23.6 C
New York
Wednesday, July 2, 2025
Home Blog Page 3

Woman’s Facebook account hacked through friend impersonation scam

0


NEWYou can now listen to Fox News articles!

Ever had that sinking feeling when you realize something’s gone wrong with your social media account?

You’re definitely not alone. With cybercrime and identity theft on the rise, more and more people are finding themselves locked out of their online accounts, often through no fault of their own.

Let’s take a look at a real-life example that shows just how sophisticated these scams can be. Below is an email we received from Marilyn of Hampton, Virginia, who wanted to share her story as a warning to others:

“Someone impersonated a Facebook friend of mine and sent a message via FB Messenger asking for a favor. They wanted to use the FB feature to ask a friend to help recover their account. I went to their FB page, and it was a clone (can’t see it now). The page had their real-looking profile pic and showed a picture of them out of town helping a family member move. 

A CLOSE CALL WITH A FACEBOOK SCAM THAT TRIED TO STEAL CREDIT CARD INFO

“I asked them to call me so I could know it was them. They video-called me on FB Messenger, and it showed a moving picture of them smiling, but the connection was ‘bad’ and got ‘lost.’  I asked them to tell me something about myself, and they sent me the name of my son (who has a different last name). Satisfied, I agreed to help. They asked that I send them a recovery code which I did. In a flash, they changed the emails (which one was newly fake) and my password, which essentially locked the real me out. 

“I tried to recover my account, but the instructions listed on FB sent me in circles. I Googled FB support and called a support number. They installed AnyDesk on my phone and scanned it. Said someone had purchased $17,000 in bitcoins. If I allowed them to send me one dollar they could verify something. I realized it was a scam and hung up.

“I’ve since changed my email address and passwords for important accounts. Also have created a new FB account. However, I was admin for 3 FB groups, and the hacker got into them. Deleted one year of posts and photos from one group. And is still listed as Admin in another group. I cannot remove them. I imagine they stole my old FB account and are still operating incognito on some sites. Went to my local police station yesterday. The officer said in order to report something it had to be a tangible loss such as money or property. And I should consider reporting it to IC3.gov. How would I find a live person in my area to meet with in person to help me with cyber concerns. Thought you’d appreciate my story, how one awful mistake can lead to thousands of problems.”

Marilyn, we’re really sorry to hear about your experience. It sounds incredibly frustrating and stressful, and your story highlights how even careful people can be targeted by increasingly clever scams. Here are some steps you can take to address the situation and protect yourself moving forward.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join.

facebook scam 1

A Facebook account on a laptop and smartphone   (Kurt “CyberGuy” Knutsson)

Recovering your Facebook account

Having your Facebook account compromised after a hacker has changed your email and password and completely locked you out of your profile can be devastating. While Facebook offers account recovery options, these become challenging when hackers have altered your login credentials. However, don’t worry, as recovery is still possible, depending on certain factors. 

CLONED ON FACEBOOK? HERE’S HOW TO TAKE BACK CONTROL

Report the hack to Facebook

If you have access to a device you previously used to log into Facebook, you can use it to report that your account has been hacked.

facebook scam 2

Steps to report the hack to Facebook  (Kurt “CyberGuy” Knutsson)

  • Follow the on-screen instructions to help Facebook locate your account and start the recovery process.
  • You will need to verify your identity and recover your account. This may include:Answering security questions you previously set up.Identifying photos of friends if you had previously tagged them.Providing a government-issued ID for verification.
  • Answering security questions you previously set up.
  • Identifying photos of friends if you had previously tagged them.
  • Providing a government-issued ID for verification.

Once Facebook verifies your identity, it will help you regain access to your account. This process may take several days, especially if you need to submit ID verification. 

Recover your account

The hacker may have changed your password, but Facebook can still use your email address or phone number to help you regain access, even if the hacker changed them on your Facebook profile. Ensure you still have access to these contact methods and follow the steps below.

  • Go to facebook.com.
  • Click Forgot password? below the login form.
facebook scam 3

Steps to ensure you have access to your FaceBook account  (Kurt “CyberGuy” Knutsson)

  • Follow the on-screen instructions to use your email address or phone number to recover the account.

Remove the hacker from groups

After regaining access to your Facebook account, you should remove the hacker from any groups that you are an administrator of. If you’re not an administrator or you have lost your admin privileges, you should file a report with Facebook so you can either get them removed or reclaim your admin rights.

  • Visit Facebook’s Help Center to file a report.
  • Pick the scenario that best describes your situation.
  • Follow the instructions provided by Facebook to report the issue.

Unfortunately, if the hacker removed you as an admin and added themselves, it can be very difficult to regain control. Continue to report the group as compromised and ask other group members to do the same.

Avoiding secondary scams

Marilyn’s story also highlights a second danger of fake support numbers and remote access scams. If you ever find a “Facebook support” phone number online, be extremely cautious. Facebook does not offer phone support for account recovery. Never install remote access apps like AnyDesk at the request of someone claiming to be tech support unless you are absolutely sure of their legitimacy. Scammers use these tools to gain access to your device and personal information.

Reporting the incident to authorities and organizations 

When your online accounts are compromised, it’s important to report the incident to the appropriate authorities and organizations. Your report will not only help you recover from the hacking incident, it will also assist in preventing similar incidents from affecting others.

Knowing where to report these incidents is essential. It can make a significant difference in the investigation and resolution of your case.

Internet Crime Complaint Center (IC3)

As suggested by the police in the email, the Internet Crime Complaint Center (IC3) can help. It’s a joint operation between the FBI and the National White Collar Crime Center for Americans to report cybercrime and fraud carried out over the internet. Visit IC3.gov to file a complaint.

You may not get a direct response, but your experience can help them fight cybercrime and identify threats better in the future. If your case requires them to take action, they will do whatever it takes to find you justice.

