3.3 C
New York
Saturday, March 7, 2026
Home Blog Page 369

FBI’s new warning about AI-driven scams that are after your cash

0


The FBI is issuing a warning that criminals are increasingly using generative AI technologies, particularly deepfakes, to exploit unsuspecting individuals. This alert serves as a reminder of the growing sophistication and accessibility of these technologies and the urgent need for vigilance in protecting ourselves from potential scams. Let’s explore what deepfakes are, how they’re being used by criminals and what steps you can take to safeguard your personal information.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

FBI's new warning about AI-driven scams that are after your cash

FBI building in D.C. (Kurt “CyberGuy” Knutsson)

The rise of deepfake technology

Deepfakes refer to AI-generated content that can convincingly mimic real people, including their voices, images and videos. Criminals are using these techniques to impersonate individuals, often in crisis situations. For instance, they might generate audio clips that sound like a loved one asking for urgent financial assistance or even create real-time video calls that appear to involve company executives or law enforcement officials. The FBI has identified 17 common techniques used by criminals to create these deceptive materials.

FBI's new warning about AI-driven scams that are after your cash

Image of AI illustration (Kurt “CyberGuy” Knutsson)

THE AI-POWERED GRANDMA TAKING ON SCAMMERS

Key tactics used by criminals

The FBI has identified 17 common techniques that criminals are using to exploit generative AI technologies, particularly deepfakes, for fraudulent activities. Here is a comprehensive list of these techniques.

1) Voice cloning: Generating audio clips that mimic the voice of a family member or other trusted individuals to manipulate victims.

2) Real-time video calls: Creating fake video interactions that appear to involve authority figures, such as law enforcement or corporate executives.

3) Social engineering: Utilizing emotional appeals to manipulate victims into revealing personal information or transferring funds.

4) AI-generated text: Crafting realistic written messages for phishing attacks and social engineering schemes, making them appear credible.

5) AI-generated images: Using synthetic images to create believable profiles on social media or fraudulent websites.

6) AI-generated videos: Producing convincing videos that can be used in scams, including investment frauds or impersonation schemes.

7) Creating fake social media profiles: Establishing fraudulent accounts that use AI-generated content to deceive others.

8) Phishing emails: Sending emails that appear legitimate but are crafted using AI to trick recipients into providing sensitive information.

9) Impersonation of public figures: Using deepfake technology to create videos or audio clips that mimic well-known personalities for scams.

10) Fake identification documents: Generating fraudulent IDs, such as driver’s licenses or credentials, for identity fraud and impersonation.

11) Investment fraud schemes: Deploying AI-generated materials to convince victims to invest in non-existent opportunities.

12) Ransom demands: Impersonating loved ones in distress to solicit ransom payments from victims.

13) Manipulating voice recognition systems: Using cloned voices to bypass security measures that rely on voice authentication.

14) Fake charity appeals: Creating deepfake content that solicits donations under false pretenses, often during crises.

15) Business email compromise: Crafting emails that appear to come from executives or trusted contacts to authorize fraudulent transactions.

16) Creating misinformation campaigns: Utilizing deepfake videos as part of broader disinformation efforts, particularly around significant events like elections.

17) Exploiting crisis situations: Generating urgent requests for help or money during emergencies, leveraging emotional manipulation.

FBI's new warning about AI-driven scams that are after your cash

Image of AI illustration (Kurt “CyberGuy” Knutsson)

These tactics highlight the increasing sophistication of fraud schemes facilitated by generative AI and the importance of vigilance in protecting personal information.

FCC NAMES ITS FIRST-EVER AI SCAMMER IN THREAT ALERT

Tips for protecting yourself from deepfakes

Implementing the following strategies can enhance your security and awareness against deepfake-related fraud.

1) Limit your online presence: Reduce the amount of personal information, especially high-quality images and videos, available on social media by adjusting privacy settings.

2) Invest in personal data removal services: The less information is out there, the harder it is for someone to create a deepfake of you. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

3) Avoid sharing sensitive information: Never disclose personal details or financial information to strangers online or over the phone.

4) Stay vigilant with new connections: Be cautious when accepting new friends or connections on social media; verify their authenticity before engaging.

5) Check privacy settings on social media: Ensure that your profiles are set to private and that you only accept friend requests from trusted individuals. Here’s how to switch any social media accounts, including Facebook, Instagram, Twitter and any others you may use, to private.

6) Use two-factor authentication (2FA): Implement 2FA on your accounts to add an extra layer of security against unauthorized access.

7) Verify callers: If you receive a suspicious call, hang up and independently verify the caller’s identity by contacting their organization through official channels.

8) Watermark your media: When sharing photos or videos online, consider using digital watermarks to deter unauthorized use.

9) Monitor your accounts regularly: Keep an eye on your financial and online accounts for any unusual activity that could indicate fraud.

10) Use strong and unique passwords: Employ different passwords for various accounts to prevent a single breach from compromising multiple services. Consider using a password manager to generate and store complex passwords.

11) Regularly backup your data: Maintain backups of important data to protect against ransomware attacks and ensure recovery in case of data loss.

12) Create a secret verification phrase: Establish a unique word or phrase with family and friends to verify identities during unexpected communications.

13) Be aware of visual imperfections: Look for subtle flaws in images or videos, such as distorted features or unnatural movements, which may indicate manipulation.

14) Listen for anomalies in voice: Pay attention to the tone, pitch and choice of words in audio clips. AI-generated voices may sound unnatural or robotic.

