8.6 C
New York
Thursday, March 26, 2026
Home Blog Page 247

Hackers using malware to steal data from USB flash drives

0


Cybercriminals are constantly finding new ways to steal your data. As people become more aware of common threats like phishing links, fake websites, fraudulent emails and impersonation scams, attackers are becoming more creative in their approach.

One of the newer methods they are using involves targeting USB flash drives. It may seem surprising that they would focus on something as simple as a flash drive, but the data it holds can be valuable. 

Plus, flash drives can be used to spread malware to other devices.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

flash drive hacker 1

A person plugging in a USB flash drive to a laptop (Kurt “CyberGuy” Knutsson)

Why target USB flash drives?

USB drives are ubiquitous in workplaces, especially in environments with air-gapped systems or restricted internet access, such as those in government and energy sectors. This makes them an easy target for data theft and malware propagation. Often, these drives store sensitive files that are not available on networked systems. 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

When infected, USB drives can spread malware not just within a single organization but also across multiple entities if shared. These attacks don’t rely on network vulnerabilities, allowing them to bypass traditional security tools. 

flash drive hacker 2

USB Flash drive plugged into a laptop  (Kurt “CyberGuy” Knutsson)

200 MILLION SOCIAL MEDIA RECORDS LEAKED IN MAJOR X DATA BREACH 

How hackers are targeting your USB drives

As reported by Kaspersky’s Securelist, a cybersecurity research platform, hackers are using USB drives to spread malware in ways that can easily bypass traditional security systems. One group, known as GOFFEE, kicks off its attacks with targeted phishing emails. These emails often carry infected RAR files or Office documents with harmful macros. Once opened, they install sneaky programs like PowerModul and PowerTaskel on the victim’s system.

These tools don’t just sit around. They lay the groundwork for more attacks. PowerModul, in particular, plays a big role. It’s a PowerShell script introduced in 2024 that talks to a command-and-control (C2) server. From there, it can download and run other tools, including two especially dangerous ones, FlashFileGrabber and USB Worm.

FlashFileGrabber is made to steal data from USB drives. It can either save stolen files locally or send them back to the hacker’s server. Then there’s USB Worm, which infects any USB drive it finds with PowerModul, turning that drive into a tool for spreading malware to other systems.

What makes this method effective is that USB drives are often shared between people and offices. That physical movement allows the malware to spread even without an internet connection. The malware hides original files on the USB and replaces them with malicious scripts disguised as normal-looking shortcuts. When someone clicks one of these, they unknowingly trigger the infection.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

flash drive hacker 3

Illustration of a hacker at work  (Kurt “CyberGuy” Knutsson)

MALWARE EXPOSES 3.9 BILLION PASSWORDS IN HUGE CYBERSECURITY THREAT

4 practical ways to stay safe from USB-targeted attacks

1. Don’t plug in unknown USB drives: It might sound obvious, but this is one of the most common ways malware spreads. If you find a USB drive lying around or someone gives you one you weren’t expecting, avoid plugging it into your system. Attackers often rely on human curiosity to get the malware onto your machine.

2. Be extra cautious with email attachments: GOFFEE’s campaigns often begin with phishing emails carrying malicious RAR files or Office documents with macros. Always double-check the sender’s address and never open unexpected attachments, especially if they ask you to “enable macros” or come from unknown contacts. When in doubt, confirm through a different channel.

3. Avoid clicking on suspicious links and use strong antivirus software: Many attacks like GOFFEE’s start with emails that look legitimate but contain malicious links. These links might lead you to fake login pages or silently download malware that sets the stage for USB-targeting tools like PowerModul.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Scan USB drives before use: The USB Worm infects USB drives by hiding original files and planting malicious scripts disguised as shortcuts, which trigger PowerModul when clicked. FlashFileGrabber also steals files silently from USBs, often going unnoticed. Always scan USB drives with updated antivirus software before opening any files. Use a reputable security tool to check for hidden scripts, unusual shortcuts or unexpected executables. If files appear renamed or hidden, don’t click them until verified safe. 

DATA REMOVAL DOES WHAT VPNS DON’T: HERE’S WHY YOU NEED BOTH 

Kurt’s key takeaway

Cybercriminals thrive where convenience meets oversight. However, it’s worth considering why USBs remain such a soft target. They’re not just storage but a cultural artifact of workplaces, especially in high-stakes sectors like energy or government, where offline data transfer feels safer than the cloud. But that trust is a blind spot. Attackers like GOFFEE don’t need zero days because they can exploit human habits such as sharing drives, skipping scans and clicking without thinking.

How often do you plug in a USB drive without scanning it first? Let us know by writing us at Cyberguy.com/Contact

CLICK HERE TO GET THE FOX NEWS APP

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link

An AI-powered robot army that packs your groceries in minutes

0


Imagine a grocery store where your entire order is picked, packed and ready for delivery in just five minutes without a single human hand touching your food. 

This is exactly what’s happening inside Ocado’s revolutionary Hive, a fully automated warehouse system that’s changing the way we shop for groceries.

AI robots 1

What is the Hive?

At the core of Ocado’s Customer Fulfilment Centres, or CFCs, is The Hive, a massive 3D grid filled with thousands of grocery products. 