Local cybersecurity help

You can also find local cybersecurity experts through the Cybersecurity and Infrastructure Security Agency (CISA). Check if it has a regional office located near you. It will have trained professionals who understand local threats. Their experts can provide you with personalized guidance for your situation. They also offer resources and training to help prevent future cybersecurity incidents.

Protecting your online identity

Protecting your online identity is crucial in today’s digital landscape, especially if you created another Facebook account because the old one was unrecoverable. There’s no telling if cybercriminals will try to gain unauthorized access to those as well.

Here are essential steps to safeguard your digital presence and prevent future security breaches on Facebook and beyond.

1. Change passwords

Continue to change passwords for all your important accounts, including email, banking and social media. Use strong, unique passwords for each account by combining uppercase letters, numbers and special characters. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed Password Managers of 2025 here.

2. Enable two-factor authentication

Enable two-factor authentication (2FA) on all your accounts to add an extra layer of security. This means you’ll need both your password and a second form of verification (like a code sent to your phone) to log in. So, even if hackers have your password, it will be useless if they don’t have the second verification factor. You can easily do this on Facebook using the steps below:

  • Log in to your Facebook account.
  • Click your profile picture in the top-right corner.
  • Select Settings & Privacy in the menu.
facebook scam 4

Steps to enable 2FA on Facebook   (Kurt “CyberGuy” Knutsson)

  • Navigate to Settings & privacy on Facebook.
  • Click Settings in the submenu.
facebook scam 5

Steps to enable 2FA on Facebook   (Kurt “CyberGuy” Knutsson)

  • Click Accounts Center on the left side menu.
facebook scam 6

Steps to enable 2FA on Facebook   (Kurt “CyberGuy” Knutsson)

  • Click Password and security in the left side menu and then select Two-factor authentication on the right
facebook scam 7

Steps to enable 2FA on Facebook  (Kurt “CyberGuy” Knutsson)

  • Select your account in the pop-up.
facebook scam 8

Steps to enable 2FA on Facebook  (Kurt “CyberGuy” Knutsson)

  • Enter the code Facebook sends to your linked email and click Continue.
facebook scam 9

Steps to enable 2FA on Facebook  (Kurt “CyberGuy” Knutsson)

  • Re-enter your password and click Continue.
facebook scam 10

Steps to enable 2FA on Facebook   (Kurt “CyberGuy” Knutsson)

  • In the How you get a login code section, choose a method and follow the steps to complete the setup. The recommended option is the Authentication app, which will link you to an authentication app like Google Authenticator or Microsoft Authenticator. Be sure to also add a backup method in case you don’t have access to the authenticator app. You can do this by clicking Text message in the Add a backup method section and following the instructions to get codes sent to your phone via text message.
facebook scam 11

Steps to enable 2FA on Facebook  (Kurt “CyberGuy” Knutsson)

LOST ACCESS? HERE’S HOW TO RECLAIM YOUR FACEBOOK ACCOUNT

3. Device security after a remote access scam

If you installed AnyDesk or any other remote access tool at the scammer’s request, your device could still be at risk. Immediately uninstall the app, run a full antivirus and anti-malware scan and change your passwords from a different, secure device. If you notice ongoing suspicious activity, consider resetting your device to factory settings. Here are the steps to reset your iPhoneAndroidPC and Mac.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices

4. Monitor your accounts

Keep an eye on your accounts for any suspicious activity.  Also, consider using an identity theft protection service. Identity Theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of my No. 1 pick is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any lossesSee my tips and best picks on how to protect yourself from identity theft.

5. Finding local help

When dealing with Facebook account security issues, you can also look to local support to help you out. It can provide personalized guidance for recovering compromised Facebook accounts and help you establish better security measures. You just need to find the right local resources to address your Facebook-related cybersecurity concerns.

Local cybersecurity firms

Look for local cybersecurity firms or consultants who can provide in-person assistance with account recovery. They will provide experts who specialize in dealing with social media hacks and identity theft. You can find them with a quick Google search like “Local cybersecurity firms near me.” You can also look in local business directories or ask around in your professional networks. Many offer free initial consultations to assess your situation and explain their services.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Community resources

You can also reach out to your community for valuable cybersecurity resources and education opportunities. Your local libraries and community centers may offer free workshops to help residents stay safe online. Government offices also host frequent training sessions focused on helping people protect their digital accounts. The good thing about these programs is that they often provide hands-on guidance for understanding and implementing better security practices.

Extra protection steps 

Protecting your online accounts requires vigilance and knowledge of the best security practices. With cyber threats constantly evolving, understanding how to defend against common attacks is crucial. These tips will help safeguard your digital presence and prevent unauthorized access to your accounts.

Be cautious with personal information

Scammers and cybercriminals are constantly developing new tactics to steal sensitive data. You need to understand how to safeguard your information to prevent yourself from becoming one of their victims.

Here are key ways to protect your personal information online:

Never: Share your passwords, verification codes or account recovery information, even with people who claim to be friends or family.

Always: Verify the person’s identity through multiple channels; don’t rely solely on their social media profiles, messages or emails.

Be skeptical: Of urgent requests for personal data, especially those pressuring you to act quickly before something bad happens.

Check: Sender email addresses carefully. Scammers often use addresses that look similar to legitimate ones.

When in doubt: Contact friends or companies directly through official channels rather than responding to incoming messages.

Consider investing in a personal data removal service: As a final step, consider using a reputable personal data removal service. These services can help remove your personal details from data broker sites and reduce your exposure to future scams or identity theft. Taking this extra precaution can further protect your privacy and give you greater peace of mind online.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 

Get a free scan to find out if your personal information is already out on the web

Kurt’s key takeaways

You should never share Facebook account recovery codes or any verification information with anyone because scammers can impersonate those close to you to hack your account. Also, ensure you protect yourself by enabling two-factor authentication on Facebook and staying vigilant about suspicious requests.