15) Don’t click on links or download attachments from suspicious sources: Be cautious when receiving emails, direct messages, texts, phone calls or other digital communications if the source is unknown. This is especially true if the message is demanding that you act fast, such as claiming your computer has been hacked or that you have won a prize. Deepfake creators attempt to manipulate your emotions, so you download malware or share personal information. Always think before you click.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

16) Be cautious with money transfers: Do not send money, gift cards or cryptocurrencies to people you do not know or have met only online or over the phone.

17) Report suspicious activity: If you suspect that you have been targeted by scammers or have fallen victim to a fraud scheme, report it to the FBI’s Internet Crime Complaint Center. 

FBI's new warning about AI-driven scams that are after your cash

A woman typing on her laptop (Kurt “CyberGuy” Knutsson)

By following these tips, individuals can better protect themselves from the risks associated with deepfake technology and related scams.

30% OF AMERICANS OVER 65 WANT TO BE REMOVED FROM THE WEB. HERE’S WHY

Kurt’s key takeaways

The increasing use of generative AI technologies, particularly deepfakes, by criminals highlights a pressing need for awareness and caution. As the FBI warns, these sophisticated tools enable fraudsters to impersonate individuals convincingly, making scams harder to detect and more believable than ever. It’s crucial for everyone to understand the tactics employed by these criminals and to take proactive steps to protect their personal information. By staying informed about the risks and implementing security measures, such as verifying identities and limiting online exposure, we can better safeguard ourselves against these emerging threats.

In what ways do you think businesses and governments should respond to the growing threat of AI-powered fraud? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.



Source link

7 signs you might have ADHD and what steps to take

0

Join Fox News for access to this content

Plus special access to select articles and other premium content with your account – free of charge.

By entering your email and pushing continue, you are agreeing to Fox News’ Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive.

Please enter a valid email address.

With 15.5 million U.S. adults currently diagnosed with ADHD, there is a growing focus on warning signs of the disorder.

Attention-deficit/hyperactivity disorder is a “developmental disorder marked by persistent symptoms of inattention, hyperactivity and impulsivity,” as defined by the National Institutes of Health.

“ADHD is often misunderstood as just being overly distracted or hyperactive — in reality, it’s a neurodevelopmental condition that affects focus, emotional regulation, time management and impulse control,” Lisa Anderson, a licensed clinical social worker and clinical director at Brooks Healing Center in Tennessee, told Fox News Digital.

ADHD NOW AFFECTS 15.5 MILLION US ADULTS, SAYS NEW CDC REPORT

More than half of the adults with attention-deficit/hyperactivity disorder didn’t learn they had the condition until adulthood, according to data from the Centers for Disease Control and Prevention (CDC).

Approximately 15.5 million U.S. adults are currently diagnosed with ADHD, according to CDC data. (iStock)

Fox News Digital spoke with multiple mental health experts, who identified the most common signs and symptoms of ADHD in adults.

1. Impulsive behaviors

Adults with ADHD have difficulty managing impulsivity, according to Zoë Kahn, a licensed psychotherapist and ADHD therapist in Pasadena, California.

“This can look like blurting out answers in a classroom setting, interrupting in conversation and difficulty thinking through the long-term consequences of choices,” she told Fox News Digital.

ADHD AFFECTS 1 IN 9 KIDS IN US, NEW REPORT REVEALS: ‘SHAME AND STIGMA’

Impulsivity can also lead to making snap decisions without considering long-term consequences, Anderson added. 

“It might also manifest subtly, like overspending on impulse purchases or having trouble waiting your turn in group discussions,” she said.

2. Difficulty focusing or staying on task

Procrastination and difficulty following through on tasks are common signs of ADHD, Anderson noted. 

“You might struggle to start tasks, even when vital, or abandon them halfway through,” she said. “You might jump between tasks without finishing anything or focus on smaller, less urgent tasks while the bigger, more critical ones remain untouched.”

“It’s a persistent challenge that affects work, relationships and daily responsibilities.”

It’s not about laziness, Anderson noted, but about feeling overwhelmed by what needs to be done.

“ADHD-related daydreaming is persistent and often disruptive, especially when it happens during crucial tasks or conversations,” she said.

Man on phone at work

Procrastination and difficulty following through on tasks are common signs of ADHD, experts said. (iStock)

“This isn’t just about occasionally zoning out during a long meeting — it’s a persistent challenge that affects work, relationships and daily responsibilities.”

3. Trouble with time management

People with ADHD may struggle to manage their schedules, often underestimating how long it will take to complete a project or reach a destination.

“Deadlines might sneak up on you, or you might feel perpetually behind on tasks, no matter how early you started,” Anderson told Fox News Digital.

ADHD IN MALES VERSUS FEMALES: WHAT YOU MUST KNOW ABOUT THE DIFFERENCES IN SYMPTOMS AND TREATMENTS

“This can create a constant cycle of stress and underachievement, leaving you feeling frustrated with yourself.”

4. Mental fatigue

Mental fatigue and burnout are widespread in individuals with ADHD, according to Anderson. 

“The ADHD brain often works in overdrive, juggling competing thoughts and struggling to stay on track,” she said. 

Woman unfocused

“ADHD-related daydreaming is persistent and often disruptive, especially when it happens during crucial tasks or conversations.” (iStock)

“This constant effort to stay focused and organized can leave you feeling drained, even after relatively short periods of productivity.”

5. Forgetfulness

Another sign of ADHD in adults is general disorganization, Kahn said, which can lead to an inability to follow through on tasks, meet important deadlines, pay bills on time or keep appointments.

“The ADHD brain often works in overdrive, juggling competing thoughts and struggling to stay on track.”

They may also find themselves misplacing important items, like car keys.

“Adults with ADHD have a hard time finding and keeping focus, which could look like not paying attention in conversation, missing key details, being easily distracted in certain settings, or even focusing on the wrong details,” Kahn added.