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

Picture fleets of robots or “bots” zipping around at speeds up to about 9 miles per hour, all coordinated by an AI-powered “air traffic control” system that talks to each bot ten times every second. These bots work together to pick and transport items, which are then packed by robotic arms with incredible precision and speed.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

AI robots 2

Fleet of robots  (Ocado)

FOUR-LEGGED HYDROGEN-POWERED ROBOT YOU CAN ACTUALLY RIDE

How does it all come together?

The magic behind the Hive is Ocado’s smart platform, which combines artificial intelligence, robotics and automation to tackle the unique challenges of online grocery shopping. Factors like tight profit margins, the wide variety of items customers order and the need to handle products at different temperatures all make online groceries a tough nut to crack. But Ocado has been developing this technology for over 20 years, and it shows.

Thanks to this platform, a 50-item grocery order can be picked and packed in just five minutes, six times faster than traditional methods. The robotic arms don’t just blindly pack items. They use advanced computer vision and deep learning to make smart decisions on the fly, packing groceries densely and safely even without knowing what’s coming next. 

And behind the scenes, Ocado uses digital twin technology, essentially a virtual replica of the warehouse, to simulate and optimize everything from customer demand to delivery routes. This means it can innovate quickly and reduce risks before making changes in the real world.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

ai robots 3

Fleet of robots  (Ocado)

SMARTER DAIRY FARMS WHERE ROBOTS MILK THE COWS

What makes this so revolutionary?

The speed and scale of the Hive are truly game-changing. Orders that used to take over an hour to pick manually are now done in minutes, and many orders can be processed at the same time. Plus, Ocado’s warehouses can offer up to 78% more products than a typical supermarket, giving customers a much wider selection tailored to their preferences. 

The system also helps reduce food waste dramatically. Ocado’s waste rate is just a tiny fraction of the industry average, thanks to smart forecasting and precise inventory management.

Another big advantage is flexibility. The Hive’s modular design means retailers can scale their operations up or down depending on their needs. Whether it’s a huge warehouse serving an entire region or a smaller fulfillment center closer to customers for faster delivery, the technology adapts.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

AI robots 4

Groceries picked and packed by an AI robot  (Ocado)

So, how do you actually use this robot-powered grocery tech?

If you live in an area served by Kroger’s delivery network in the U.S., you can order groceries through the Kroger website or app. Behind the scenes, your order is picked and packed by hundreds of AI-driven robots at a fulfillment center known as the Hive. Then, a Kroger associate delivers your groceries straight to your door, often in less time than a traditional delivery. This system is the result of a partnership between Ocado and Kroger, bringing advanced automation to American grocery delivery.

IS THIS ROBOT AFTER OUR HOSPITALITY, RETAIL AND HEALTHCARE JOBS?

Beyond just groceries

What’s exciting is that Ocado’s innovations don’t stop at grocery shopping. The same robotics, AI and automation principles are being explored for other uses, like vertical farming, assisted living, car parking and even airport baggage handling. The Hive is paving the way for smarter, more automated logistics across many industries.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

AI robots 5

Kurt’s key takeaways

It’s pretty incredible to imagine your entire grocery order being picked and packed in just five minutes, without anyone actually handling your food. That’s exactly what Ocado’s Hive is doing, using smart robots and AI to make grocery shopping faster, easier and more reliable than ever before.

CLICK HERE TO GET THE FOX NEWS APP

Do you like the idea of a robot picking and packing your groceries, or do you prefer things to stay the way they are with human hands involved? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

Heart health risks could rise with this dental hygiene habit, experts warn

0

Searches for “tongue scraper” have almost doubled in the last two decades, according to Google Trends. However, some experts have warned about potential risks.

The practice of tongue-scraping (or tongue-brushing) has existed as a means of dental health for hundreds of years. 

While earlier studies concluded that scraping the tongue can improve one’s sense of taste in as little as two weeks, some have raised concerns about potential heart health risks associated with the practice.

HERE’S HOW YOU SHOULD BE CLEANING YOUR TEETH, ACCORDING TO A DENTIST

“There’s always been a strong association between good oral hygiene and heart health,” Dr. Bradley Serwer, an interventional cardiologist and chief medical officer at VitalSolution, an Ingenovis Health company, told Fox Digital.

Previous studies linked regular tongue scraping with an improved sense of taste. (iStock)

“Gingivitis or a bad gum infection has been known to cause problems with the heart on many different levels,” said the Maryland-based doctor.

Despite the potential benefits, Serwer and others have warned of a little-known cardiac risk associated with the practice.

What is tongue-scraping?

Tongue-scraping (or brushing) is the process of cleaning the tongue to keep bad bacteria, food debris and dead cells from accumulating on its surface, according to Cleveland Clinic.

Beyond brushing with a toothbrush, specific tongue-scraping tools — available at pharmacies for as little as $8 — offer an easy way to get rid of plaque and other unwanted build-up.

Woman using tongue-scraper

“Brushing is OK to do, but think about it this way — if your carpet is dirty and you scrub it, the dirt’s going to get embedded down in there,” said one dental hygienist. (iStock)

Gentle tongue-scraping performed up to once a day is recommended for adults to help remove bacteria and freshen breath, according to Dr. Whitney White of Aspen Dental.

FRIED CHICKEN-FLAVORED TOOTHPASTE SELLS OUT SHORTLY AFTER IT’S INTRODUCED

“When patients ask, I typically recommend a metal tongue scraper, as they are the best for hygienic reasons to keep clean,” White, who is based in Nevada, told Fox News Digital.