CLICK HERE TO GET THE FOX NEWS APP

If you have ever been in Marilyn’s situation, what steps did you take to recover your account and protect yourself from future attacks? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

Shanghai historic building moved by 432 robots to make way for development

0


NEWYou can now listen to Fox News articles!

Shanghai is no stranger to jaw-dropping feats of engineering. 

In the latest example, a Shanghai historic building moved by robots is capturing global attention. The relocation of the complex in Huayang, a Shikumen-style building weighing about 7,500 metric tons (approximately 8,267 U.S. tons) and covering roughly 43,400 square feet, is truly rewriting the rules. 

This ambitious project is powered by an army of 432 small robots that are moving the massive structure about 33 feet each day to make way for a new underground development. Let’s dive into how this is happening, why it matters and what it means for the future of urban preservation.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join.

ROBOTS STEP INTO THE RING FOR A FIRST-EVER BOXING MATCH

robots moving building 1

Over 400 small robots are moving the complex in Huayang. (Shanghai Government)

What makes the Shanghai historic building moved by robots so special?

The Huayanli complex is a set of three brick-and-wood buildings constructed between the 1920s and 1930s. Located in the heart of Shanghai’s historic Zhangyuan area, these structures are classic examples of shikumen architecture, which is a unique blend of Western and Chinese design. Zhangyuan itself is over 140 years old and is one of Shanghai’s largest and best-preserved shikumen neighborhoods.

robots move building 2

Over 430 small robots are moving the Huayanli complex  (Shanghai Government)

DELIVERY ROBOT AUTONOMOUSLY LIFTS AND TRANSPORTS HEAVY CARGO

Why is a Shanghai historic building being moved by robots?

The relocation is not just for show. The city is building a three-story underground center beneath the complex that will include over 570,000 square feet of cultural and commercial space, a parking garage with more than 100 spots and a transportation hub that will connect three major subway lines. By preserving the historic Huayanli complex above ground while adding modern infrastructure below, Shanghai is finding a smart balance between honoring its heritage and embracing progress.

robots move building 3

Over 430 small robots are moving the Huayanli complex  (Shanghai Government)

BUILDING-IN-A-BOX TRANSFORMS INTO A PORTABLE TINY HOME IN MINUTES

The challenges: Tight spaces and dense history

Moving a building of this size is tough enough, but the challenge is multiplied by Zhangyuan’s dense web of narrow alleys and closely packed historic buildings. Traditional relocation methods simply would not fit. The area’s historic significance also means that any mistake could damage irreplaceable architecture, including the 1928 “great hall” that once housed a patriotic night school.

robots moving building 4

Over 400 small robots are moving the Huayanli complex  (Shanghai Government)

SOLAR-POWERED ROOF WRAPS NEW MEGA MODERN OPERA HOUSE

How 432 robots are moving a historic Shanghai building

Instead of using cranes or bulldozers, engineers put 432 small walking robots to work. These robots gently lift the building and slowly move it forward, inch by inch, covering about 33 feet each day. To achieve this incredible level of precision, the project relies on several advanced technologies. Special low-clearance drilling robots, which can be operated remotely, navigate tight corridors and doorways to create new foundations beneath the historic structure.

Earth-moving robots equipped with folding mechanical arms, just under four feet wide, use artificial intelligence to tell the difference between clay and solid obstacles. Engineers also use building information modeling and point cloud scanning to create highly detailed 3D blueprints. These digital models help the team plan exact movement routes, avoid potential collisions and design curved paths for removing soil.

To keep the construction site efficient and minimize disruption, soil is carried out using a conveyor belt system, much like an assembly line. The move is only temporary. Once the underground construction is finished, the Huayanli complex will be carefully returned to its original spot, fully restored and preserved, now sitting atop a modern underground facility.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

robots moving building 5

Over 400 small robots are moving a Huayanli complex  (Shanghai Government)

BEST EARLY AMAZON PRIME DAY 2025 DEALS

What’s next for Zhangyuan?

When the project is finished, the renewed Zhangyuan will blend its above-ground historic charm with state-of-the-art underground amenities. The area will connect to nearby high-rises, shopping centers and neighborhoods, creating a vibrant and accessible urban space that honors its past while embracing the future.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

robots moving building 6

Over 400 small robots are moving the Huayanli complex  (Shanghai Government)

Kurt’s key takeaways

It is not every day that an entire historic building is made to walk across a city block, but Shanghai’s Huayanli project shows that with the right technology and a bit of imagination, even the oldest neighborhoods can be part of tomorrow’s cityscape. This combination of preservation and innovation offers a fascinating glimpse into how cities can grow without losing their soul. Who would have thought that robots could become the unsung heroes of heritage?

CLICK HERE TO GET THE FOX NEWS APP

If robots can move entire historic neighborhoods to make way for modern development, how far should we go in reshaping our cities, and what parts of our past are truly worth preserving? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

Russia launched its largest aerial attack of the war, Ukraine says

0

NEWYou can now listen to Fox News articles!

Russia launched its biggest aerial attack overnight since the start of the war against Ukraine, a Ukrainian official said on Sunday.

Moscow fired 537 aerial weapons toward Ukraine, including 477 drones and decoys and 60 missiles, according to Ukraine’s air force. Among these weapons, 249 were shot down and 226 were lost, likely electronically jammed.

The attack was “the most massive airstrike” against Ukraine since Russia launched its invasion in February 2022, Yuriy Ihnat, head of communications for Ukraine’s air force, told The Associated Press, taking into account both drones and various types of missiles.

ZELENSKYY POINTEDLY THANKS TRUMP, AMERICA FOR UKRAINE SUPPORT MONTHS AFTER VANCE’S JAB ABOUT LACK OF GRATITUDE

Russia launched its biggest aerial attack overnight since the start of the war against Ukraine, a Ukrainian official said. (SERGEI ILYIN/POOL/AFP via Getty Images)

Several regions were targeted, including western Ukraine, located far from the front line.

Poland and allied countries scrambled aircraft to ensure the safety of Polish airspace, Poland’s air force said.