6. Inability to sit still

People with ADHD often find themselves fidgeting and feeling generally restless, according to Dr. Michelle Dees, a board-certified psychiatrist at Luxury Psychiatry Clinic in Chicago.

Man digging through pocket

People with ADHD may find themselves misplacing important items, like car keys. (iStock)

“In adults, this may present as inner disquietude or incomplete calmness,” she told Fox News Digital.

Anderson reiterated this common symptom, noting that in children, it often takes the form of physical hyperactivity.

DEPRESSION COULD BE PREVENTED WITH SPECIFIC DAILY STEP COUNT, STUDY FINDS

“It often transforms into internal restlessness in adults, where you feel like you can’t fully relax or sit still without feeling jittery,” she said. “This constant sense of being ‘on edge’ can become exhausting over time.”

7. Relationship challenges

“Many adults with ADHD have difficulty maintaining relationships with others due to inappropriate social behaviors, such as frequently interrupting, losing interest in conversations, difficulty paying attention and forgetfulness,” Kahn noted. 

“You might forget to call friends back or forget about commitments to others, which can cause issues in your relationships.”

Mood swings

Emotional sensitivity often accompanies ADHD, which can manifest as mood swings, irritability or heightened responses to minor frustrations.  (iStock)

Emotional sensitivity often accompanies ADHD, according to Anderson. This can manifest as mood swings, irritability or heightened responses to minor frustrations. 

“Many people with ADHD describe feeling like their emotions are more intense and more challenging to control than those of others around them,” she added.

When to seek help

If you’ve experienced several of the above signs and they interfere with your daily life, experts recommend seeking help. 

CLICK HERE TO GET THE FOX NEWS APP     

“ADHD is not a flaw nor something to be ashamed of — it’s simply a different way of processing information and interacting with the world,” said Anderson.

The first step is to speak with a health care professional specializing in ADHD, such as a psychologist, psychiatrist or even your primary care physician, she suggested. 

“They can provide a proper evaluation and help you explore treatment options, including therapy, medication or lifestyle adjustments,” Anderson noted.

Potential solutions include mindfulness exercises and cognitive behavioral therapy (CBT), which can help people with ADHD to improve their organization, time management and emotion regulation, the same source stated. 

CLICK HERE TO SIGN UP FOR OUR HEALTH NEWSLETTER

“For many people, medication is also an essential part of managing ADHD, as it can help balance brain chemistry and improve focus,” Anderson added.

Brooke Bardin, a licensed clinical social worker and director of Clinical Quality Assurance in Los Angeles, pointed out that ADHD can sometimes be confused for other conditions.

Psychiatrist meeting with a patient

It is important to be assessed by a psychiatrist or mental health clinician if you experience multiple ADHD symptoms, experts advise. (iStock)

“ADHD has overlapping symptoms with other disorders and is often comorbid with other diagnoses,” she told Fox News Digital. 

Anywhere from 40% to 70% of people with autism spectrum disorder also have ADHD, according to Bardin.

For more Health articles, visit www.foxnews.com/health

It can also occur in tandem with learning disorders, anxiety disorders and mood disorders. 

“Because of this, it is important to be assessed by a psychiatrist or mental health clinician,” Bardin advised.

“ADHD is not a flaw nor something to be ashamed of — it’s simply a different way of processing information and interacting with the world.”

As you seek out the right support and strategies, Anderson emphasizes the importance of being kind to yourself.

“ADHD isn’t a limitation — it’s a unique way of experiencing the world, and with the right tools, you can learn to harness its strengths and work through its challenges.”

‘Throwaway ticketing’ is risky flight tactic that could save you money but comes with consequences

0

A flight passenger recently revealed in a post on X that he saved hundreds of dollars by using a rather “risky” hack.

Mike Bolen, a real estate investor based in California, has garnered more than 6.2 million views on his social media page after sharing this “wild” way to buy a plane ticket.

Bolen discovered that instead of booking a nonstop flight to St. Louis for $564, he could purchase a flight ticket to Atlanta with a layover in St. Louis for only $198.

TRAVELER’S VIRAL FLIGHT BOOKING HACK TO AVOID DREADED MIDDLE SEAT IGNITES DEBATE

“Why would you not just do a carry-on and get off the plane in STL? I am!” he wrote on X along with a photo of the airline’s website.

Bolen tried out this hack and “it worked out fine, no issues,” he told Fox News Digital.

While this hack may have been new to Bolen, who noted that he had never seen anyone test it out before, it turns out that the hack has been around for a while.

MOM’S VIRAL AIRPLANE SEATING HACK STIRS DEBATE; SOLO FLYERS ‘CAN’T STAND’ IT

It is often referred to as “throwaway” or “point beyond” ticketing, according to Gary Leff, a Texas-based travel industry expert and author of the blog “View From the Wing,” told Fox News Digital via email.

Instead of booking an expensive one-way flight ticket, passengers are taking a risk and testing out this “wild” flight tactic that is cheaper but may have questionable ethics. (iStock)

On Leff’s blog, he noted that people will book a flight with a connection that goes through their intended destination, but instead of hopping on the second flight, they get off at the layover location.

Nonstop flight tickets usually cost more than a connection flight, so the intent behind the “throwaway ticket” is to save money on the overall cost of the flight.

“The ethics of throwaway ticketing have been debated for decades. It comes down to the airlines believing that a flight from A to B to C is a fundamentally different product than a flight from A to B, you’re buying one thing and consuming another,” Leff wrote.

