esparto sling, a fragment of basketry, a piece of painted sheepskin leather and a crossbow arrow possibly used as nesting material. (Sergio Couto)

More than 9% of the remains “were of human origin … including 25 esparto-fiber items, 72 leather pieces, 11 made of hair and 129 textile fragments,” UGR said in a statement.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

It added, “These artifacts resemble those discovered in nearby caves with Neolithic occupation, demonstrating the use of plant fibers in the Iberian Mediterranean since the Epipaleolithic [era], around 12,000 years ago.”

View of cliffside nests

Archaeologists called the vulture nests “true natural museums,” revealing centuries of Iberian cultural and ecological history. (Sergio Couto)

“In addition, the eggshell remains provide a unique opportunity for comparative toxicological studies — vital for understanding pesticide exposure and the local extinction history of the bearded vulture. This information is key to the species’ recovery in Europe.”

MORE FROM FOX NEWS LIFESTYLE

UGR credited the stable temperature and humidity conditions of the caves for preserving the artifacts “in excellent condition.”

“Stratigraphic studies of these nests enrich our understanding of regional ecology while also revealing details about local ethnographic, historical and biocultural contexts,” the university added.

Bones retrieved from vultures' nests

Thousands of bone fragments recovered from the bearded vultures’ nests belonged mostly to hooved animals, reflecting the scavengers’ diet and offering researchers rare insight. (Sergio Couto)

The study comes months after archaeologists in Norway announced that they unearthed thousands of leather artifacts in Oslo – including shoes.

CLICK HERE TO GET THE FOX NEWS APP

Archaeologist Marja-Liisa P. Grue told Fox News Digital the shoes had been “in moist and oxygen-deprived masses for hundreds of years.”

Kido nursery data breach exposes 8,000 children’s personal information

0


NEWYou can now listen to Fox News articles!

Over the past few years, data breaches targeting schools, healthcare providers, and childcare services have been making headlines, exposing sensitive personal information and leaving families vulnerable. Now, a new breach has come to light that targets a nursery chain. Kido, which operates in the U.S., U.K., China and India, has reportedly had sensitive data stolen from thousands of children. Names, photos, addresses, birthdates, parental details and even safeguarding notes and medical records were allegedly accessed by a hacker group called Radiant.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

Computer monitors connected to wires display code.

The incident highlights how stolen data threatens not just privacy but also long-term child safety. (Kurt “CyberGuy” Knutsson)

What you need to know about nursery breach

According to reports, the hacker group Radiant claims to have stolen data related to around 8,000 children. To prove possession, they posted samples, including pictures and profiles of ten children, on a darknet website. They then issued a ransom demand, threatening to release more sensitive information unless Kido paid. In addition to targeting the nursery chain directly, Radiant reportedly called some of the children’s parents, pressuring them to push Kido into paying the ransom.

FBI WARNS ABOUT NEW EXTORTION SCAM TARGETING SENSITIVE DATA

When questioned about their actions, the group defended their tactics as a form of “penetration testing” for which they supposedly deserved compensation. This defense is misleading, as such testing requires explicit permission from the organization being targeted or participation in an official bug bounty program. Without that consent, these actions are illegal and deeply unethical.

A hacker types on a red, glowing keyboard.

Hackers exploited children’s data in the Kido breach, exposing families to serious risks. (Kurt “CyberGuy” Knutsson)

Why is this attack so disturbing?

The Kido breach is alarming for multiple reasons. First, it involves children’s data, which is particularly sensitive and legally protected in most countries. Second, the attackers combined traditional data theft with intimidation tactics, reaching out to parents directly. History suggests that once criminals gain access to such information, the attacks can escalate.

Breaches like this highlight how personal and digital security are intertwined. The potential misuse of data extends beyond simple identity theft. It can impact children’s safety, family privacy and long-term well-being. With attackers leveraging both the stolen data and psychological pressure on parents, the threat is particularly potent and long-lasting.

A hacker types in a code terminal on a MacBook.

Parents reported being directly contacted by attackers, showing how intimidation adds to the harm. (Kurt “CyberGuy” Knutsson)

7 steps parents can take to protect their child’s data

Even though the investigation into the Kido breach is ongoing, parents and schools can take immediate action to protect children’s data and reduce the risk of further exploitation. Here’s a detailed guide:

1) Monitor your child’s online accounts regularly

Log in to email, school portals and cloud storage accounts linked to your child. Look for unusual activity such as unrecognized logins, changes to passwords or new connected devices. Set up notifications for account activity whenever possible so you are alerted instantly if something suspicious happens.

2) Enable two-factor authentication (2FA) on all accounts

Adding 2FA creates an extra layer of security. Even if a hacker has a password, they won’t be able to access the account without the second verification step. Most email providers, school portals and messaging platforms support this, and it’s a simple step that dramatically improves security.

