-4 C
New York
Friday, February 13, 2026
Home Blog Page 37

Costa Rica security alert issued to travelers over rental property break-ins, armed robberies

0

NEWYou can now listen to Fox News articles!

The U.S. Embassy San Jose has issued a security alert for Costa Rica.

The alert was issued on Nov. 25, citing reports of recent property crimes, financial crimes and robberies.

“Tourists have reported break-ins and armed robberies at Airbnbs and other rental properties,” the alert says. 

NEW ADVISORY SAYS ‘TERRORIST GROUPS MAY ATTACK’ IN POPULAR SUNNY DESTINATION

Nearly 3 million people visited Costa Rica in 2024, according to Instituto Costarricense de Turismo.

The alert adds that criminal gangs have forced travelers to withdraw large sums of cash from ATMs or by making bank transfers.

The U.S. Embassy San Jose has issued a security alert for Costa Rica, citing financial crimes, property crimes and robberies. (iStock)

“Do not display signs of wealth, such as wearing expensive jewelry or watches,” the Embassy advises.

Tourists are encouraged to avoid traveling alone, to stay vigilant when visiting banks or ATMs and to never leave valuables unattended in vehicles.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

When renting a car, tourists are told to “double check [that the] vehicle is locked.” The alert added that “thieves often use signal blockers to prevent vehicles from locking with key fobs.”

As for financial crimes, tourists are encouraged to set daily withdrawal limits from bank accounts, minimize funds kept in any one account and discuss security strategies with their banks ahead of any trips.

"Do not display signs of wealth, such as wearing expensive jewelry or watches," says a new alert for Costa Rica. 

“Do not display signs of wealth, such as wearing expensive jewelry or watches,” says a new alert for Costa Rica.  (iStock)

The warm paradise is known for its beaches, rainforests, wildlife and adventure activities.

CLICK HERE TO GET THE FOX NEWS APP

While all-inclusive resorts are popular, there are hundreds of rental properties available.

CLICK HERE FOR MORE LIFESTYLE STORIES

The alert tells tourists to research Airbnbs, rental properties and hotels in advance of trips. 

man soaking in costa rica view of water and rainforrest

Nearly 3 million people visited Costa Rica in 2024 alone. (iStock)

“Ensure the property has strong security measures, and keep doors and windows locked,” the advisory says.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“Avoid properties with reviews that mention security incidents.”

The U.S. State Department has had a Level 2 travel advisory in place since Dec. 10, 2024.

Attractive couple lounging by the pool at a luxury resort

“Avoid properties with reviews that mention security incidents,” says the advisory to travelers.  (iStock)

“Petty crime is common throughout Costa Rica,” says the advisory justification. 

“Violent crime also affects tourists. This includes armed robbery, homicide and sexual assault.”

Scammers exploit Apple Support system to create convincing fake alerts

0


NEWYou can now listen to Fox News articles!

A new phishing scam is getting a lot of attention because it uses real Apple Support tickets to trick people into giving up their accounts. Broadcom’s Eric Moret shared how he nearly lost his entire Apple account after trusting what looked like official communication. He described the full experience in a detailed post on Medium, where he walked through the scam step by step.

This scheme stands out because the scammers relied on Apple’s own support system to make their messages look legitimate. They created an experience that felt polished and professional from the first alert to the final phone call. Here’s how the scam unfolded.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

THE #1 GOOGLE SEARCH SCAM EVERYONE FALLS FOR

iOS email app icon.

Scammers are exploiting real Apple Support tickets to trick users into handing over their accounts, experts warn. (Photo by STR/NurPhoto via Getty Images)

How the scam starts

Moret first received a flood of alerts. These included two-factor authentication notifications that claimed someone was trying to access his iCloud account. Within minutes, he got phone calls from calm, helpful callers who claimed to be Apple agents ready to fix the issue.

The twist is how convincing the entire setup felt. The scammers were able to exploit a flaw in Apple’s Support system that lets anyone create a genuine support ticket without verification. They opened a real Apple Support case in his name, which triggered official emails from an Apple domain. This built instant trust and lowered Moret’s guard.

How scammers gained access to the account

During a 25-minute call, the fake agents guided Moret through what they said would secure his account. They walked him through the steps to reset his iCloud password. They also told him a link would follow so he could close the case.

That link took him to a fake site called appeal apple dot com. The page looked official and claimed his account was being secured. It then told him to enter a six-digit code sent by text to finish the process.

When Moret entered that code, the scammers got exactly what they needed to sign into his account.

He then got an alert that his Apple ID had been used to sign into a Mac mini he did not own. That confirmed the takeover attempt. Even though the scammer on the phone said this was normal, he trusted his instinct. He reset his password again, which kicked them out and stopped the attack.