Another expert, Ohio-based dental hygienist Tenika Patterson, told Cleveland Clinic: “Tongue-scraping can do a better job at removing that plaque and bacteria from the tongue’s surface.”

A metal tongue scraper

Metal tongue scrapers are best for hygienic purposes, according to a dentist who spoke to Fox News Digital. (iStock)

“Brushing is OK to do, but think about it this way — if your carpet is dirty and you scrub it, the dirt’s going to get embedded down in there,” she said.

“But if you scrape it, it’s going to come right off the surface.”

Link to heart health

The concern with tongue-scraping is that it can cause “macroscopic cuts” on the tongue, which can potentially introduce bacteria into the bloodstream, Serwer cautioned.

Anytime bacteria enters the bloodstream, there is an increased risk of endocarditis, which is an infection of the heart valves.

7 BLOOD PRESSURE MISTAKES THAT COULD BE THROWING OFF YOUR READINGS

If left untreated, endocarditis can lead to severe heart damage, according to Cleveland Clinic.

Person using tongue scraper

Too much tongue-scraping can lower the body’s nitric oxide levels and increase the risk of issues like high blood pressure, an expert warned. (iStock)

While tongue-scraping can be good for oral health, it’s important not to overdo it, Dr. White advised.

Scraping too much can lower the body’s nitric oxide levels and increase the risk of issues like high blood pressure. 

CLICK HERE TO SIGN UP FOR OUR HEALTH NEWSLETTER

“While gentle, regular scraping helps remove harmful bacteria, doing it too often or too aggressively can disrupt the balance of good microbes on your tongue — some of which help produce nitric oxide, a compound that’s important for heart health,” White said.

‘Not a substitute’

“The most important thing a person can do is to stay on top of oral hygiene,” Serwer recommended. 

“Regular visits to the dentist, brushing and flossing can help ensure healthy gums and teeth.”

Couple dental hygiene

While brushing teeth and flossing can also introduce bacteria, those are outweighed by the benefits of maintaining healthy gums, experts agree. (iStock)

While brushing teeth and flossing can also introduce bacteria, those are outweighed by the benefits of maintaining healthy gums, experts agree.

In contrast, “the benefits of tongue scraping are quite minimal,” Serwer said.

For more Health articles, visit www.foxnews.com/health

For those who wish to continue tongue-scraping, White emphasized that less can be more.

“Since your oral health is connected to your overall health, it’s best to scrape your tongue in moderation to keep both your mouth and body in balance,” she advised.

CLICK HERE TO GET THE FOX NEWS APP

“However, it is not a necessary step in your oral health routine, and should not be a substitute for twice-daily brushing with fluoride toothpaste and daily flossing.”

North Macedonian ruins may be ancient capital linked to Alexander the Great’s family

0

Archaeologists recently uncovered the remains of a lost city dating back thousands of years – and newfound evidence suggests it may be the capital of a once-thriving civilization.

The recent excavation was announced by California State Polytechnic University, Humboldt, on April 4. It took place at Gradishte, an archaeological site near the North Macedonian village of Crnobuki; it was done with the help of experts from Macedonia’s Institute and Museum in Bitola.

Speaking to Fox News Digital, Nick Angeloff, an anthropology professor and archaeologist with Cal Poly Humboldt, said it appears likely the site is Lyncus, the lost capital of the Kingdom of Lyncestis. The kingdom was conquered by King Philip II of Macedon in 358 B.C.

SECRET ‘SISTINE CHAPEL’ DECKED OUT WITH FRESCOES IN UNLIKELY LOCATION

“Every indication is pointing toward this being the city of Lyncus, within Lyncestis,” Angeloff said. 

“Nothing is pointing away from it being Lyncus.”

Archaeologists working in North Macedonia may have uncovered an ancient, long-lost capital city. “It’s a unique find,” said one expert.  (Cal Poly Humboldt)

Lyncus was the only city associated with Upper Macedonia, according to Angeloff, and had never been found before.

“[The discovery is] very rare,” the expert said. “It’s a unique find.”

Lyncus, settled in the 7th century B.C., was the birthplace of Eurydice I of Macedon. 

DOZENS OF ANCIENT SKELETONS FOUND IN HEART OF BUSTLING CITY: ‘HARD TO IMAGINE’

Though few have heard of the ancient queen, nearly everyone has heard of her grandson, Alexander the Great.

“This is the only appropriate location that we have determined may be the ancient city of Lyncus, where Alexander the Great’s grandmother was born and raised,” he said.

Split image of coin and excavation site

A theater token was found at the site, suggesting that a theater building may be found in the future. (Cal Poly Humboldt)

“Eurydice I was a very powerful woman in that time in human history,” the archaeologist continued.

“There’s only one city that she could have come from, and we may have found it.”

She also said, “Without Eurydice, we don’t have Philip II, Alexander’s father, nor do we have Alexander the Great.”

EXPERTS SHOCKED BY ANCIENT KING ARTHUR MANUSCRIPT FOUND TUCKED INSIDE BOOK: ‘SURVIVED THE CENTURIES’

Information about the site is rapidly changing. Initially, historians believed the ruins at Gradishte were built during the reign of Macedonian leader King Philip V, who ruled from 221 to 179 B.C.

But a coin from Alexander the Great’s reign emerged, pushing it back to the 4th century B.C. Now, it looks like the site was also occupied hundreds of years before, during the Bronze Age.