One person was killed in a drone strike in the Kherson region, according to Gov. Oleksandr Prokudin, while another died when a drone hit a car in the Kharkiv region, its Gov. Oleh Syniehubov said. Six people were wounded in Cherkasy, including a child, regional Gov. Ihor Taburets said.

RUSSIAN OFFICIAL SAYS MOSCOW HAS ‘NO INTENTION’ OF SUPPLYING IRAN WITH WARHEADS, FOLLOWING TRUMP TAUNTS

Polish launches air forces in response to Putin's strikes in Western Ukraine

Poland and allied countries scrambled aircraft to ensure the safety of Polish airspace, Poland’s air force said. (Photos supplied by Getty Images)

In the far-western Lviv region, a large fire broke out at an industrial facility in the city of Drohobych after a drone attack that also cut electricity to parts of the city.

Ukraine’s air force said one of its F-16 warplanes supplied by the West crashed after sustaining damage as it was shooting down air targets, killing the pilot.

Russia's Putin and Ukraine's Zelenskyy

Russian President Vladimir Putin said Moscow is ready for another round of direct peace talks in Istanbul to end the war. (Vyacheslav Prokofyev/Sputnik/Kremlin Pool Photo/Efrem Lukatsky/AP)

CLICK HERE TO GET THE FOX NEWS APP

The new attacks come after Russian President Vladimir Putin said on Friday that Moscow is ready for another round of direct peace talks in Istanbul to end the war.

No end appears to be in sight as international peace efforts coordinated by the U.S. have not yet led to any breakthroughs. Two recent rounds of talks between Russian and Ukrainian delegations in Istanbul were brief and yielded no progress on reaching an agreement.

The Associated Press contributed to this report.

Ancient ‘pharaoh’s Curse’ could one day treat leukemia, research suggests

0

NEWYou can now listen to Fox News articles!

A potentially deadly fungus known as “pharaoh’s curse fungus” could offer an unexpected path to fighting cancer, recent research shows.

Scientists from the University of Pennsylvania modified molecules from the fungus — which is officially called Aspergillus flavus — to create a new compound and enhance its cancer-killing properties.

“Fungi gave us penicillin,” said Dr. Xue (Sherry) Gao, an associate professor at UPenn and leader of the study, in a press release. “These results show that many more medicines derived from natural products remain to be found.”

SINGLE DOSE OF ‘MAGIC MUSHROOMS’ PROVIDES 5 YEARS OF DEPRESSION RELIEF, RESEARCHERS FIND

The findings were published in the journal Nature Chemical Biology.

Aspergillus flavus is found in decaying leaves and compost, as well as on trees, plants and some crops, according to Mayo Clinic.

A sample of Aspergillus flavus cultured in the Gao Lab at the University of Pennsylvania. (Bella Ciervo / UPenn)

While the fungus doesn’t endanger most healthy people, it can cause respiratory issues for those who have weakened immune systems or are taking certain medications.

Some of the more severe complications of the fungus can include bleeding in the lungs and life-threatening infections in the brain, heart and kidneys, Mayo Clinic stated.

History of the ‘curse’

After archaeologists opened King Tut’s tomb in the 1920s, multiple members of the excavation team died suddenly, fueling rumors of a “curse” upon those who dared interfere with the pharaoh’s rest, according to the UPenn press release.

Removing a tray of chariot parts from the Tomb of Tutankhamun, Valley of the Kings, Egypt, 1922.

After archaeologists opened King Tut’s tomb in the 1920s, members of the excavation team died suddenly, fueling rumors of a “curse” upon those who disturbed the pharaoh’s rest. (Historica Graphica Collection/Heritage Images/Getty Images)

Decades later, doctors hypothesized that fungal spores, which had been dormant for thousands of years, could have infected the team.

In the 1970s, it happened again, the university stated. 

A dozen scientists entered another tomb, this time in Poland — and 10 died within a few weeks. Later investigations were said to reveal the presence of Aspergillus flavus in the tomb.

Cancer-fighting potential

Now, the same fungus linked to King Tut’s tomb could have the capability to fight leukemia in a new form of cancer therapy.

“There are a variety of compounds able to be produced by fungus,” Gao told Fox News Digital.

These compounds can be toxic to different cells, she noted, depending on the “biological management we are able to mitigate.”

CANCER COULD BE DETECTED THREE YEARS BEFORE DIAGNOSIS WITH EXPERIMENTAL BLOOD TEST

The study aimed to find a specific kind of compound — ribosomally synthesized and post-translationally modified peptides, or “RiPPs” — within Aspergillus flavus, which was previously shown to be a good source.

When this compound is able to enter cancer cells, Gao said, it may be able to stop their growth.

“Cancer cells divide uncontrollably,” Gao said in the release. “These compounds block the formation of microtubules, which are essential for cell division.”

Fungus cancer research

First author Qiuyue Nie and coauthor Maria Zotova, from left, purify samples of the fungus in the UPenn lab. (Bella Ciervo / UPenn)

When mixed with human cancer cells, two variants of the molecules within these RiPPS were found to have potent effects against leukemia cells, the researchers found.

Another variant performed as well as two FDA-approved drugs that have been used for decades to treat leukemia (cytarabine and daunorubicin).

Potential limitations

Tiffany Troso-Sandoval, M.D., a medical oncologist and cancer care consultant based in New York, cautioned that this study, which was performed on cell cultures, is still in the very early stages.

YOUR FAVORITE ALCOHOLIC BEVERAGE COULD BE LINKED TO DEADLY FORM OF CANCER, STUDY FINDS

“It’s still very far away from being applicable to use in humans with leukemia,” Troso-Sandoval, who was not involved in the study, told Fox News Digital.

Speaking about RiPPs, the doctor told Fox News Digital, “What they’re referring to [in the study] is basically a rare type of bioactive molecule that they have isolated from this fungus.”