‘SEAT SQUATTER REVERSE’ IS SURPRISING AIR TRAVEL PLOT TWIST TRIGGERING REACTIONS ON SOCIAL MEDIA

“And that’s up against the common-sense notion that if you buy seats on two flights, it’s up to you what to do with them. It’s all the result of complicated pricing that average customers find confusing and unfair to begin with,” he added.

people-in-line-with-gate-agent

One of the risks of using your layover location as your final destination is that your carry-on bag may get checked at the gate and get routed to the ticket’s final destination. (iStock)

Leff noted that while the cost of the flight may be less than a direct flight, there can be practical risks when trying to attempt this travel hack.

For example, you may have to check your carry-on bag when boarding. Also, airlines could automatically reroute you on a new route based on what the airline thinks is the destination printed on the original ticket.

Leff added that airlines can actually cancel your mileage account or even present a travel ban on the passenger.

TRAVELERS AT AIRPORTS ARE PLAYING ‘CHECK-IN CHICKEN’ IN LATEST FLIGHT-BOOKING TREND

“An airline could shut down your frequent flyer account or even ban you from flying [with] them in the future. It’s something to consider occasionally, not something to do every week,” Leff wrote on his blog.

Boarding pass

This hack has been used by flight passengers for decades and is often referred to as “throwaway ticketing” or “point beyond ticketing.” (iStock)

“If you’re going to do throwaway ticketing, consider at least crediting miles to a partner airline frequent flyer account, though that may not protect you, but why make it easy for them to track you?” Leff noted.

This hack has garnered attention over recent years, with some airlines going after Skiplagged.com, an “airfare search engine for cheap flights, showing hidden-city ticketing trips,” according to the website.

The airfare site even wrote on its website, “Our flights are so cheap, United sued us… but we won.”

Fox News Digital reached out to Skiplagged.com and United Airlines for comment.

For more Lifestyle articles, visit www.foxnews.com/lifestyle.

“It’s unclear how much more the practice has taken hold, since that’s not something airlines disclose,” Leff told Fox News Digital.

Passengers waiting to get on plane

Gary Leff warns that people should be careful if they use this hack too often because the passenger could get flagged or even banned by the airline. (iStock)

“However, since it rarely requires buying a roundtrip ticket in order to get the best fares anymore, it’s become easier to do than ever (since these work best when booking one-way tickets).”

If you look past the possible risks involved with the flight hack, Leff did note that some may find this hack has two points of view when it comes to the ethics of this procedure.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

flight passengers use layover location as destination airline hack

While you may save money by trying out this travel hack, it is important to know what the possible risks may be. (iStock)

Either you “agree” to the airline’s “Contract of Carriage” and you break the agreement when you buy the ticket, or the “Contract of Carriage” does not carry much force and, therefore, “airline view contradicts commonsense morality,” Leff wrote on his website.

CLICK HERE TO GET THE FOX NEWS APP

“There are practical / consequentialist considerations that may dissuade you from the practice or at least from engaging in it frequently,” he said.

CDC monitoring possible spike of HMPV in China

0

The Centers for Disease Control and Prevention is closely monitoring reports of a spike in human metapneumovirus (HMPV) in China.

HMPV, which was discovered in 2001, is common but underdiagnosed due to its similarities to the common cold, according to the CDC.

Cases of the virus in the United States are at “pre-pandemic” levels and are not “a cause for concern” at the moment, but there is a large spike in northern China, especially in children 14 and under, according to media reports in Beijing.

Chinese government officials said the reported spike coincides with seasonal illness and seems to be less severe than in other years.

COVID ‘MOST LIKELY’ LEAKED FROM WUHAN LAB, SOCIAL DISTANCING ‘NOT BASED ON SCIENCE,’ SELECT COMMITTEE FINDS

The CDC says cases of the virus are at “pre-pandemic” levels in the U.S. and are “not currently a cause for concern.” (CDC)

“Respiratory infections tend to peak during the winter season,” the Chinese Foreign Ministry said in a statement on Friday.

Dr. Eileen Schneider, a medical epidemiologist in the CDC’s Division of Viral Diseases, said HMPV is “associated with approximately 20,000 hospitalizations among children younger than 5 years.”

The virus can also be a cause for concern in “older adults and immunocompromised patients.”

BIRD FLU UPTICK IN US HAS CDC ON ALERT FOR PANDEMIC ‘RED FLAGS’: REPORT

Virus samples

HMPV has symptoms similar to the flu and other respiratory viruses. (iStock)

Schneider said HMPV presentation is usually mild and can include respiratory symptoms such as cough, fever and nasal congestion. 

“The symptoms are often clinically indistinguishable from infection with other common respiratory viruses, such as flu and respiratory syncytial virus,” she said.

hmpv

An art teacher paints a poster to raise awareness against the spread of the HMPV virus in Mumbai, India, on Jan. 6, 2025. (Indranil Aditya/NurPhoto via Getty Images)

CLICK HERE TO GET THE FOX NEWS APP

There is no vaccine or cure for the virus at this time, the CDC said, but the infection typically does improve with resting, drinking fluids and over-the-counter medication.

Hidden staircase in church leads archaeologists to unearth 400-year-old burial vault

0

Archaeologists have unveiled a 400-year-old burial vault after following a long-lost staircase.  

The staircase was found in the Church of Saint Philibert in Dijon, France.

The Romanesque church dates back to the second half of the 12th century, according to the French National Institute for Preventative Archaeological Research (Inrap).

‘SANTA CLAUS’ SARCOPHAGUS AND MORE ANCIENT RELIGIOUS RELICS AMONG BIG DISCOVERIES IN 2024

“In the transept, a vault, probably from the 15th-16th centuries, has been identified. In it, the deceased, children and adults, are buried in coffins, the bones of each individual being pushed to the sides to make room for the last deceased,” said an Inrap press release.