At the site, archaeologists used the remote-sensing technology LiDAR (Light Detection and Ranging) to see beneath the ground. Angeloff estimated that roughly 10,000 people lived in the city at its peak, though future excavations are likely to yield more accurate information.

“The potential for archaeology across North Macedonia … is highly significant.”

“It has become very clear, using technology, that the fortress [we found] was designed to hold an entire city,” the historian said. “And we see the whole array of infrastructure required to hold a city inside fortress walls during an attack by Rome in particular in this case.”

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Angeloff added, “We were able to overlay and see what was underneath the ground. And the acropolis that it sits on, which is basically a flat hilltop, has enough rooms and infrastructure to hold an entire city inside the fortress walls.”

Spli image of site, alexander the great coin

A coin depicting Alexander the Great was found by archaeologists. (Cal Poly Humboldt)

Excavators discovered a textile workshop in addition to numerous artifacts, including a coin with Alexander the Great’s likeness, axes, game pieces, an oil lamp, even a small ceramic displaying a heart motif.

One of the most curious artifacts was a clay theater ticket, which Angeloff said was unique to North Macedonia.

“Typically, theater tickets [were] made of a metal, whether bronze or iron, but they’re always reused,” he said. “There has never been a location in North Macedonia with a theater ticket that has been found that did not have a theater.”

For more Lifestyle articles, visit foxnews.com/lifestyle

He added, “Using our LiDAR, we think we may have located the theater, and it looks, for all intents and purposes, like a Macedonian theater, not a Roman theater.”

“There’s been relatively little work and relatively little investment into this region.”

The archaeologist, stressing the historical importance of the project, said his team plans to return to North Macedonia in May and June for more excavations.

“The potential for archaeology across North Macedonia to inform our understanding of the classical [eras], as well as the Roman era, is highly significant,” Angeloff said. “There’s been relatively little work and relatively little investment into this region.”

Heart motif on object and oil lamp

An oil lamp was discovered at the excavation site, along with a ceramic artifact with heart shapes carved into it. (Cal Poly Humboldt)

“So we have an opportunity here to expand our knowledge of the times of Alexander the Great, [and] the times of the Roman Empire, exponentially, through our work in Macedonia.”

CLICK HERE TO GET THE FOX NEWS APP

Fox News Digital’s Kyle Schmidbauer contributed to this report.

Indiana takes first action in long shot plan to acquire parts of Illinois

0

Indiana is taking a first step toward a rather unlikely effort to amend its border and acquire parts of Illinois.

The legislature in the Hoosier State passed a bill last week to establish the Indiana-Illinois Boundary Adjustment Commission that would recommend whether to alter the border between the two states.

Indiana Gov. Mike Braun, a Republican, plans to sign the measure into law, his office said on Friday. The governor will then face a Sept. 1 deadline to schedule the commission’s first meeting.

CONSERVATIVE PORTION OF BLUE STATE LOOKING TO BREAK OFF AND JOIN NEIGHBORING RED STATE

Indiana is taking a first step toward a rather unlikely effort to amend its border and acquire parts of Illinois. (AP)

This comes as residents of some counties in Illinois seek to separate from the densely populated and deep blue Chicago area.

But despite support from the Indiana government and the people in the Illinois counties that would change states, the Illinois government and the U.S. Congress would need to approve the plan to change state boundaries.

Illinois’ top elected officials do not support the idea.

A companion bill in Illinois authorizing the state to participate in the commission to change the border has not received a hearing in an Illinois House committee. Democrat Illinois Gov. J.B. Pritzker also described the Indiana measure earlier this year as “a stunt.”

Mike Braun

Indiana Gov. Mike Braun, a Republican, plans to sign the measure into law. (REUTERS/Elizabeth Frantz)

Minor boundary changes between states are not a new idea, as there have been at least 50 in U.S. history, according to the National Center for Interstate Compacts at The Council of State Governments. However, no major changes have been implemented since the Civil War era, when some counties in Virginia separated to create West Virginia.

The current effort to change the border between Illinois and Indiana is fueled in part by political divisions. The Chicago area is controlled by Democrats and, given the area’s large population, the party also controls the state government, while Republicans represent many other parts of Illinois. The Indiana government, meanwhile, is controlled by Republicans.

NY LAWMAKER CALLS FOR STATEN ISLAND TO SECEDE

A photo of Gov. J.B. Pritzker

Democrat Illinois Gov. J.B. Pritzker has described the Indiana measure as “a stunt.” (Erin Hooley/Chicago Tribune/Tribune News Service via Getty Images)

CLICK HERE TO GET THE FOX NEWS APP

In the last five years, voters in 33 Illinois counties have approved ballot measures asking if they want to consider separating from Cook County, a county that includes Chicago, to form a new state. But the initiative does not necessarily mean they would join Indiana, if given the opportunity.

A similar effort is ongoing in eastern Oregon, as some counties in that Democrat-controlled state want to break away and join Republican-led Idaho. The Idaho House approved a measure two years ago allowing Oregon to enter into discussions, but similar measures have not moved forward as they remain stuck in committees in the Oregon legislature.

The Associated Press contributed to this report.

Cyberattacks on nursing homes: How to protect your loved ones

0


Taking care of your loved ones comes in many forms: cooking a warm meal after a long day, lending a listening ear when life gets tough, sending a check-in text just because or making sure they receive the right support at a nursing home. But as recent events have shown, care shouldn’t stop there. 