CLICK HERE TO GET THE FOX NEWS APP

There are multiple subtypes of leukemia, Troso-Sandoval pointed out, including acute and chronic forms.

“One treatment might not work on [another] type of leukemia,” she noted. Further testing is needed to determine which subtypes may contain the active molecule.

Blood cancer

Acute myeloid leukemia (AML) is a type of blood cancer. Once the identified compound is able to enter cancer cells, it may be able to stop their uncontrolled growth, the researchers said. (iStock)

The compound explored in the study had little to no effect on breast, liver or lung cancer cells, the researchers noted.

This suggests that its disruptive effects only work on certain types of cells, which will be an important consideration when developing medications.

CLICK HERE TO SIGN UP FOR OUR HEALTH NEWSLETTER

Looking ahead, the researchers plan to test the fungus’ potential in animal models and, ultimately, human trials.

Gao told Fox News Digital she is “excited about what nature can create and how it can benefit our society.”

For more Health articles, visit www.foxnews.com/health

The study received support from the National Institutes of Health, the University of Pennsylvania, the Welch Foundation, the Houston Area Molecular Biophysics Program, the Cancer Prevention and Research Institute of Texas and the National Science Foundation.

Passenger asked to spit out Zyn on Delta flight despite no clear policy

0

NEWYou can now listen to Fox News articles!

Smoking and vaping are banned on flights, but it appears that smokeless nicotine pouches are allowed — depending on the airline. 

Pouches are allowed in both carry-on bags and checked bags, according to the TSA.

Yet when it comes to the actual use of these items on flights, airlines can determine their own rules for smokeless tobacco activity.

SNEAKY AIRLINE PASSENGER’S CARRY-ON HACK SPARKS DEBATE OVER FLIGHT ETIQUETTE

American, United, Alaska Airlines, Southwest Airlines, JetBlue Airways and Spirit Airlines do not specifically define on their websites whether passengers can use nicotine pouches, according to the most recent review of their sites. 

Recently, one flight passenger called out an airline in the “r/delta” forum on Reddit for an experience with chewing Zyn on board. 

A Reddit user was asked to remove a Zyn pouch (not pictured) during a Delta flight — which sparked debate online about whether smokeless nicotine products are permitted on planes. (iStock)

“Got told to spit my Zyn out on a flight. I really didn’t know that was a thing?” the user wrote.

“Delta flight, first class (not that that matters). They brought a cup out and asked me to spit my Zyn out.”

The user added, “They said it was because it was a tobacco product. I didn’t put up a fight and complied right away.”

AMERICANS READY TO HIT THE ROAD IN RECORD NUMBERS THIS INDEPENDENCE DAY

“Was just wondering if this was an FAA thing I didn’t know about?” asked the flight passenger.

Redditors took to the comments section to share thoughts about the incident — and their own similar experiences. 

“Probably because the way you had it in your lip, it looked like a dip,” said one user.

Reclining flight passengers

Pouches are allowed in both carry-on bags and checked bags, according to the TSA.  (iStock)

Another Redditor argued, “Zyn isn’t tobacco. You can have it in flight.”

“Tobacco or not, does it cause you to spit into a bottle or cup that could spill or be left stuffed in the seat pocket that someone else has to clean up?” said one person. 

For more Lifestyle articles, visit foxnews.com/lifestyle

“Then I’d say it doesn’t matter what you call it,” the person added.

A user commented, “It [is] allowed but be discrete. I see many people using them on flights, myself included, and as long as you’re not doing it right in front of an FA, you’re fine,” the person added. 

flight passenger smoking in bathroom

Delta prohibits smoking and the use of all smokeless tobacco products (including e-cigarettes and vapes) on all flights. (iStock)

“It is silly because no one would stop you from using nicotine gum or a patch,” the same user added.

One user claimed, “I was on a United flight a few days ago and the shopping/menu magazine in the seatback actually had a Zyn ad in it. It said something like, ‘Flight ready.’”

“It said something like, ‘Flight ready.’”

“How would the FA even know what it is? Just looks like gum/mints,” said another individual.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

On Delta’s “Contract of Carriage” section on its website, the airline specifies a no-smoking policy.

flight attendant walks down the aisle of a plane, as passengers are seated facing forward

A flight passenger recently called out an airline on Reddit for an experience with chewing Zyn on board an airplane.  (iStock)

“Delta prohibits smoking and the use of all smokeless tobacco products (including e-cigarettes and vapes) on all flights,” it states.

CLICK HERE TO GET THE FOX NEWS APP

A Delta spokesperson said the policy also prohibits smokeless tobacco, including pouches and gum.

After health battle, personal trainer runs 6,000 miles to shatter half-marathon world record

0

NEWYou can now listen to Fox News articles!

A man who took up jogging while recovering from a hernia has shattered a world record by running 465 half-marathons in just one year.

Edward Molineaux, a 34-year-old personal trainer, logged an astonishing 6,000 miles between April 6, 2023, and April 7, 2024. 

His achievement not only broke his own previous record of 282 half-marathons in 12 months, between 2022 and 2023, but also earned him a world title, according to news agency SWNS.

COMEDIAN CROSSES AMERICA WITH MINIATURE BIKE AND MASSIVE DREAM: ‘TOOK 80 DAYS’

“I used to love sports like boxing, but when I suffered a hernia it took me about two years after my operation to get my body back,” Molineaux said. 

“All I could do was run. I couldn’t turn to anything explosive anymore.”

Edward Molineaux, pictured here, is a personal trainer in his 30s. He shattered a world record by running 465 half-marathons in just one year. (Joseph Walshe / SWNS)

What began as a way to recover turned into a regular habit. 

Molineaux, who is British, now inspires others through his dedication, according to reports. 

“All I could do was run.”

“I love giving inspiration to other people, and that warrior feeling,” he said. 

“Even being around people doing well – I like seeing people getting better and going higher.”