BEWARE FAKE CREDIT CARD ACCOUNT RESTRICTION SCAMS

Apple email app icon.

A Broadcom executive says he nearly lost access to his Apple ID after trusting a fraudulent support call that looked legitimate. (Photo by Jakub Porzycki/NurPhoto via Getty Images)

How to protect yourself from the Apple Support ticket scam

This type of scam works because it feels real. The messages look official, and the callers sound trained. Still, you can stay safer by watching out for signs that something is off.

1) Verify support tickets inside your Apple account

Scammers created a real-looking ticket to make the entire experience seem legitimate. You can confirm what’s real by checking directly with Apple. Sign in at appleid.apple.com or open the Apple Support app to view your recent cases. If the case number isn’t listed there, the message is fake, even if the email comes from an Apple domain.

2) Hang up and call Apple yourself

Never stay on a call that you did not initiate. Scammers rely on long conversations to build trust and pressure you into quick decisions. Hang up right away and call Apple Support directly at 1-800-275-2273 or through the Support app. A real agent will quickly confirm whether anything is wrong.

3) Check your Apple ID device list

If something feels off, look at the devices signed into your account. Go to Settings, tap your name and scroll to see all devices linked to your Apple ID. Remove anything you don’t recognize. This step can stop attackers fast if they’ve managed to get in.

4) Never share verification codes

No real support agent will ever ask for your two-factor authentication codes. Treat any request for these codes as a major warning.

5) Check every link carefully

Look closely at URLs. Fake sites often add extra words or change formatting to appear real. Apple will never send you to a site like appeal apple dot com.

SCAMMERS ARE ABUSING ICLOUD CALENDAR TO SEND PHISHING EMAILS

Woman holding an Apple Macbook.

Criminals are using Apple’s own support system to generate real case emails that build false confidence with victims. (Photo by Fairfax Media via Getty Images via Getty Images)

6) Use strong antivirus software

Strong antivirus software can spot dangerous links, unsafe sites, and fake support messages before you tap them. Anti-phishing tools are especially important with scams like this one since the attackers used a fake site and real ticket emails to trick victims.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

7) Use a data removal service

Data brokers collect your phone number, home address, email, and other details that scammers use to personalize attacks. A data removal service can wipe much of that information from broker sites, which makes you a harder target for social engineering attempts like the one described in this article.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

8) Turn on strong multi-layer protection

Keep two-factor authentication (2FA) on for every major account.  This creates a barrier that quickly stops attackers.

9) Slow down before reacting

Scammers want you to panic. Pause before you act. Trust your instinct when something feels rushed or strange. A short delay could save your entire account.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

This scam shows how convincing criminals can be when they exploit real systems. Even careful users can fall for messages that look official and calls that sound professional. The best defense is to stay alert and take a moment before responding to anything unexpected. When you slow down, double-check support tickets, and never share verification codes, you make yourself far harder to fool. Adding layers like antivirus protection and data removal services also gives you more control over what attackers can access. These simple habits can stop even the most polished scams before they get to your accounts.

What would you do if you got a support call that felt real but didn’t seem right? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link

Podcasting As a Content Marketing Tool: Getting Started

0

Latest Blog from RPR Comando: “Podcasting As a Content Marketing Tool: Getting Started”. Podcasting As a Content Marketing Tool has taken the world by storm, transforming how we consume content. With millions of podcasts available across various platforms, it’s clear that people are hungry for authentic, engaging audio experiences. #BookMarketing #VideoShorts #PressReleaseMarketing #RPRComando  
This article originally appeared on https://rprcomando.com/podcasting-as-a-content-marketing-tool-getting-started/

Is This The Head of Your PR Department 1
Podcasting As a Content Marketing Tool: Getting Started 15
RPR Logo
Podcasting As a Content Marketing Tool: Getting Started 16

FoloToy restores AI teddy bear Kumma sales after addressing safety concerns

0


NEWYou can now listen to Fox News articles!

FoloToy paused sales of its AI teddy bear Kumma after a safety group found the toy gave risky and inappropriate responses during testing. Now the company says it has restored sales after a week of intense review. It also claims that it improved safeguards to keep kids safe.

The announcement arrived through a social media post that highlighted a push for stronger oversight. The company said it completed testing, reinforced safety modules, and upgraded its content filters. It added that it aims to build age-appropriate AI companions for families worldwide.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

TEXAS FAMILY SUES CHARACTER.AI AFTER CHATBOT ALLEGEDLY ENCOURAGED AUTISTIC SON TO HARM PARENTS AND HIMSELF

Photo of the FoloToy Teddy bear.