Physical and mental well-being are essential, but protecting finances and personal information is just as important. 

I’ll walk you through some steps you can take and some services worth considering to stay one step ahead of cybercriminals.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

cyberattack 1

A man being helped with technology (Kurt “CyberGuy” Knutsson)

Protecting nursing home residents from cyberattacks and data breaches

Scammers and fraudsters often have no moral compass, and they increasingly target the most vulnerable, especially nursing homes and the personal data of their residents.

Take the case of Hillcrest Nursing Home, the victim of a cyberattack that led to a data breach affecting more than 100,000 people. Names, birth dates, Social Security numbers, patient records, treatment information, insurance details and provider data — all leaked in a single incident.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

The good news? There are things you can do to help safeguard your loved ones’ financial and personal data in the event of a similar breach.

cyberattack 2

A group of elderly nursing home residents   (Kurt “CyberGuy” Knutsson)

HOW CRIMINALS ARE EXPLOITING PERSONAL INFORMATION TO TARGET VULNERABLE SENIORS IN ELDER FRAUD

Cyberattacks exploit vulnerable systems and elderly patients

In the first few months of 2025 alone, more than half a dozen nursing homes have reported some form of cyberattack. Experts say elderly patients are being targeted because they’re simply easier marks, from limited digital literacy to a lower likelihood of regularly monitoring their financial or medical accounts.

Add to that the often outdated and vulnerable IT infrastructure of nursing homes, and you’ve got a prime target. As a security advisor from Optiv, a cybersecurity solutions company, explains, these centers typically operate on tight budgets, which means cybersecurity isn’t always a top priority — or even feasible at the level it should be.

cyberattack 3

A woman in a wheelchair in a nursing home (Kurt “CyberGuy” Knutsson)

BEST TECH TO HELP A LOVED ONE WITH MEMORY ISSUES

6 things you should do to make sure your loved ones are safe from cyber threats and identity theft

Cybercriminals are becoming increasingly sophisticated, but, with the right precautions, you can protect your loved ones from falling victim to these threats. Here’s a guide to six essential actions you can take to safeguard their personal and financial information. 

1. Freeze credit accounts to prevent fraud

Data breaches usually happen for one reason — financial gain. This often involves selling stolen information to scammers or hackers who use it for fraudulent activities, such as running credit fraud schemes. Since many forms of identity theft revolve around credit accounts, it’s crucial to take action if your or a loved one’s personal data has been exposed.

One of the most effective ways to prevent credit fraud is by placing a security freeze on your credit accounts. A security freeze stops anyone from opening new accounts, issuing new cards or conducting any credit-related activities in your name while the freeze is in place.

If managing this process feels overwhelming, consider using an identity theft protection service. These services can handle placing and managing security freezes on your behalf, saving you time and ensuring the process is done correctly. Many of these services also offer additional features, such as credit monitoring and alerts, to help you stay on top of potential threats to your personal information. Taking this step can significantly reduce the risk of identity theft and provide peace of mind that your financial information is secure.

Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

2. Place a fraud alert

A fraud alert is an extra layer of protection for your credit accounts. Like a credit freeze, you can set it up with all three credit bureaus.

When you activate a fraud alert, it notifies the bureaus that there may be suspicious activity on your account. As a result, any attempts to open new credit or make changes will be looked at more carefully.

Equifax: You can place a fraud alert online or by calling their customer support at (888) 298-0045.

Experian: Place a fraud alert online or contact their customer service at (888) 397-3742.

TransUnion: You can place a fraud alert online or call them at (800) 916-8800.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Sign them up for a data removal service

Now that your credit accounts are secured, there’s one more step worth taking, a broader layer of protection. I’m talking about personal data removal services. These companies specialize in removing your personal information from the internet. With how easy it is for someone to find details like your name, address, contact info, relatives  and more, you and your loved ones are at greater risk for scams and identity theft.

This is especially true for older adults, who are often seen as easier targets by scammers. Even just for peace of mind, it’s worth taking this extra step. There are plenty of services out there that tackle this issue. Check out my top picks for data removal services here.

4. Install strong antivirus software

Install strong antivirus software to further safeguard your loved ones’ devices and personal information. Strong antivirus programs help block malware, spyware and phishing attempts that can lead to identity theft.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 

5. Regularly review financial statements

Encourage your loved ones to regularly review their bank and credit card statements for any suspicious transactions or do it for them. Early detection can help prevent significant financial loss.

6. Educate on internet safety

Many elderly people fall victim to scams due to limited digital literacy. Providing basic cybersecurity education, such as recognizing phishing emails, avoiding suspicious links and using strong passwords, can significantly reduce their risk of being targeted. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed Password Managers of 2025 here.

HOW VR TECHNOLOGY IS CURING LONELINESS IN SENIORS 

Kurt’s key takeaways 

Remember that protecting your loved ones from cyber threats and identity theft is an ongoing process. It’s not just about taking a few steps and forgetting about it. It’s about continually updating your strategies as new threats emerge. By combining these measures, like freezing credit accounts, using fraud alerts, removing personal data from the internet, installing strong antivirus software, regularly reviewing financial statements and educating them on internet safety, you can significantly reduce the risk of identity theft and provide peace of mind for both you and your loved ones.