WOMAN FEARED DOGS, THEN BEGAN TREKKING ALL OVER THE WORLD WITH NEWLY ADOPTED PUP

The endurance athlete went on to win a 2,000-mile virtual race across Africa.

‘I pushed myself’

Molineaux said he structures his week around 13 half-marathon runs, often stacking multiple races in a single day, per SWNS.

“To complete the half-marathons, I split my week into 13 runs, with three on Monday and Wednesday, two on Tuesday and Thursday, and then just one half-marathon for the remaining three days,” he said. 

Edward Molineaux with a collection of medals at his home in Willenhall, Walsall on June 18 2025. Edward has recently won a world record for the most number of half-marathons completed in a year. Release date – June 19, 2025. A hernia patient who took up jogging while he recovered from surgery has broken the world record for running 465 half-marathons in just one year. Superfit Edward Molineaux clocked up a staggering 6,000 miles between April 6 last year and April 7 this year. The 34-year-old runner previously set the record for the most half-marathons run in 12 months when he finished 282 between 2022-23. Now Edward has smashed his own record and won the 2,000-mile virtual races across Africa. Edward, from Willenhall, West Mids., only took up running while recovering from a hernia in 2020.

Molineaux structures his week around 13 half-marathon runs, often stacking multiple races in a single day, he said. (Joseph Walshe / SWNS)

Even through blisters, trench foot and fatigue, he said he is undeterred.

“Some days I did not feel like doing it, but you need to do it,” he said. “It’s one of the hardest parts for me, but I pushed myself.”

His nutrition strategy is as disciplined as his training. 

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

“I don’t really eat before I run – I don’t like feeling full while I’m getting the miles in,” he said. “I stick to a lot of fruit really, mainly bananas. For a half-marathon, I run on an empty stomach, maybe just a banana.”

At night, he said he fuels up on meat and fish

“It all comes from belief.”

“You won’t get a stitch, and it won’t stay in the stomach, and you can go at a faster pace,” he added.

Molineaux’s passion for self-discipline and mental resilience is central to his philosophy. 

For more Lifestyle articles, visit foxnews.com/lifestyle

“What I would do is do one half-marathon in about two hours, have five minutes rest and then get onto the next one,” he said. 

Edward Molineaux at his home in Willenhall, Walsall on June 18 2025. Edward has recently won a world record for the most number of half-marathons completed in a year. Release date – June 19, 2025. A hernia patient who took up jogging while he recovered from surgery has broken the world record for running 465 half-marathons in just one year. Superfit Edward Molineaux clocked up a staggering 6,000 miles between April 6 last year and April 7 this year. The 34-year-old runner previously set the record for the most half-marathons run in 12 months when he finished 282 between 2022-23. Now Edward has smashed his own record and won the 2,000-mile virtual races across Africa. Edward, from Willenhall, West Mids., only took up running while recovering from a hernia in 2020.

Molineaux said his passion for self-discipline and mental resilience is central to his philosophy.  (Joseph Walshe / SWNS)

“You don’t know how the body will react or get a second wind. It all comes from belief.”

Molineaux was officially recognized for his accomplishment on June 1, when he received his Record Breakers world record certificate, said SWNS.

His journey from injury recovery to world record holder has made him a symbol of perseverance. 

CLICK HERE TO GET THE FOX NEWS APP

Said Molineaux, “I like showing people that you can do it through everything, and through anything,” 

Can swallowing a bee cause a heart attack? Experts comment on rare case

0

NEWYou can now listen to Fox News articles!

On June 12, a prominent billionaire from India, Sunjay Kapur, died suddenly at the age of 53 in Windsor, England, according to multiple reports.

Kapur was the chairman of Sona Comstar, an Indian automotive components manufacturer.

His close friend, business consultant Suhel Seth, confirmed Kapur’s death in a post on X that same day.

MAN’S BLOOD USED TO CREATE ANTIVENOM FOR 19 DEADLY SNAKES

“Deeply saddened at the passing of @sunjaykapur: he passed away earlier today in England: a terrible loss and deepest condolences to his family and to his colleagues @sonacomstar …Om Shanti,” Seth wrote.

In the following days, it was revealed that Kapur died while playing polo. Multiple outlets reported that he collapsed after swallowing a bee mid-match, potentially triggering a fatal heart attack.

On June 12, a prominent billionaire from India, Sunjay Kapur, died suddenly at the age of 53 in Windsor, England, according to multiple reports. (Raajessh Kashyap/Hindustan Times via Getty Images)

No official source for the billionaire confirmed that a bee caused the heart attack. Fox News Digital reached out to Sona Comstar for comment.

“It’s not possible to comment with any specificity about this particular case without a thorough review of the forensics,” Dr. Nishant Kalra, an Ohio cardiologist and regional chief medical officer at VitalSolution — an Ingenovis Health company that offers cardiovascular and anesthesiology services to hospitals — told Fox News Digital.

POISON FRUIT IN ‘WHITE LOTUS’ COMES FROM ‘SUICIDE TREE’

Swallowing a bee can, in very rare cases, precipitate a heart attack, he confirmed — “but only through specific mechanisms.”

The primary risk is not from the act of swallowing itself, but from the possibility of a bee sting to either the upper airway or the oropharynx (the part of the mouth that includes the back of the tongue, tonsils and soft palate), which can introduce venom into the body, according to Kalra.

Bee close-up

Swallowing a bee can, in very rare cases, precipitate a heart attack, experts say. (iStock)

If the individual is allergic, this can trigger anaphylaxis, which may cause “profound hypotension, arrhythmias or even acute coronary syndromes,” Kalra said — a phenomenon known as Kounis syndrome. 

CLICK HERE TO GET THE FOX NEWS APP

This syndrome can result from a coronary event (any adverse medical event related to the coronary arteries, which supply blood to the heart) occurring in combination with anaphylactic or allergic reactions

This can pose a risk even to individuals who do not have pre-existing coronary artery disease. 