3) Consider a personal data removal service

Data broker sites often collect names, addresses and other personal details that hackers can use. Services that remove your child’s information from these databases can make it harder for attackers to find and exploit sensitive data.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com/Delete

Get a free scan to find out if your personal information is already out on the web: CyberGuy.com/FreeScan

THINK YOU’RE SAFE? IDENTITY THEFT COULD WIPE OUT YOUR ENTIRE LIFE’S SAVINGS

4) Use identity theft protection services

These services can continuously scan for your child’s personal information online and alert you if their data appears on suspicious websites or the dark web. This early warning allows you to take action before criminals attempt to exploit it.

Identity theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

See my tips and best picks on how to protect yourself from identity theft at CyberGuy.com/IdentityTheft

5) Install antivirus software on all devices

A strong antivirus program protects devices from malware, phishing scams, and suspicious scripts. It is particularly important on devices that children use to access school portals or personal accounts. This ensures that if a hacker tries to use malware to get deeper access, it is blocked.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech

6) Use a secure mail provider for sensitive communications

For communications with schools, healthcare providers or any service handling sensitive information about children, consider using an email service that offers strong encryption and built-in protection against spoofing. This makes it harder for attackers to impersonate a school or parent.

For recommendations on private and secure email providers that offer alias addresses, visit CyberGuy.com/Mail

7) Educate your children about online safety

Teach children not to share personal information online, including photos, addresses or school details. Encourage them to report anything suspicious and explain why it’s important to keep login information private.

CLICK HERE TO GET THE FOX NEWS APP

Kurt’s key takeaway

Data breaches targeting children are particularly concerning because they can have long-lasting consequences. The Kido incident is a stark reminder of the importance of proactive digital security measures for families. While organizations bear responsibility for protecting sensitive data, parents can take significant steps to monitor, secure and respond to potential threats.

Have you ever reviewed what personal information about your child is online? Let us know by writing to us at CyberGuy.com/Contact

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link

Students turn Google Docs into chat rooms amid strict school phone bans

0


NEWYou can now listen to Fox News articles!

Across the country, schools are cracking down on cell phone use. At least 18 states have rolled out bell-to-bell bans, with New York calling phones “distraction devices.” Teachers are praising the shift, saying classes feel more focused. But teens? They’re not giving up so easily.

Students are sidestepping bans in the most millennial-inspired way possible, turning Google Docs into digital chat rooms. With laptops open, it looks like they’re working on assignments. In reality, they’re typing messages back and forth in real time, just like an old-school AOL chat room.

SCHOOLS’ SAFETY TOOLS ARE SPYING ON KIDS — EVEN AT HOME

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter  

A girl looks at her laptop.

Students secretly turn Google Docs into real-time chatrooms. (Kurt “CyberGuy” Knutsson)

A creative workaround for school cell phone bans

Parents and teachers admit the workaround is clever. One teacher said she respects her students’ determination to stay connected and even acknowledged that the phone ban has improved behavior and focus in class. Still, she worries that turning Google Docs into chat rooms could open the door to bullying or cheating. Parents are also weighing in. One parent told CyberGuy that some kids in their district are buying MacBooks just so they can text each other through iMessage. Others, the parent added, are leaning on email threads or even old-school Post-It notes to keep the conversation alive.

A girl writes at a table in front of an open laptop.

Teens share their classroom hacks on TikTok with pride. (Kurt “CyberGuy” Knutsson)

Social media reaction

On TikTok, students proudly show off their “secret” Docs conversations. Captions range from playful, “Your cell phone rule was never going to stop me,” to defiant: “Can’t ever silence us, queens.” The creativity is earning laughs from older generations who remember the days before smartphones. But the trend is also stirring debate. Some parents see it as a harmless way for kids to adapt, while others worry it undermines the entire point of the ban. Educators are split too, amused by the ingenuity, yet frustrated that students are still finding ways to drift off task during lessons. The viral clips prove one thing for sure: when it comes to tech, today’s teens will always find a workaround.

A girl uses the trackpad on a MacBook.

Some kids buy MacBooks to keep texting through iMessage. (Kurt “CyberGuy” Knutsson)

Parent tips for navigating school cell phone bans

If your child’s school has adopted a phone ban, there are a few ways you can help them adjust while keeping communication open and safe:

  • Talk about the rules at home: Explain why schools are putting these bans in place and set expectations for how your child should behave with laptops and other devices.
  • Offer safe communication plans: Work with your child and the school to establish how you’ll contact each other in case of an emergency. Some districts allow phones in lockers or require them to stay powered off in backpacks.
  • Encourage balance: Remind your child that downtime from screens can actually help them focus better in class and relax during the school day.
  • Monitor alternatives: Keep an eye on how your child uses tools like Google Docs, email or messaging apps. What starts as chatting with friends can sometimes veer into bullying or cheating.
  • Be open to feedback: Ask your child how the ban is affecting their school day. Their perspective can help you understand where the real challenges and benefits are showing up.