CLICK HERE TO GET THE FOX NEWS APP

Have you or a loved one ever been a victim of a cyberattack or identity theft? How did you handle it? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter 

Ask Kurt a question or let us know what stories you’d like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link

250th American Revolution anniversary begs question: Who fired the first shot?

0

As the nation marks 250 years since the Battles of Lexington and Concord, which ignited the American Revolution, one mystery refuses to die. 

Who fired the first shot?

It’s been called “the shot heard ’round the world,” but when it comes to who pulled the trigger, the truth remains murky. What we do know is someone fired a musket.

A musket cracked through the early morning silence of April 19, 1775. When the smoke cleared, eight American militiamen were dead, and the world would never be the same.

That one shot lit the fuse for a war that would reshape history.

‘ONE IF BY LAND’: WHITE HOUSE, BOSTON CELEBRATES 250TH ANNIVERSARY OF PAUL REVERE’S MIDNIGHT RIDE

Despite how it’s often portrayed, including in a recent piece by The Washington Post, the facts don’t actually point to the American militia as the clear instigator. Nor do they show the British firing under direct orders.

The Library of Congress is blunt about it.

“There is no evidence to show clearly which side fired the first shot in the skirmish at Lexington,” it maintains.

British Regulars march past a fallen New England colonial militia, also known as minutemen, during a reenactment celebration of the 250th anniversary of the Battle of Lexington and the start of the American Revolution Saturday in Lexington, Mass. (AP Photo/Charles Krupa)

In other words, the “fog of war” was already thick before a war had even officially started.

And yet the colonial side gained a powerful edge, telling its story first.

“Whatever the truth of who fired the first shot,” the Library of Congress notes, “the patriots were first to get their version of the events out to the American public. The effect was to rally hundreds, if not thousands, of colonists to the rebellion.”

UNCANCEL THE MINUTEMEN: CELEBRATE LEXINGTON AND CONCORD HEROES, BLACK AND WHITE, ON BATTLE’S 250TH ANNIVERSARY

That messaging advantage, mixed with years of frustration over British control, helped turn the moment into a rallying cry. But historians are still debating the actual sequence of events. Was it a nervous redcoat? A skittish militiaman? Or just a misfire that no one intended?

One thing we can say is that no one has ever been definitively named as the person who fired first. Not a single British soldier. Not a single American with a musket.

Battle of lexington reenactment

New England colonial militia stand in line while facing the British Regulars during a reenactment celebration of the 250th anniversary of the Battle of Lexington and the start of the American Revolution Saturday in Lexington, Mass. (AP Photo/Charles Krupa)

The standoff began with shouted commands and high tension, then quickly escalated into deadly gunfire. As CBS Boston recently noted, trying to declare a single “official” start to the war is more complicated than many think.

The first to die fell at Lexington. Eight colonial militiamen, also known as minutemen, were killed and others were wounded. Just a few hours later, the fighting escalated at Concord’s North Bridge, where American militias pushed back British Regulars. That was the beginning of something much bigger.

A White House proclamation for the 250th anniversary calls the events at Lexington a “British ambush,” reinforcing a narrative of British aggression. But that language, while dramatic, doesn’t fully reflect the historical debate still unfolding. Even now, the incident remains cloaked in uncertainty.

british regulars reenact

British Regulars fire on New England colonial militia during a reenactment celebration of the 250th anniversary of the Battle of Lexington Saturday in Lexington, Mass. (AP Photo/Charles Krupa)

So, did the British fire first?

The best evidence we have — eyewitness reports, British and colonial accounts and statements preserved by the Library of Congress — leans in that direction. It’s likely the first shot came from the British side, though not under direct orders. More likely, it was a moment of confusion, panic and fear. In the chaos, someone squeezed the trigger.

CLICK HERE TO GET THE FOX NEWS APP

But, again, no one individual has ever been proven to be that person. And maybe, in a strange way, that’s part of the story.

Because asking who fired the first shot isn’t just a history lesson, it’s a symbol. That single shot marked the start of America’s long road to liberty. 

Two-and-a-half centuries later, the fact that we’re still asking only adds to the legend.

The Museum of the American Revolution in Philadelphia declined Fox News Digital’s request for comment.

Virginia confirms child infected with first measles case in the state

0

The Virginia Department of Health (VDH) recently reported the state’s first measles case of the year, identifying the patient as a child under 4 years old who recently traveled internationally. 

While the department released limited information about the patient, it confirmed the child lives in the northwest region. 

Health officials are coordinating efforts to identify anyone who might have been exposed, according to a news release from VDH.

Measles outbreaks have been declared in eight states, the most recent announced Thursday in Michigan.

MEASLES OUTBREAKS NOW DECLARED IN 8 STATES, INCLUDING MICHIGAN’S FIRST IN 5 YEARS

A patient with measles (iStock)

The Michigan Department of Health and Human Services and Oakland County Health Division confirmed the first case of measles in Oakland County March 14, and the state is up to eight cases detected this year.

“This first case of measles in Virginia this year is a reminder of how easily this highly contagious disease can spread, particularly with international travel,” said VDH epidemiologist Laurie Forlano. 

Forlano said the MMR vaccination remains the best defense against measles and is “safe and highly effective” at protecting people and preventing outbreaks.

Two doses of the vaccine are given to provide lifetime protection. 

“We urge Virginians, especially those planning to travel, to check their vaccination status, talk to their health care provider and get the MMR vaccine if needed,” she said.