Archaeologists at the French National Institute for Preventative Archaeological Research discovered a 400-year-old burial vault. (Christophe Fouquin, Inrap)

The deceased consisted of mostly adults dressed in shrouds placed in wooden coffins.

“Very few objects were found in the tombs apart from rare coins and two rosaries,” added the press release.

For more Lifestyle articles, visit foxnews.com/lifestyle

french church burial vault

Children and adults from the 15th to 16th centuries were found in coffins at the Church of Saint Philibert in Dijon, France. (Christophe Fouquin, Inrap)

Archaeology crews with Inrap found that the foundation of the vault measures about 9 feet in depth, and slab tombs that were discovered date from the 11th through 13th centuries.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Six sarcophagi were also unearthed. 

Fox News Digital reached out to Inrap for comment.

french burial church

Two rosaries and multiple coins were found with the bodies.  (Christophe Fouquin, Inrap)

St. Philibert is the only Romanesque from the 12th century church left in Dijon, according to The Institutional Repository for the University of Notre Dame (CurateND). 

“During the Revolution, the church was abandoned in 1795. It was given to the city which razed the two chapels and apse of the church to expand the present Rue des Vieilles-Ovens in 1825,” according to research posted on CurateND.

CLICK HERE TO GET THE FOX NEWS APP

St. Philibert is open to the public on select dates for Heritage Days.

Louisiana reports first bird flu-related human death in US

0

A patient in Louisiana who had been hospitalized with the first human case of highly pathogenic avian influenza (HPAI, or bird flu), has died, health officials announced on Monday. 

The death was reported by the Louisiana Department of Health (LDH). The patient, who was not identified, was over 65 and was reported to have underlying medical conditions, the agency said. 

“The patient contracted H5N1 after exposure to a combination of a non-commercial backyard flock and wild birds,” stated a press release from the LDH. 

BIRD FLU PATIENT HAD VIRUS MUTATIONS, SPARKING CONCERN ABOUT HUMAN SPREAD

“The Department expresses its deepest condolences to the patient’s family and friends as they mourn the loss of their loved one.”

“Due to patient confidentiality and respect for the family, this will be the final update about the patient.”

Patient had mutated form of virus

The Louisiana patient was found to have a mutated version of the virus, the U.S. Centers for Disease Control and Prevention (CDC) announced last week.

A patient in Louisiana who had been hospitalized with the first human case of highly pathogenic avian influenza (HPAI), has died, health officials announced on Monday.  (iStock)

The fact that the virus mutated within the patient suggests that it could potentially spread from human to human.

The CDC analyzed samples of the H5N1 virus that were collected from the patient, comparing its genomic sequences to those of infected dairy cows, wild birds, poultry and other animals, the agency stated.

“The patient contracted H5N1 after exposure to a combination of a non-commercial backyard flock and wild birds.”

“The analysis identified low frequency mutations in the hemagglutinin gene of a sample sequenced from the patient, which were not found in virus sequences from poultry samples collected on the patient’s property, suggesting the changes emerged in the patient after infection,” the CDC said.

CLICK HERE TO GET THE FOX NEWS APP     

“While these low frequency changes are rare in humans, they have been reported in previous cases of A(H5N1) in other countries and most often during severe disease.”

Waterfowl

Officials warn that those who come in contact with birds, poultry or cows are at higher risk of contracting the virus. (Photo by Uli Deck/picture alliance via Getty Images)

Based on the discovery of these genetic changes in the virus, health officials recommend performing “ongoing genomic surveillance” in people and animals, taking steps to contain bird flu outbreaks among dairy cattle and poultry, and taking steps to prevent transmission when exposed to infected animals or environments.

Risk remains low, officials say

Both the CDC and the LDH maintain that risk to the general public remains low.

Officials did caution, however, that those who come in contact with birds, poultry or cows are at a higher risk of contracting the virus.

Split image of cows and bird flu vial

As of Friday, there were 66 confirmed human cases of bird flu, including the Louisiana case, according to the CDC. (iStock)

As of Friday, there were 66 confirmed human cases of bird flu, including the Louisiana case, according to the CDC. Of those, 37 were in California alone, 11 in Washington and 10 in Colorado. 

Around 40 of the cases were related to exposure to cattle herds.

CLICK HERE TO SIGN UP FOR OUR HEALTH NEWSLETTER 

Avian influenza is a highly contagious virus that can spread through contact with infected animals, by equipment, and on the clothing and shoes of caretakers, according to the Michigan Department of Agriculture and Rural Development.

For more Health articles, visit www.foxnews.com/health

Fox News Digital has reached out to the CDC. 

After years of Parkinson’s research, Michael J. Fox awarded Presidential Medal of Freedom

0

Actor, author and advocate Michael J. Fox has been awarded the nation’s highest civilian honor.

On Jan. 4, Fox received the Presidential Medal of Freedom in recognition of his efforts in Parkinson’s disease research with The Michael J. Fox Foundation for Parkinson’s Research (MJFF).

President Biden presented the medal in a White House ceremony, which honors individuals who have made “exemplary contributions to the prosperity, values or security of the United States, world peace, or other significant societal, public or private endeavors,” according to a press release.

MICHAEL J. FOX GETS SCARED AMID PARKINSON’S DISEASE BATTLE, BUT ‘THE ABSENCE OF FEAR IS FAITH’

Fox’s introduction to the stage read: “Michael J. Fox is one of the most beloved actors of our time. With remarkable wit and charm, he introduced iconic characters to the center of American culture, from Alex P. Keaton to Marty McFly and more.”

U.S. President Joe Biden presents the Presidential Medal of Freedom to Michael J. Fox during a ceremony in the East Room of the White House on Jan. 4, 2025. (REUTERS/Ken Cedeno)

“With undaunted resilience and optimism, he also warms hearts and captivates audiences as a fearless advocate for those with Parkinson’s disease,” the intro continued. “Channeling his endearing personality to advance treatments moves us closer to a cure and reminds us of the power of American possibilities.”