FoloToy resumed sales of its AI teddy bear Kumma after a weeklong review prompted by safety concerns. (Kurt “CyberGuy” Knuttson)

Why FoloToy’s AI teddy bear raised safety concerns

The controversy started when the Public Interest Research Group Education Fund tested three different AI toys. All of them produced concerning answers that touched on religion, Norse mythology, and harmful household items.

Kumma stood out for the wrong reasons. When the bear used the Mistral model, it offered tips on where to find knives, pills, and matches. It even outlined steps to light a match and blow it out.

Tests with the GPT-4o model raised even sharper concerns. Kumma gave advice related to kissing and launched into detailed explanations of adult sexual content when prompted. The bear pushed further by asking the young user what they wanted to explore.

Researchers called the behavior unsafe and inappropriate for any child-focused product.

FoloToy paused access to its AI toys

Once the findings became public, FoloToy suspended sales of Kumma and its other AI toys. The company told PIRG that it started a full safety audit across all products.

OpenAI also confirmed that it suspended FoloToy’s access to its models for violating policies designed to protect anyone under 18.

LAWMAKERS UNVEIL BIPARTISAN GUARD ACT AFTER PARENTS BLAME AI CHATBOTS FOR TEEN SUICIDES, VIOLENCE

Photo of an AI Teddy bear.

The company says new safeguards and upgraded filters are now in place to prevent inappropriate responses. (Kurt “CyberGuy” Knutsson)

Why FoloToy restored Kumma’s sales after its safety review

FoloToy brought Kumma back to its online store just one week after suspending sales. The fast return drew attention from parents and safety experts who wondered if the company had enough time to fix the serious issues identified in PIRG’s report.

FoloToy posted a detailed statement on X that laid out its version of what happened. In the post, the company said it viewed child safety as its “highest priority” and that it was “the only company to proactively suspend sales, not only of the product mentioned in the report, but also of our other AI toys. FoloToy said it took this action “immediately after the findings were published because we believe responsible action must come before commercial considerations.”

The company also emphasized to CyberGuy that it was the only one of the three AI toy startups in the PIRG review to suspend sales across all of its products and that it made this decision during the peak Christmas sales season, knowing the commercial impact would be significant. FoloToy told us, “Nevertheless, we moved forward decisively, because we believe that responsible action must always come before commercial interests.”

The company also said it took the report’s disturbing examples seriously. According to FoloToy, the issues were “directly addressed in our internal review.” It explained that the team “initiated a deep, company-wide internal safety audit,” then “strengthened and upgraded our content-moderation and child-safety safeguards,” and “deployed enhanced safety rules and protections through our cloud-based system.”

After outlining these steps, the company said it spent the week on “rigorous review, testing, and reinforcement of our safety modules.” It concluded its announcement by saying it “began gradually restoring product sales” as those updated safeguards went live.

FoloToy added that as global attention on AI toy risks grows, “transparency, responsibility and continuous improvement are essential,” and that the company “remains firmly committed to building safe, age-appropriate AI companions for children and families worldwide.”

LEAKED META DOCUMENTS SHOW HOW AI CHATBOTS HANDLE CHILD EXPLOITATION

A child with the AI Teddy bear.

Safety testers previously found the toy giving risky guidance about weapons, matches and adult content.

Why experts still question FoloToy’s AI toy safety fixes

PIRG researcher RJ Cross said her team plans to test the updated toys to see if the fixes hold up. She noted that a week feels fast for such significant changes, and only new tests will show if the product now behaves safely.

Parents will want to follow this closely as AI-powered toys grow more common. The speed of FoloToy’s relaunch raises questions about the depth of its review.

Tips for parents before buying AI toys

AI toys can feel exciting and helpful, but they can also surprise you with content you’d never expect. If you plan to bring an AI-powered toy into your home, these simple steps can help you stay in control.

1) Check which AI model the toy uses

Not every model follows the same guardrails. Some include stronger filters while others may respond too freely. Look for transparent disclosures about which model powers the toy and what safety features support it.

2) Read independent reviews

Groups like PIRG often test toys in ways parents cannot. These reviews flag hidden risks and point out behavior you may not catch during quick demos.

3) Set clear usage rules

Keep AI toys in shared spaces where you can hear or see how your child interacts with it. This helps you step in if the toy gives a concerning answer.

4) Test the toy yourself first

Ask the toy questions, try creative prompts, and see how it handles tricky topics. This lets you learn how it behaves before you hand it to your child.

5) Update the toy’s firmware

Many AI toys run on cloud systems. Updates often add stronger safeguards or reduce risky answers. Make sure the device stays current.