MEASLES OUTBREAK CONTINUES: SEE WHICH STATES HAVE REPORTED CASES

A poster to spread Measles awareness offers symptoms to watch out for, facts about measles, and resources if someone may have it.

A measles advisory is shown on a bulletin board outside Gaines County Courthouse in Seminole, Texas.  (Brandon Bell/Getty Images)

Anyone who was at the Kaiser Permanente Caton Hill Medical Center Advanced Urgent Care from 10 a.m. to 1:30 p.m. Tuesday or at the Kaiser Permanente Fredericksburg Medical Center Pediatrics Department from noon to 5 p.m. Wednesday may have been exposed, officials said.

Those who received a measles-containing vaccine (either the measles, mumps and rubella [MMR] vaccine or a measles-only vaccine available in other countries), may be at risk of developing measles. 

However, those who received two doses of a measles-containing vaccine or were born before 1957 are protected and do not need to take any action.

In Virginia, about 95% of kindergartners are fully vaccinated. 

IS MMR VACCINE SAFE FOR KIDS? DR. NICOLE SAPHIER ADDRESSES CONCERNS AS MEASLES CASES RISE

An adult woman holds an upset little girl as she is bandaged up after receiving her vaccines

A child receives a vaccination in Los Angeles March 25.  (Allen J. Schaben/Los Angeles Times via Getty Images)

However, infants who are too young to be vaccinated and others who are not vaccinated are susceptible to measles. 

Infants 6 months through 11 months of age who will be traveling internationally or to an area where an outbreak is reported should receive one dose of MMR vaccine prior to travel.

Measles is a highly contagious illness that can spread easily through the air when an infected person breathes, coughs or sneezes, according to the VDH.

Symptoms usually appear in two stages, with first-stage symptoms seven to 14 days after exposure being a fever of greater than 101 degrees, runny nose, watery red eyes and a cough. 

DANGEROUS FUNGUS SPREADING IN US HOSPITALS HAS ‘RAPIDLY INCREASED’

A box of the MMR vaccine, closeup of gloved hand holding box of the MMR vaccine next to a vial of the vaccine.

A box containing measles vaccinations in Houston (Raquel Natalicchio/Houston Chronicle via Getty Images)

The second stage starts three to five days after symptoms begin, when a rash appears on the face and spreads to the rest of the body. 

CLICK HERE TO GET THE FOX NEWS APP    

People with measles are contagious from four days before the rash appears through four days after the rash appears, according to health officials.

Fox News Digital’s Angelica Stabile contributed to this report.

Vitamin D shown to prevent and treat deadly cancer type, study finds

0

Vitamin D is widely known for boosting bone health, muscle strength and immune function, but it also has a range of other benefits — including cancer prevention.

A new study published in the journal Nutrients suggests that the common vitamin is effective in preventing and treating colorectal cancer.

Hungarian researchers conducted a meta-analysis of 50 previous studies that included more than 1.3 million participants, focusing on vitamin D’s potential effects on cancer risk, immunity and inflammation.

COMMON VITAMIN SHOWN TO REDUCE AUTOIMMUNE DISEASE

“The most important finding is that vitamin D plays a critical role in the prevention and treatment of colorectal cancer,” study author János Tamás Varga, PhD, associate professor at Semmelweis University in Budapest, told Fox News Digital.

Vitamin D is widely known for boosting bone health, muscle strength and immune function, but it also has a range of other benefits — including cancer prevention. (iStock)

“Our research clearly supports the strong correlation between 25-hydroxyvitamin D (the primary form of vitamin D) levels and cancer outcomes.”

Cancer patients with low vitamin D levels showed poorer prognoses.

Vitamin D has been shown to reduce inflammation, promote the death of cancer cells, inhibit tumor growth and enhance immune response, the researchers found. 

VITAMIN D DEFICIENCY LINKED TO DEMENTIA IN CERTAIN POPULATIONS WHEN LEVELS ARE VERY LOW: STUDY

“These mechanisms significantly influence the pathophysiology of colorectal cancer,” Varga noted. 

In addition to prevention, vitamin D supplementation was also shown to improve survival rates among patients with advanced-stage colorectal cancer, according to the research.

“The results suggest that the effect of vitamin D may depend on factors such as the dosage, the individual condition of the patients and the duration of treatment,” Vargas added.

Morning sun

The primary source of vitamin D is exposure to the sun’s ultraviolet (UV) rays. (iStock)

The American Cancer Society (ACS) has previously referenced studies suggesting that vitamin D could lower cancer risk, particularly colorectal cancer.

“However, large studies have not found that vitamin D supplements lower the risk of colorectal polyps (pre-cancerous growths) or cancer,” the ACS stated on its website.

“The optimal dosage should be tailored to the individual’s health condition and current vitamin D levels.” 

One important limitation of the research is that the studies included in the analysis used different vitamin D dosages and involved patients at various stages of cancer, the authors noted. 

They called for further research to accurately determine the optimal dosage and “therapeutic efficacy.”

Recommendations for Americans

“Based on our research, we recommend that individuals at high risk of colorectal cancer monitor their vitamin D levels and, if necessary, take a daily vitamin D supplement of 1000–4000 IU, especially for those with low vitamin D levels,” lead study author Dr. Monika Fekete, medical doctor at Semmelweis University, told Fox News Digital.

“The optimal dosage should be tailored to the individual’s health condition and current vitamin D levels.” 