The White House press release also recognized Fox for winning five Emmy Awards, four Golden Globe Awards, two Screen Actors Guild Awards and a Grammy Award, in addition to being a “world-renowned advocate for Parkinson’s disease research and development.”

“Receiving the Presidential Medal of Freedom is humbling, an honor I could never have anticipated.”

“Receiving the Presidential Medal of Freedom is humbling, an honor I could never have anticipated,” Fox said in a press release statement from MJFF. 

“I’m grateful for this recognition, which I share with the patients, families and researchers who have brought us closer than ever to ending Parkinson’s disease once and for all.”

president biden holds michael j fox at his shoulders with the medal of freedom around his neck

President Joe Biden presents the Presidential Medal of Freedom, the nation’s highest civilian honor, to Michael J. Fox, center, in the East Room of the White House on Jan. 4, 2025. (AP Photo/Manuel Balce Ceneta)

Since its 2000 launch, Fox’s organization has become the world’s largest nonprofit for Parkinson’s research, according to MJFF.

Fox was diagnosed with the progressive brain disorder in 1991.

CLICK HERE TO SIGN UP FOR OUR HEALTH NEWSLETTER

MJFF has allocated more than $2 billion to “high-impact global research programs” to speed up treatments and a cure.

The foundation recently marked a breakthrough discovery of a Parkinson’s biomarker in 2023, as well as the establishment of the National Parkinson’s Project – a 2024 law that drives the “first-ever federal initiative” to accelerate research and improve patient care.

For more Health articles, visit www.foxnews.com/health

Parkinson’s disease is now the second most common and fastest-growing neurological disease worldwide, according to MJFF.

michael j fox is awarded the presidential medal of freedom

Fox has been living with Parkinson’s since he was first diagnosed in 1991, which led to the establishment of MJFF in 2000. (Leigh Vogel/Pool/Sipa USA)

More than one million Americans, including 110,000 U.S. military veterans, are estimated to live with the disease today.

As these numbers rise, studies project that Parkinson’s cases will double globally by 2040. 

THE EFFECT OF PARKINSON’S DISEASE ON THE BRAIN AND COMMON WAYS THOSE IMPACTED SUBDUE SYMPTOMS

Alongside Fox, there were 18 additional Presidential Medal of Freedom honorees, including Jose Andres, Bono, Ash Carter, Hillary Clinton, Tim Gill, Jane Goodall, Fannie Lou Hamer, Earvin “Magic” Johnson, Robert Francis Kennedy, Ralph Lauren, Lionel Messi, Bill Nye, George Romney, David Rubenstein, George Soros, George Stevens, Jr., Denzel Washington and Anna Wintour.

CLICK HERE TO GET THE FOX NEWS APP 

Fox News Digital’s Ashley Hume contributed to this report.

UK PM Starmer hits back against Musk attacks on child grooming gangs: ‘Lies and misinformation’

0

U.K. Prime Minister Keir Starmer on Monday hit back against attacks over his handling of the child grooming gang scandal that has repeatedly rocked the nation, and has seen more scrutiny in the last week fueled by SpaceX CEO Elon Musk.

“Those that are spreading lies and misinformation as far and wide as possible, they’re not interested in victims, they’re interested in themselves,” Starmer said in response to questions from reporters about Musk’s comments, although he did not mention Musk directly.

The U.K. grooming scandal, where it was revealed that gangs of predominantly South Asian or British Pakistani men had exploited and abused children for decades in towns in northern England, resurfaced last week amid fresh calls for a national inquiry.

ELON MUSK DEMANDS UK ACT ON GROOMING GANG SCANDAL AMID GROWING CALLS FOR PROBE

Previous reports in towns like Rotherham and Telford had found evidence of horrific crimes against children over decades and that authorities had either suppressed information or had concerns about stoking racism. It is frequently cited as a failure of multiculturalism and the impact of mass immigration. 

President-elect Trump and Elon Musk arrive for the launch of a SpaceX Starship rocket on Nov. 19, 2024, in Brownsville, Texas. (Brandon Bell/Getty Images)

Musk had slammed the government for its rejection of a call for a new national inquiry into the handling of authorities’ actions in Oldham. Home Office Minister Jess Phillips responded to the request in October, saying that any such inquiry should be organized locally. 

A 2022 report into Oldham’s actions between 2011 and 2014 found that children were failed by local agencies, but it also found that there was no cover-up despite “legitimate concerns” that the far-right would capitalize on “the high-profile convictions of predominantly Pakistani offenders across the country.”

Musk, along with top conservative officials, including Conservative Party Leader Kemi Badenoch, demanded a full inquiry. Musk went further, calling for King Charles III to step in.

“They oppose an inquiry, because it will show that those in power were complicit in the cover-up,” he said of the government on X.

Musk had called for the prosecution of Starmer, who was director of public prosecutions at the time the scandal broke, as well as Phillips – who he called a “rape genocide apologist.”

BRITAIN HIT BY ANOTHER ASIAN GROOMING GANG SCANDAL AS REPORT EXPOSES CHILD SEX ABUSE IN MANCHESTER

Starmer Britain UK

Prime Minister Keir Starmer gives a speech in Surrey, England, Monday, Jan. 6, 2025. (Leon Neal/Pool Photo via AP)

Starmer made reference to those remarks in his answer, as he defended his record as prosecutor, saying he had reopened closed cases and “changed the whole prosecution approach” to the abuse.