TEENS AND PHONE USE WHILE DRIVING: WHY THIS DEADLY HABIT PERSISTS

What this means for you

If you’re a parent, this shows just how inventive kids can be when rules are put in place. Cell phone bans may cut down on scrolling, but students are quickly shifting to other tools. They’re chatting through shared Google Docs, buying MacBooks so they can iMessage during class, swapping notes over email, and even sticking to old-school Post-Its to stay in touch. While some of these workarounds seem harmless, they also carry risks, from distractions that take focus away from learning to new opportunities for bullying or even cheating. For teachers, it’s a reminder that managing distractions in the classroom goes beyond phone policies. Laptops, messaging apps, and even simple sticky notes can become back doors for the same behaviors schools are trying to limit. 

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com/Quiz

CLICK HERE TO GET THE FOX NEWS APP

Kurt’s key takeaways

Phone bans are reshaping the school day, and educators are already seeing benefits. Yet students are proving they’ll always find ways to connect, whether through phones, laptops or even retro workarounds that echo the early internet era.

What do you think? Are these bans helping kids learn better, or are they simply pushing students to get sneakier with tech? Let us know by writing to us at CyberGuy.com/Contact

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link

Experts unveil ancient Colombian faces from 13th-18th centuries by digital reconstruction

0

NEWYou can now listen to Fox News articles!

Researchers recently unveiled the faces of ancient Colombians who lived hundreds of years ago.

Liverpool John Moores University (LJMU) in the United Kingdom announced in an August press release that specialists in its Face Lab were able to digitally extract face masks from corpses found in the Cordillera Oriental region of eastern Colombia.

The results were presented in August at the XI World Congress on Mummy Studies in Cuzco, Peru.

SHOPPERS AT POPULAR MARKETPLACE WALKED OVER ‘VILE’ DUNGEON AS ARCHAEOLOGISTS CITE ‘REMARKABLE’ FINDS

Researchers analyzed four corpses that are held in the Colombian Institute of Anthropology and History’s (ICANH) collection.

The corpses spanned several centuries of Colombian history, from the 13th to the 18th centuries, the release noted.

Specialists at Liverpool John Moores University reconstructed the faces of four mummified individuals from the Cordillera Oriental region of Colombia. An example of their digital reconstruction is shown at right. (Daniel Romero/VW Pics/Universal Images Group via Getty Images; Face Lab, Liverpool John Moores University)

The earliest individual dates to around 1216, while the “newest” mummy is believed to have died around 1797. 

The masks were made directly on the decedents’ skulls, covering their jaw and face.

TREASURES IN ITALY, INCLUDING 2,300-YEAR-OLD TOMB, UNEARTHED DURING SEWER INSTALLATION

Using volumetric CT reconstructions, X-ray diffraction and DNA analysis — among other methods — the team digitally removed funerary masks from the corpses and reconstructed their faces.

Photos show the four reconstructed faces and corresponding skull scans, revealing what the men may have looked like during their time on Earth. 

Skulls on table next to facial depictions

The study spans five centuries of Colombian history, from about 1216 to 1797, researchers said. (Face Lab, Liverpool John Moores University)

Ancient Colombians crafted intricate funerary masks that were very realistic, according to LJMU.

“They crafted masks for their dead with such precision that the mummified bodies appear to be alive,” the university said.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

“Masks were made of clay, waxes and resins but often contain gold or other decorative material, telling an untold story of the culture and technology of Eastern Colombia between the 13th and 17th centuries.”

Researcher Jessica Liu told Fox News Digital the most surprising aspect of the project was the different shapes of the heads.

Facial reconstructions next to skulls

Researchers used advanced imaging to separate the funerary masks digitally, preserving the mummies’ physical integrity. (Face Lab, Liverpool John Moores University)

“The four heads were quite different in sizes, and their crania were quite different in shape,” she said.

MORE FROM FOX NEWS LIFESTYLE

“After the conference in Cuzco, we donated the 3D replicas to ICANH [and] they were very pleased with the results,” added Liu.

Close-up of skull models with pictures of faces

Felipe Cárdenas-Arroyo said the funerary masks were crafted with “extraordinary workmanship.” (Face Lab, Liverpool John Moores University)

Researcher Felipe Cárdenas-Arroyo of the Academia Colombiana de Historia said the masks were crafted using “extraordinary workmanship.”

CLICK HERE TO GET THE FOX NEWS APP

“[They are], so far, the only ones known to exist in Colombia,” he observed.Â