CLICK HERE TO GET THE FOX NEWS APP

For physicians, the researchers suggest routinely measuring and supplementing vitamin D levels for both prevention and treatment purposes.

“Vitamin D plays a crucial role in the treatment and prevention of colorectal cancer, but further research is needed to determine the optimal dosage and the specific role of genetic factors,” Fekete added.

Man at doctor

One important limitation of the research is that the studies included in the analysis used different vitamin D dosages and involved patients at various stages of cancer, the authors noted.  (iStock)

“The molecular mechanisms of vitamin D — such as the regulation of oncogenes (mutated genes that can lead to cancer) and inhibition of tumor progression — require further scientific investigation.”

As the effect of vitamin D is closely linked to the patient’s condition, the doctor said, treatment recommendations should be personalized.

CLICK HERE TO SIGN UP FOR OUR HEALTH NEWSLETTER

The primary source of vitamin D is exposure to the sun’s ultraviolet (UV) rays.

It can also be obtained from dietary sources, according to the ACS, including fatty fish and some mushrooms.

Milk and orange juice

Some foods, including milk and some orange juices and cereals, are fortified with vitamin D. (iStock)

There are also some vitamin D-fortified foods, including milk, some orange juices and cereals, the above source stated.

People can also take vitamin D supplements to boost their levels.

For more Health articles, visit www.foxnews.com/health

“Most Americans do not get enough vitamin D in their diets, and many have low vitamin D levels in their blood,” the ACS said on its website. 

“While the role of vitamin D in lowering cancer risk is still an active area of research and debate, avoiding low vitamin D levels is recommended.”

Austrian, Israeli archaeologists at Last Supper site unveil unique graffiti

0

Archaeologists recently unveiled a series of strange, centuries-old inscriptions in the room believed to be the site of the Last Supper – just in time for Easter.

The Room of the Last Supper, also known as the Cenacle, is located on Mount Zion in Jerusalem. The hall was built by the Crusaders in the 12th century, though pilgrims have venerated the site as early as the 4th century.

The recent discovery was announced by the Austrian Academy of Science (OeAW) on April 16, with the help of the Israel Antiquities Authority (IAA). Archaeologists identified some 40 elements of graffiti, including five coats of arms.

RARE 4,000-YEAR-OLD MUSICAL INSTRUMENT ‘BURIED IN THE GROUND’ PUZZLES ARCHAEOLOGISTS

Most of the inscriptions date back to the late Middle Ages. 

Researchers found that the site attracted numerous international tourists – and several pilgrims left messages in their native language.

Researchers recently unveiled never-before-seen graffiti found at the site of the Last Supper. (Heritage Conservation Jerusalem Pikiwiki Israel; Shai Halevi / © Israel Antiquities Authority)

Pictures from the site show various coats of arms and writings in ancient languages. 

A drawing of a scorpion was also found — presumably when Suleiman the Magnificent took over the Cenacle in 1523 and turned it into a mosque.

One interesting depiction of the Last Supper was found above a German coat of arms. 

The inscriptions were written by pilgrims from Serbia, the modern-day Czech Republic and Germany, as well as Armenia and Syria. 

ANCIENT TREASURE FOUND BY METAL DETECTORISTS IN ‘IMPORTANT’ AND LEGENDARY REGION

Most of the graffiti, though, was left by Arabic-speaking Christians.

One interesting depiction of the Last Supper was found above a German coat of arms, which depicted a goblet, a platter, and a round piece of bread with a hole in it, similar to a Jerusalem bagel. 

Black and white inscriptions

This image shows a Styrian coat of arms, as well as an Armenian “Christmas 1300” inscription and a Serbian inscription reading “Akakius.” (Shai Halevi / © Israel Antiquities Authority)

Researchers also found an Armenian inscription reading “Christmas 1300,” as well as an Arabic inscription reading “ya al-ḤalabÄ«ya.”

For more Lifestyle articles, visit foxnews.com/lifestyle

“Based on the double use of the feminine suffix ‘ya’, the researchers concluded that this is a graffito of a female Christian pilgrim from the Syrian city of Aleppo, making it a rare material trace of pre-modern female pilgrimage,” the statement noted.

Syrian woman inscription

Researchers found the inscription of a Syrian woman from Aleppo, seen here. (Shai Halevi / © Israel Antiquities Authority)

Researchers first documented the inscriptions using multispectral photography and Reflectance Transformation Imaging (RTI), before analyzing the images in a lab. 

Analysts then “digitally merged” the two photographic techniques to make the inscriptions readable.

In the press release, historian Ilya Berkovich said the graffiti was surprisingly diverse, with multiple countries being represented on the walls of the hall.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

“When put together, the inscriptions provide a unique insight into the geographical origins of the pilgrims,” Berkovich said in the release. “This was far more diverse than current Western-dominated research perspective led us to believe.”

Christianity-related finds

The latest discovery is one of many Christianity-related finds in recent months. 

Earlier in April, an archaeologist excavating the Church of the Holy Sepulchre found proof of an ancient garden at the site, consistent with biblical scripture.

Medieval graffiti of scorpion

A scorpion was carved into the wall of the hall, presumably around the time Suleiman the Magnificent took the site over. (Shai Halevi / © Israel Antiquities Authority)

In December, archaeologists unveiled the known evidence of Christianity north of Italy.

CLICK HERE TO GET THE FOX NEWS APP

It consisted of a silver inscription dating back to between 230 and 260 A.D.