A bee stinging a human arm

Kounis syndrome can result from a coronary event occurring in combination with anaphylactic or allergic reactions.  (iStock)

The American Academy of Allergy, Asthma & Immunology notes that cardiac anaphylaxis can cause reduced blood flow to the heart (myocardial ischemia) and irregular heartbeats (arrhythmias) when triggered by an allergy to insect venom.

CLICK HERE TO SIGN UP FOR OUR HEALTH NEWSLETTER

However, these cases are incredibly rare, according to experts.

“The general population should not be concerned about this as a common risk,” Kapur told Fox News Digital. “Fatal cardiac events following bee stings are rare and typically occur in individuals with known venom hypersensitivity or underlying cardiac disease.”

For more Health articles, visit www.foxnews.com/health

Most bee stings, even in the oropharynx, result in local reactions, though airway compromise is a concern if significant swelling occurs, he added.

Those who experience allergic symptoms following a sting should seek immediate medical attention.

Healthcare data breach at Episource exposes 5 million patient records

0


NEWYou can now listen to Fox News articles!

Over the past decade, software companies have built solutions for nearly every industry, including healthcare. One term you might be familiar with is software as a service (SaaS), a model by which software is accessed online through a subscription rather than installed on individual machines. 

In healthcare, SaaS providers are now a common part of the ecosystem. But, recently, many of them have made headlines for the wrong reasons. 

Several data breaches have been traced back to vulnerabilities at these third-party service providers. The latest incident comes from one such firm, which has now confirmed that hackers stole the health information of over 5 million people in the United States during a cyberattack in January.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join.

ASCENSION HEALTHCARE DATA BREACH EXPOSES 430,000 PATIENT RECORDS

healthcare breach 1

A healthcare worker looking at data on a tablet   (Kurt “CyberGuy” Knutsson)

SaaS firm leads to major healthcare blunder

Episource, a big name in healthcare data analytics and coding services, has confirmed a major cybersecurity incident (via Bleeping Computer). The breach involved sensitive health information belonging to over 5 million people in the United States. The company first noticed suspicious system activity Feb. 6, 2025, but the actual compromise began ten days earlier.

An internal investigation revealed that hackers accessed and copied private data between Jan. 27 and Feb. 6. The company insists that no financial information was taken, but the stolen records do include names, contact details, Social Security numbers, Medicaid IDs and full medical histories.

Episource claims there’s no evidence the information has been misused, but because they haven’t seen the fallout yet doesn’t mean it isn’t happening. Once data like this is out, it spreads fast, and the consequences don’t wait for official confirmation.

healthcare breach 2

A woman looking at a health app on her smartphone   (Kurt “CyberGuy” Knutsson)

OVER 8 MILLION PATIENT RECORDS LEAKED IN HEALTHCARE DATA BREACH

Why healthcare SaaS is a growing target

The healthcare industry has embraced cloud-based services to improve efficiency, scale operations and reduce overhead. Companies like Episource enable healthcare payers to manage coding and risk adjustment at a much larger scale. But this shift has also introduced new risks. When third-party vendors handle patient data, the security of that data becomes dependent on their infrastructure.

Healthcare data is among the most valuable types of personal information for hackers. Unlike payment card data, which can be changed quickly, medical and identity records are long-term assets on the dark web. These breaches can lead to insurance fraud, identity theft and even blackmail.

Episource is not alone in facing this kind of attack. In the past few years, several healthcare SaaS providers have faced breaches, including Accellion and Blackbaud. These incidents have affected millions of patients and have led to class-action lawsuits and stricter government scrutiny.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

healthcare breach 3

A healthcare worker typing on her laptop    (Kurt “CyberGuy” Knutsson)

5.5 MILLION PATIENTS EXPOSED BY MAJOR HEALTHCARE DATA BREACH

5 ways you can protect yourself from healthcare data breach

If your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.

1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. 

These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.

2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  

One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 

Get a free scan to find out if your personal information is already out on the web.

3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.

The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.

5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.

WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLE

Kurt’s key takeaways

What makes this breach especially alarming is that many of the affected patients may have never even heard of Episource. As a business-to-business vendor, Episource operates in the background, working with insurers and healthcare providers, not with patients directly. The people affected were customers of those companies, yet it’s their most sensitive data now at risk because of a third party they never chose or trusted. This kind of indirect relationship muddies the waters when it comes to responsibility and makes it even harder to demand transparency or hold anyone accountable.

CLICK HERE TO GET THE FOX NEWS APP

Do you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved. 
 



Source link

EDGE® Expands Beyond Sneakers as Athletes Discover Hidden Performance Gains Across Sports

0
20250628 223259973
EDGE® Expands Beyond Sneakers as Athletes Discover Hidden Performance Gains Across Sports 67

New York, NY — June 26, 2025 — What started as a breakthrough for sneaker traction is quietly becoming one of the most versatile performance accessories in sports. EDGE®, known for its innovative outsole grip spray, is seeing unexpected adoption among athletes in football, golf, and even rock climbing — turning a niche product into a cross-sport performance essential.

Originally designed to address a well-known problem in basketball — the rapid decline of sneaker grip after minimal wear — EDGE®’s formula works by safely enhancing rubber surfaces, restoring grip, and improving agility in seconds. But now, athletes across new categories are discovering the same technology works just as well for other critical equipment.

Football players are using EDGE® to instantly clean and refresh glove grip, gaining better ball control without needing to buy new gloves. Golfers are applying the grip wipes to their clubs’ hand grips, reporting a tackier, like-new feel on the course. Even climbers and athletes in sports like squash and fencing have found creative uses for EDGE® to maintain peak grip.

“The coolest part is watching athletes innovate with the product,” says Zach Keck, EDGE®’s founder. “We built this for sneakers — but the athletic community keeps finding new ways to apply it to their game, and the results have been incredible.”