6) Check for a clear privacy policy

AI toys can gather voice data, location info, or behavioral patterns. A strong privacy policy should explain what is collected, how long it is stored, and who can access it.

7) Watch for sudden behavior changes

If an AI toy starts giving odd answers or pushes into areas that feel inappropriate, stop using it and report the problem to the manufacturer.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com 

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

AI toys can offer fun and learning, but they can also expose kids to unexpected risks. FoloToy says it improved Kumma’s safety, yet experts still want proof. Until the updated toy goes through independent testing, families may want to stay cautious.

Do you think AI toys can ever be fully safe for young kids? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Copyright 2025 CyberGuy.com.  All rights reserved. 



Source link

War Sec. Pete Hegseth posts meme of children’s book character blowing up boat

0

NEWYou can now listen to Fox News articles!

As the Trump administration conducts deadly strikes against alleged drug boats of narco-terrorists, War Secretary Pete Hegseth posted a meme depicting the children’s book series character Franklin firing a weapon at such a vessel.

“For your Christmas wish list…” Hegseth joked when sharing the fake book cover.

The meme shows the turtle character in a helicopter, firing what appears to be an RPG at one of the boats in the water below. The RPG fired by Franklin flies toward the vessel, where there is already an explosion occurring.

HEGSETH DEFENDS LETHAL STRIKES AGAINST ALLEGED DRUG TRAFFICKERS: ‘BIDEN CODDLED TERRORISTS, WE KILL THEM’

U.S. Secretary of Defense Pete Hegseth smiles during a press conference at the Dominican National Palace in Santo Domingo on Nov. 26, 2025 ( Felix Leon / AFP via Getty Images)

“Franklin Targets Narco Terrorists,” the title on the fake book cover reads.

Democratic Rep. Seth Moulton of Massachusetts, who is running for Senate, blasted Hegseth. 

WAR SECRETARY PETE HEGSETH SPENDS THANKSGIVING WITH US TROOPS IN LATIN AMERICA: ‘WE ARE GRATEFUL FOR YOU’

Rep. Seth Moulton

Rep. Seth Moulton, D-Mass., speaks during the U.S. Chamber of Commerce’s Global Aerospace Summit in Washington, D.C., on Wednesday, Sept. 10, 2025.  (Al Drago/Bloomberg via Getty Images)

“You’re a disgrace,” he wrote.

“There’s nothing Christian about war crimes,” former Rep. Justin Amash wrote in response to Hegseth’s post.

WAR SECRETARY HEGSETH DELIVERS THANKSGIVING MESSAGE TO TROOPS

War Secretary Pete Hegseth

U.S. Secretary of War Pete Hegseth stands prior to the NFL 2025 game between Detroit Lions and Washington Commanders at Northwest Stadium on Nov. 9, 2025 in Landover, Md. (Lauren Leigh Bacho/Getty Images)

CLICK HERE TO GET THE FOX NEWS APP

“As we’ve said from the beginning, and in every statement, these highly effective strikes are specifically intended to be ‘lethal, kinetic strikes.’ The declared intent is to stop lethal drugs, destroy narco-boats, and kill the narco-terrorists who are poisoning the American people. Every trafficker we kill is affiliated with a Designated Terrorist Organization,” Hegseth wrote in part of a recent post on X.

Ancient warrior tomb discovered in Hungary dates back 1,300 years

0

NEWYou can now listen to Fox News articles!

Officials have unveiled the tomb of an ancient warrior, buried over 1,300 years ago by a long-forgotten people.

King Saint Stephen Museum, located in Székesfehérvár, Hungary, announced the discovery on Facebook. The tomb belonged to a “high-ranking Avar-period warrior,” according to the translated post.

The Avars were a nomadic people from Central Asia who settled parts of what is now Hungary, Slovakia, Romania, Serbia and Austria during the early Middle Ages. Once dominant across Central and Southern Europe, their power weakened after Charlemagne’s campaigns.

ELITE ROMAN FAMILY’S ANCIENT TREASURE UNEARTHED IN RUINS OF FIRE-SCORCHED DWELLING

The burial, less than seven feet deep, likely dates between 670 and 690 A.D., during the Middle Avar Period. It was found in August, though officials only revealed the discovery in October.

The museum’s announcement noted that the body appeared to have been “disturbed” at some point, as the warrior’s head, chest and abdomen had been moved from their anatomical positions.

Archaeologists in Hungary revealed a 1,300-year-old Avar warrior’s tomb containing rare weapons and valuable artifacts. (Szent István Király Múzeum via Facebook)

But the grave also contained fascinating — and valuable — artifacts that were untouched.