“When the poison of the far-right leads to serious threats to Jess Phillips and others, then in my book, a line has been crossed,” Starmer said. “I enjoy the cut and thrust of politics, the robust debate that we must have, but that’s got to be based on facts and truth, not on lies.”

NIGEL FARAGE RESPONDS AFTER ELON MUSK DECLARES HE ‘DOESN’T HAVE WHAT IT TAKES’ TO LEAD REFORM UK PARTY

He also criticized politicians he said “are casual about honesty, decency, truth and the rule of law, calling for inquiries because they want to jump on a bandwagon of the far-right.”

Musk shot back.

CLICK HERE TO GET THE FOX NEWS APP

“What an insane thing to say! The real reason is that it would show how Starmer repeatedly ignored the pleas of vast numbers of little girls and their parents, in order to secure political support. Starmer is utterly despicable,” he said.

The Associated Press contributed to this report.

Getting better sleep can help ‘significantly’ with an important task, says study

0

Good shut-eye is critical for all sorts of reasons — but now there’s a compelling new one, according to a study.

An international team of scientists discovered an interesting incentive for getting eight hours of sleep a night.

Make sure to get plenty of slumber if you’re trying to learn a new language, researchers say. 

TRUMP’S DAYLIGHT SAVING PLAN AND SLEEP: WHAT YOU MUST KNOW

The study, led by the University of South Australia, revealed that the coordination of two electrical events in the sleeping brain “significantly” improves its ability to remember new words and complex grammatical rules, as news agency SWNS reported.

To explore the relationship between memory retention and sleep, researchers at the university asked 35 English-speaking adults to study Mini Pinyin, a miniature language based on Mandarin. 

An international team of scientists has discovered a compelling incentive to get eight hours of sleep a night — and it might surprise you. (iStock)

Mini Pinyin’s grammatical rules are similar to English. 

The language contains 32 verbs and 25 nouns, SWNS reported, including 10 human entities, 10 animals and five objects. 

‘I CAN’T SLEEP BECAUSE OF RACING THOUGHTS AT NIGHT — HOW CAN I STOP THEM?’: ASK A DOCTOR

Overall, the language has 576 unique sentences.

The participants were split into two groups. 

Half the participants learned the language in the morning — the other half learned it in the evening, then slept on it. 

Half of them learned the language in the morning and returned in the evening to have their memory tested. 

The other half learned Mini Pinyin in the evening, slept through the night and had their memory tested the next morning. 

young woman asleep

Sleep does not just mean a period of rest. “It is also an active, transformative state of the brain,” said a researcher involved in the new study.  (iStock)

Researchers also tracked the brain activity of the second group during their sleep, said SWNS. 

Those who slept performed significantly better than those who remained awake, according to the findings, which were published in the Journal of Neuroscience.

FDA APPROVES FIRST MEDICATION FOR OBSTRUCTIVE SLEEP APNEA, WHICH ALSO PROMOTES WEIGHT LOSS

Lead researcher Zachariah Cross, PhD, said sleep-based improvements were linked to the coupling of slow oscillations and sleep spindles — brainwave patterns that synchronize during NREM sleep.  

Cross, who earned his PhD at the University of South Australia and is now based at Northwestern University in the U.S., said that “the coupling likely reflects the transfer of learned information from the hippocampus to the cortex, enhancing long-term memory storage.”

A woman sleeping in her bed

Those who slept performed significantly better than those who remained awake, according to the findings.  (iStock)

Post-sleep neural activity, he also said, “showed unique patterns … suggesting a strong link between sleep-induced brainwave coordination and learning patterns.”

The study underscores the importance of sleep in learning complex linguistic rules, said researcher Scott Cousens of the University of South Australia.

DO WOMEN NEED MORE SLEEP THAN MEN? HERE’S WHAT EXPERTS THINK

Sleep does not just mean a time to rest, he suggested. 

“It is also an active, transformative state of the brain,” he said. 

The research team said it plans to explore how sleep and wake dynamics influence the learning of other complex cognitive tasks.

man in deep sleep

The research team said it plans to explore how sleep and wake dynamics influence the learning of other complex cognitive tasks, aside from language studies. (iStock)

“Understanding how the brain works has implications beyond language learning,” said Cross. “It could revolutionize how we approach education, rehabilitation and cognitive training.”

CLICK HERE TO SIGN UP FOR OUR HEALTH NEWSLETTER

Dr. Brian Licuanan, a board-certified clinical psychologist in California, recently told Fox News Digital that there are a variety of reasons sleep can be disrupted — including medical and mental health conditions, diet, alcohol intake and other lifestyle behaviors, such as screen exposure.

CLICK HERE TO GET THE FOX NEWS APP

Among the tips for better sleep — as shared by Licuanan, the author of “How to Get Your Resisting Loved One Into Treatment” — are being more cognizant of food and drink consumption. 

For more Health articles, visit www.foxnews.com/health

“Carve out time for exercise and healthy eating habits, as that will help you relax and promote better sleep.”

Angelica Stabile of Fox News Digital contributed reporting.

Hacked Chrome extensions put 2.6 million users at risk of data leak

0


Your web browser is an ecosystem of its own. It stores your passwords, search history, financial details like credit card numbers, addresses and more. Just like how malicious apps and services can compromise data on your phone or PC, malicious extensions can expose the data stored in your browser. 

There are a ton of extensions out there that do more harm than good. In fact, security researchers have just found a dangerous new campaign that is going after browser extensions. So far, around 36 extensions have been compromised, putting over 2.6 million Chrome users at risk of having their browsing data and account credentials exposed.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Hacked Chrome extensions put 2.6 million users at risk of data leak

A person using a Chrome browser extension (Kurt “CyberGuy” Knutsson)

How hackers are targeting browser extensions

Hackers are exploiting browser extensions as a gateway to steal sensitive user data through a variety of methods. These compromised extensions are exposing over 2.6 million users to data exposure and credential theft, as reported by The Hacker News. 