The global sports equipment market continues to surge, with performance accessories playing a larger role in athlete preparation. EDGE® is tapping into that demand with a portable, non-toxic spray that enhances grip without damaging surfaces or attracting debris — unlike many sticky or adhesive-based alternatives.

Each 2 oz. bottle is designed to last roughly 80 sessions of athletic use, making it a go-to for athletes looking to boost performance affordably. Plus, its compact size makes it travel-friendly and carry-on approved, perfect for tournaments, competitions, or games on the road.

With partnerships across USA Fencing, NIL deals with college athletes, and upcoming collaborations in golf and football, EDGE® is cementing itself as more than just a sneaker solution — it’s becoming an all-in-one grip upgrade for competitive athletes.

The EDGE® team plans to expand availability in 2025 from North America to a more global presence. Athletes can now order directly in 40+ countries at edgespray.com

Media Contact:

EDGE®
Binghamton, NY USA
press@EDGEspray.com

20250628 223032283
EDGE® Expands Beyond Sneakers as Athletes Discover Hidden Performance Gains Across Sports 68

The U.S. Baby Formula Crisis: Why More Moms Are Demanding Change

0
20250617 123731194
The U.S. Baby Formula Crisis: Why More Moms Are Demanding Change 76

The items found on store shelves in America today often utilize dairy- or soy-based formulas that have been in use for decades. Additionally, they frequently contain processed ingredients, corn syrups, and additives.

Vancouver, BC, June 26, 2025 – It is truly remarkable how much progress has been made in this modern era. Phones are capable of monitoring health, cars can operate themselves, and AI technology continuously improves well-being practices. However, it is disappointing that the development of baby formula seems to be stuck in the 1980s.

Similarly, the regulations surrounding its production are also outdated. As a mother of four and someone who has extensively studied infant nutrition and is Co-Founder of Else Nutrition & Early Childhood Nutrition Advocate, Hamutal Yitzhak cannot help but feel frustrated and saddened by this reality.

This Isn’t Just About an Industry. It’s About Babies:

This is not a matter of disruption or passing fads. It concerns actual infants with genuine necessities. It’s about the caregiver cradling a newborn who has a dairy allergy and realizing that there are no nutritious options available.

It’s also about going through label after label filled with palm oil, corn syrup, and unrecognizable components – and questioning why folks continue to accept this. Furthermore, it involves a regulatory structure that has created significant barriers for scientifically-supported advancements to reach those who require them the most.

The Formula Aisle Is Full – But Not for Everyone:

Upon initial observation, the formula aisles may appear overflowing with choices. However, for those whose child cannot handle dairy or soy, or for anyone seeking options made with minimal processing and whole foods, the available selection rapidly diminishes. Hamutal has conversed with numerous mothers throughout the nation who share similar pressing inquiries:

  • “Why are there more options for snacks to choose from compared to formula in the aisle?”
  • “Why isn’t there a substitute for dairy-based baby formula that is healthier?”

These are not limited to specific concerns, but rather indicative of a larger issue – the inability to adequately address the needs of modern families.

A System Stuck in the Past:

When Hamutal’s team began working in this space, it wasn’t because she saw a business opportunity.

It was because her co-founder’s granddaughter, Roni – was failing to thrive on traditional formula. Conventional formula wasn’t working. She needed something she could tolerate. Something closer to food. Something clean and free of dairy.

The science exists. The demand is there. But the barriers to entry – especially at the FDA level – remain daunting. Even for formulas built with clinical integrity and expert support, getting through the approval process for infant use remains a massive hurdle. They’re ready. Parents are ready. But the system hasn’t evolved to meet them.

Why “Operation Stork Speed” Is Just the Beginning:

The Federal government’s recent implementation of Operation Stork Speed, aimed at enhancing the safety, quality, and nutritional value of infant formula, is a promising beginning. There is still more that needs to be done.

Lasting reform is needed:

  • Clearer regulatory pathways for innovation in infant formulas
  • Updated ingredient standards that reflect current and future science and nutritional wisdom
  • True, transparent collaboration between regulators, innovators, and the parents this impacts every single day- because no parent should be forced to choose between “what’s available” and “what feels right.”

Moms Are Leading the Charge:

In the modern world, mothers are well-informed and take charge of their choices. They thoroughly evaluate product labels and don’t shy away from asking tough questions. Also, they expect healthier and more scientifically-proven options that align with their beliefs. This is not a minority perspective, but rather a widespread mindset. Their demands will bring about significant changes in the baby formula market for years to come.

It’s Not About Lowering the Bar – It’s About Removing the Barriers:

Mothers are not requesting the FDA to jeopardize safety. Instead, their request is for the agency to keep pace with scientific advancements and the everyday needs of current households. They are advocating for equal opportunities for innovation, with transparency as the norm, and without hindrance from bureaucratic hurdles.

Let there be fair competition among formulas based on evidence, integrity, and safety rather than influenced by lobbying strength or dominance by major formula corporations.

It’s Time for Formula to Join the 21st Century:

It is crucial for every infant to receive nutrition tailored to their specific needs. Similarly, every parent should have the freedom to make well-informed decisions, without restrictions from antiquated structures. It is time to modernize infant nutrition in the country and prioritize the wellbeing of all children.

About the Author:

Hamutal Yitzhak is a mother of four and a veteran in early childhood nutrition. She is the Co-Founder and CEO of Else Nutrition, a company on a mission to provide clean, whole-food based nutrition for a healthier start to life. Her work is driven by a commitment to transparency, science, and the well-being of children worldwide through nutrition.

For complete information, visit: https://elsenutrition.com/

Media Contact:

Else Nutrition Holdings, Inc.
Attn: Media Relations
501 W. Schrock Road,
Westerville, Ohio, 43081
1-888-TRY-ELSE
info@elsenutrition.com

20250617 123634393
The U.S. Baby Formula Crisis: Why More Moms Are Demanding Change 77
20250612 181400460
The U.S. Baby Formula Crisis: Why More Moms Are Demanding Change 78