These included a long knife, silver belt ornaments, gilded braid rings, an earring and a saber.

Frigyes Szücsi, lead archaeologist of the excavation, told Fox News Digital only 80 similar sabers have been found from the Middle Avar Period.

WISCONSIN DIVERS REVEAL MYSTERIOUS UNDERWATER PARKING LOT OF ANCIENT CANOES PRESERVED FOR MILLENNIA

“But most of them are not in as good condition as the one we found, or they were not discovered during archeological excavations,” said Szücsi. “Only high-status warriors had sabers, as it was the most expensive weapon of the time.”

The archaeologist added, “This is one of the earliest sabers, since this new type of weapon appeared simultaneously in the Carpathian Basin and in Eastern Europe during the second half of the 7th century.”

Image of long ancient saber

“This is one of the earliest sabers, since this new type of weapon appeared simultaneously in the Carpathian Basin and in Eastern Europe during the second half of the 7th century,” said an expert.  (Szent István Király Múzeum via Facebook)

Taking out the saber without damaging it proved tricky. Szücsi said the excavation team used a custom-made box-like tool to move it.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

The saber only weighs around 1.3 pounds now, and officials believe it was much heavier before it corroded.

They also believe the grave was reopened for ritual — rather than nefarious — reasons, since so many artifacts remained in place.

Split image of skeleton, small earring at grave

Researchers noted the warrior’s remains had been disturbed long after burial, though key artifacts stayed untouched. (Szent István Király Múzeum via Facebook)

“They left the arrowheads, probably in the quiver, as well as the silver belt mounts inside,” Szücsi noted. “They didn’t even touch the long knife and the saber.”

CLICK HERE FOR MORE LIFESTYLE STORIES

“The disturbance must have taken place at least 10 years after the burial, as the bones were no longer held together by connective tissues, yet still during the Avar period, as the grave marker, or the grave mound or wooden post, must still have been visible.”

Researchers also used satellite imagery to explore the cemetery, identifying graves by subtle variations in crop color.

Archaeologists working above grave

The warrior’s burial, less than seven feet deep, dates to roughly 670 to 690 A.D., archaeologists said.  (Szent István Király Múzeum via Facebook)

“Over the deep graves, the crops exhibit a darker shade of green, making it possible to outline the entire cemetery in aerial photographs,” said Szücsi.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“This method provides a great opportunity for archaeological research, as it also allows for the mapping of previously unknown Avar-period burial sites.”

Hungary, a country rich in history, has been the subject of a few history-related headlines this year.

Grave goods including jewelry

The excavation added new insight into the Avars, a nomadic Central Asian people once dominant in Europe. (Szent István Király Múzeum via Facebook)

In Pannonhalma, a massive bug infestation threatened a monastery’s historic 1,000-year-old book collection this summer.

CLICK HERE TO GET THE FOX NEWS APP

In May, Fox News Digital spoke with a forensic expert who identified a skull that may have belonged to Matthias Corvinus, a legendary Hungarian king.

Father, sons accused of killing teen over her ‘Western’ lifestyle

0

NEWYou can now listen to Fox News articles!

Dutch prosecutors demanded Friday that a Muslim father and his two sons face up to 25 years in prison for allegedly drowning an 18-year-old family member because they believed her “Western” behavior was bringing shame to the family.

The body of Syrian woman Ryan Al Najjar was found submerged in a lake with hands and feet bound tightly on May 28, 2024, near Joure in northern Netherlands, six days after disappearing, according to authorities. Officials arrested her father and two brothers, then aged 22 and 24, and charged them in connection with her killing, which prosecutors said likely happened on May 22.

“They saw Ryan as a burden that had to be removed,” the Public Prosecution Service said Friday. “Just because she was a young woman who wanted to live her own life.”

Authorities said her male relatives, who come from what they described as a “strict” Islamic family, allegedly killed her after believing she was “behaving too Western in the eyes of her family.” Al Najjar was reportedly targeted after refusing to wear a headscarf in public-like settings.

MOTHER SAYS ALLEGED STALKER WHO KILLED HER DAUGHTER SHOULD BE TRIED AS AN ADULT

Ryan Al Najjar was murdered in May 2024 in the Netherlands. (National Police Corps of the Netherlands)

“The immediate cause of her death appears to be a live video on TikTok, showing Ryan without a headscarf and wearing makeup,” prosecutors said Friday. “The video seriously embarrasses the family, according to their posts, as it does not fit within their traditional views.”

“Once the suspects were aware of the video, they started looking for Ryan,” the authorities added. “According to the Public Prosecution Service, her brothers visited her in Rotterdam and convinced her to come along to a remote location the night before her murder. She was taken to Knardijk, where their father joined. There she was killed.”