One common attack involves phishing campaigns targeting the publishers of legitimate extensions on platforms like the Chrome Web Store. In these campaigns, attackers trick developers into granting permissions to malicious applications, which then insert harmful code into popular extensions. This code can steal cookies, access tokens and other user data.

The first company to shed light on the campaign was cybersecurity firm Cyberhaven, one of whose employees were targeted by a phishing attack on December 24, allowing the threat actors to publish a malicious version of the extension.

Once these malicious extensions are published and pass the Chrome Web Store’s security review, they are made available to millions of users, putting them at risk of data theft. Attackers can use these extensions to exfiltrate browsing data, monitor user activity and even bypass security measures such as two-factor authentication.

In some cases, developers themselves may unknowingly include data-gathering code as part of a monetization software development kit, which stealthily exfiltrates detailed browsing data. This makes it difficult to determine whether a compromise is the result of a hacking campaign or an intentional inclusion by the developer.

Hacked Chrome extensions put 2.6 million users at risk of data leak

Image of a Chrome browser on a cellphone (Kurt “CyberGuy” Knutsson)

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Remove these extensions from your web browser

The browser extension security platform Secure Annex has launched its own investigation into this hacking campaign. So far, it has uncovered over twenty additional compromised extensions, which are listed below. If you have any of the compromised extensions listed in Secure Annex’s investigation installed on your browser, it’s essential to remove them immediately to protect your data.

  1. AI Assistant – ChatGPT and Gemini for Chrome
  2. Bard AI Chat Extension
  3. GPT 4 Summary with OpenAI
  4. Search Copilot AI Assistant for Chrome
  5. TinaMInd AI Assistant
  6. Wayin AI
  7. VPNCity
  8. Internxt VPN
  9. Vindoz Flex Video Recorder
  10. VidHelper Video Downloader
  11. Bookmark Favicon Changer
  12. Castorus
  13. Uvoice
  14. Reader Mode
  15. Parrot Talks
  16. Primus
  17. Tackker – online keylogger tool
  18. AI Shop Buddy
  19. Sort by Oldest
  20. Rewards Search Automator
  21. ChatGPT Assistant – Smart Search
  22. Keyboard History Recorder
  23. Email Hunter
  24. Visual Effects for Google Meet
  25. Earny – Up to 20% Cash Back
  26. Cyberhaven security extension V3
  27. GraphQL Network Inspector
  28. Vidnoz Flex – Video recorder & Video share
  29. YesCaptcha assistant
  30. Proxy SwitchyOmega (V3)
  31. ChatGPT App
  32. Web Mirror
  33. Hi AI

Keeping these extensions installed is a serious risk since hackers can still access your data even if the malicious version has been taken down from the Chrome Web Store. Secure Annex is still investigating and has shared a public Google Sheet with details about the malicious extensions it has found so far, like whether they’ve been updated or removed. They’re also adding new extensions to the list as they discover them.

WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM

How to remove an extension from Google Chrome

If you have installed one of the above-mentioned extensions on your browser, remove it as soon as possible. To remove an extension from Google Chrome, follow these steps:

  • Open Chrome and click the icon that looks like a piece of a puzzle. You’ll find it in the top-right corner of the browser.
  • You can see all the active extensions now. Click the three dots icon next to the extension you want to remove and select Remove from Chrome.
  • Click Remove to confirm
Hacked Chrome extensions put 2.6 million users at risk of data leak

Steps to remove an extension from Google Chrome (Kurt “CyberGuy” Knutsson)

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS – CYBERGUY PICKS

7 ways to stay safe from malicious software

1) Verify emails and links before clicking: Many attacks begin with phishing emails that impersonate trusted entities like Google Chrome Web Store Developer Support. These emails often create a false sense of urgency, urging you to click on malicious links. Always verify the sender’s email address and avoid clicking on links without double-checking their authenticity. When in doubt, go directly to the official website rather than using a provided link.

2) Use strong antivirus software: Having strong antivirus software is an essential line of defense against malicious software. These tools can detect and block malicious code, even if it has been embedded in browser extensions. The best way to safeguard yourself from malicious links that install strong malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Limit extension permissions: Be cautious about the permissions you grant to browser extensions. Many require access to sensitive data like browsing history, cookies or account information, but not all requests are necessary. Review what each extension asks for and deny permissions that seem excessive. If possible, opt for extensions with limited access to ensure your data remains protected.

4) Limit the number of extensions: Only install extensions that are genuinely needed and regularly review and uninstall those no longer in use.

5) Keep your browser updated: Always update your browser to the latest version. Updates often include critical security patches that protect against vulnerabilities exploited by malicious software. Using an outdated browser increases the risk of being targeted by attacks that could have been prevented with a simple update. Enable automatic updates to ensure you’re always protected. If you are unsure how to update your browser, check out my detailed guide for Google Chrome.

6) Regularly audit your extensions: Conduct periodic reviews of installed extensions and remove any that are unnecessary or pose potential security risks.

7) Report suspicious extensions: If you encounter a suspicious extension, report it to the official browser extension marketplace.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Kurt’s key takeaway

Hackers are getting smarter, and browser extensions have become a new favorite target for stealing sensitive data. The discovery of over 35 compromised Chrome extensions, putting 2.6 million users at risk, is a wake-up call for everyone. Removing suspicious extensions is an essential step to protect your data. This also puts Google’s Chrome Web Store review process under scrutiny, proving that even trusted platforms can be exploited. 

How often do you review and remove unused or suspicious browser extensions? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.



Source link