Local media NL Times identified the brothers as Mohamed Al Najjar and Muhanad, and their 53-year-old father as Khaled. All three were charged with murdering the young woman, while their father was accused of orchestrating the killing before likely fleeing to Syria, prosecutors said.

CHARLOTTE TRAIN STABBING SUSPECT’S BROTHER SAYS KILLING COULD HAVE BEEN ‘PREVENTED’ 

The two brothers in court.

Courtroom sketch of suspects Mohammed Al N. (R) and Muhanad Al N. during a hearing in court. The two brothers and their father, Khaled Al N., are suspected of murdering their sister and daughter, Ryan Al Najjar. (Hollandse Hoogte/Shutterstock)

Investigators say Al Najjar was taken to a remote park where “no one for miles around could have heard her” cries for help. Evidence showed signs of strangulation and drowning, and approximately 60 feet of tape had been used to bind her before she was thrown into the water alive. Prosecutors reported that Khaled’s DNA was also found under his daughter’s fingernails, suggesting he was present during the killing.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Fence around large lake.

Ryan Al Najjar’s body was found in the Oostvaardersplassen nature reserve in Lelystad, Netherlands. (Pierre Crom)

“[Khaled] fled to Syria immediately after the murder and left his sons to take the blame. Cowardly,” the Public Prosecution Service wrote in a statement Friday, according to NL Times. “Khaled has completely destroyed his family.”

Dutch authorities added that extraditing Khaled may be difficult because he married a woman in Syria since Al Najjar’s death, the outlet reported. 

The Public Prosecution Service has recommended a 25-year prison sentence for the father and 20 years for each of the two brothers.

The court is scheduled to issue its ruling on Jan. 5.

Fox News Digital reached out to the Public Prosecution Service for more information.

Prehistoric artifacts older than Stonehenge found at Palace of Westminster

0

NEWYou can now listen to Fox News articles!

Archaeologists digging beneath the Palace of Westminster recently unearthed priceless historic treasures – some of which even predate Stonehenge.

In a Nov. 19 announcement, the Houses of Parliament Restoration and Renewal Delivery Authority said it had discovered relics ranging from Mesolithic flint chips to 19th-century artifacts.

The excavations were part of a three-year investigation aimed at shaping the Palace’s upcoming restoration work.

The Palace of Westminster, also called the Houses of Parliament, was first used as a royal residence in the 11th century. Its oldest surviving structure is Westminster Hall, built in 1097 for William II.

ANCIENT ROMAN THEATER DISCOVERED BENEATH TOWN HALL THANKS TO MASSIVE EARTHQUAKES

Archaeologists working beneath the Palace of Westminster uncovered a range of artifacts dating back thousands of years, revealing rare traces of early human activity. (Restoration and Renewal Delivery Authority Ltd; iStock)

The earliest remains found during the excavation were 60 flint fragments produced during toolmaking, likely dating back to 4300 BC. The flint flakes predate Stonehenge, which began construction in 3100 BC.

The prehistoric remains were once part of Thorney Island, a sandy area near the River Thames that eventually became the heart of medieval Westminster.

“The flints were found in undisturbed sand deposits that once formed part of Thorney Island, an area where prehistoric communities are thought to have fished, hunted and gathered food,” the Restoration and Renewal Delivery Authority said in its announcement.

“These rare finds offer a glimpse into early human life in what is now central London.”

STUNNING MEDIEVAL RING FOUND BELOW RUBBLE AT ‘HISTORICALLY IMPORTANT’ TOURIST SITE

Diane Abrams, the archaeology lead at the Restoration and Renewal Delivery Authority, told Fox News Digital that finding prehistoric remains in situ in central London is “incredibly rare.”

“While research suggested we might find traces of early human activity on the site, I was surprised to discover direct evidence of flint tool-making dating back to around 6,000 years ago,” said Abrams. 

Archaeologist looking at excavation pit.

Crews conducting a three-year investigation beneath Parliament uncovered centuries of artifacts, including items that reveal how people once lived and worked across the historic site. (Restoration and Renewal Delivery Authority Ltd)

Archaeologists also found medieval leather boot and shoe soles dating back 800 years, as well as 19th-century decorated clay tobacco pipes and a 19th-century five-pint beer jug inscribed “Geo[rge] Painter.”

They also found a fragment of a 2,000-year-old ancient Roman altar that was likely repurposed, as well as a heart-shaped lead badge dating back to the Middle Ages.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

One of the most significant moments was when archaeologists unearthed the remains of Lesser Hall, a medieval building dating to 1167. First built as a royal dining space, the hall saw “key moments in Parliamentary history,” officials said.

“Over the centuries, it housed the Court of Chancery, the Court of Requests, and even the House of Commons and House of Lords at different times,” the Restoration and Renewal Delivery Authority said.

The remains of Lesser Hall

Excavators discovered the foundations of Lesser Hall, a medieval building from 1167 that once hosted royal dining events. (Restoration and Renewal Delivery Authority Ltd)

“This is the most significant discovery of the current archaeological investigations and provides vital insights into the layout and survival of historic structures beneath the modern Palace.”

Excavators found Lesser Hall’s stone wall and original foundation, which were remarkably preserved through both the Great Fire of 1834 and a World War II bomb strike.

CLICK HERE FOR MORE LIFESTYLE STORIES

Abrams told Fox News Digital that the hall was one of the “most exciting and unexpected” discoveries of the excavation.

“It was unclear just how much of it would survive below the present-day courtyard and car park,” she said.

“The findings will also help us to guide the design and planning for Parliament’s future restoration works.”

“Today, its remains – and other pre-1834 structures – have been carefully recorded and even turned into 3D digital models before being reburied to protect them.”

Archaeologists also spotted later repairs to the hall, including red brickwork that once separated two adjacent properties.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“There is also a larger red brick wall which likely belonged to a cellar dividing two properties shown on plans from 1739,” said Abrams.

“These details help us piece together the archaeology and history of the site to learn more about the past people who lived and worked there.”

Fragment found at Westminster site.

The medieval artifacts uncovered during the Parliament excavation were found alongside items from other eras, revealing how the site evolved through centuries of activity and everyday life. (Restoration and Renewal Delivery Authority Ltd)

All in all, Abrams said that the discoveries “reveal a remarkable timeline of human activity on this iconic site.”

CLICK HERE TO GET THE FOX NEWS APP

“The findings will also help us to guide the design and planning for Parliament’s future restoration works,” she said.

Huge password breach exposes billions of stolen credentials online

0


NEWYou can now listen to Fox News articles!

If you have not checked your credentials lately, now is the time. 

A staggering 1.3 billion unique passwords and 2 billion unique email addresses surfaced online. This event is one of the largest exposures of stolen logins we have seen.

This is not the result of one major breach. Instead, Synthient, a threat intelligence firm, searched the open and dark web for leaked credentials. You may remember the company from its earlier discovery of 183 million exposed email accounts. This time, the scale is far larger.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

AMERICA’S MOST-USED PASSWORD IN 2025 REVEALED

Chinese hackers target US telecoms: What you need to know to protect your data

Synthient uncovered a massive collection of stolen passwords and email addresses pulled from both the open and dark web.  (Kurt “CyberGuy” Knutsson)

Where this huge trove came from

Most of the data comes from credential stuffing lists. Criminals pull these lists from old breaches and use them in new attacks. Synthient went further. Its founder Benjamin Brundage gathered stolen logins from hundreds of hidden sources across the web.

The data includes old passwords from past breaches and fresh passwords stolen by info-stealing malware on infected devices. Synthient partnered with security researcher Troy Hunt, who runs Have I Been Pwned. He verified the dataset and confirmed that it contains new exposures.

To test the data, Hunt started with one of his old email addresses. He already knew it had been added to past credential stuffing lists. When he found it in the new trove, he reached out to trusted Have I Been Pwned users to confirm the findings. Some had never appeared in breaches before, which proved that this leak includes new stolen logins.

183 MILLION EMAIL PASSWORDS LEAKED: CHECK YOURS NOW

Concerned man looks at laptop

Hackers use these stolen logins for credential stuffing attacks that target accounts across multiple sites. (iStock)

How to check if your passwords were stolen

To see if your email was affected, 

  • Visit Have I Been Pwned. It is the first and official source for this newly added dataset.
  • Enter your email address to find out if your information appears in the leak.
  • When done, come back here for Step 1 below.

WHAT REALLY HAPPENS ON THE DARK WEB, AND HOW TO STAY SAFE

Verification tests showed that the dataset contains fresh stolen credentials that had never appeared in earlier breaches.

Verification tests showed that the dataset contains fresh stolen credentials that had never appeared in earlier breaches. (Kurt “CyberGuy” Knutsson)

How to protect yourself after this massive credential leak

These simple actions strengthen your accounts fast and help you stay ahead of criminals who rely on stolen passwords.

1) Change any exposed passwords immediately

Do not leave a known leaked password in place. Change it right away on every site where you used it. Create a new login that is strong, unique and not similar to your old one. This step cuts off criminals who already have your stolen credentials.

2) Stop reusing passwords across sites

Avoid reusing passwords across sites. Once hackers get a working email and password pair, they try it on other services. This attack method, called credential stuffing, still succeeds because many people recycle the same login. One stolen password should not unlock every account you own.

3) Use a strong password manager

A strong password manager can generate new secure logins for your accounts. It creates long, complex passwords that you do not have to memorize. It also stores them safely so you can sign in quickly without taking risky shortcuts. Many password managers also scan for breaches to see if your current passwords have been exposed.

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

4) Turn on Two-Factor Authentication

Even the strongest password can be exposed. Two-factor authentication adds a second step when you log in. You may enter a code from an authenticator app or tap a physical security key. This extra layer blocks attackers who try to access your account with stolen passwords.

5) Protect your devices from malware and install strong antivirus software 

Hackers often steal passwords by infecting your devices. Info-stealing malware hides inside phishing emails and fake downloads. Once installed, it pulls passwords straight from your browser and apps. Protect your phones and computers with strong antivirus software. It can detect and block info-stealing malware before it drains your accounts. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

6) Consider switching to passkeys when possible

If you want better protection, start using passkeys on services that support them. Passkeys use cryptographic keys instead of text passwords. Criminals cannot guess or reuse them. They also stop many phishing attacks because they only work on trusted sites. Think of passkeys as a secure digital lock for your most important accounts.

7) Use a data removal service

Data brokers collect and sell your personal details, which criminals can combine with stolen passwords. A trusted data removal service can help find and remove your information from people-search sites. Reducing your exposed data makes it harder for attackers to target you with convincing scams and account takeovers.

While no service can guarantee total removal, they drastically reduce your digital footprint, making it harder for scammers to cross-reference leaked credentials with public data to impersonate or target you. These services monitor and automatically remove your personal info over time, which gives me peace of mind in today’s threat landscape.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

8) Review your security often

Security is not a one-time task. Check your passwords on a regular schedule and update older logins before they become a problem. Review which accounts have Two-factor authentication turned on and add it where you can. By staying proactive, you stay one step ahead of hackers and limit the damage from future leaks.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP 

Kurt’s key takeaways

Massive leaks like this one highlight how fragile digital security can be. Even when you follow best practices, your information can still land in criminal hands through old breaches, malware or third-party exposures. Taking a proactive approach puts you in a stronger position. Regular checks, secure passwords and strong authentication give you real protection.

With billions of stolen passwords floating around, do you feel ready to check your own and tighten your account security today? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link

Elon Musk says robots will make work optional in new viral Optimus clip

0


NEWYou can now listen to Fox News articles!

Elon Musk has shared a new, alarming video on social media that paints a world where humanoid robots slide into nearly every corner of our daily lives.

The clip features Tesla’s Optimus robot performing tasks ranging from physical labor to cooking. Musk paired the video with a sweeping promise that robots will raise global wealth and make work optional.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

THE NEW ROBOT THAT COULD MAKE CHORES A THING OF THE PAST

A Tesla Optimus robot handing out candy

A Tesla Optimus robot hands out candy in front of the Nasdaq MarketSite in New York, US, on Monday, Oct. 27, 2025. (Michael Nagle/Bloomberg via Getty Images)

Inside the viral Optimus humanoid robot montage

Musk reposted the 38-second video on his X profile, which was originally created by Alex Utopia and shows Tesla’s humanoid robots doing a variety of everyday jobs. Since Musk posted the clip, it has racked up over 58.5 million views. 

The montage shows Optimus walking down the street. It then cuts to a construction site where the robot supports workers. The clip shifts to a scene of Optimus providing emergency aid during a disaster drill. Next, you see Optimus inside a judo gym, sparring with a trainer.

After that, the robot appears on an urban police patrol. The tone shifts again when Optimus lands in a casino dealing cards at a blackjack table. Then you can see it walking on the beach, and then it is shown in a restaurant kitchen where it cooks a meal with professional chefs. The final shot shows Optimus back in a casino at a roulette table.

Musk has already shown Optimus folding laundry and walking in earlier demos. He continues to frame humanoid robots as the solution for labor shortages tied to declining fertility rates.

AI VIDEO TECH FAST-TRACKS HUMANOID ROBOT TRAINING

A Tesla Optimus robot with the Tesla logo behind it

An Optimus humanoid robot showcased at the Tesla booth at the 8th CIIE in Shanghai, China on Nov. 6, 2025.  (CFOTO/Future Publishing via Getty Images)

Musk’s bold prediction for a robot-driven economy

Shortly after sharing the video, Musk spoke at the U.S.-Saudi Investment Forum, where he argued that humanoid robots will reshape society. According to Musk, work will shift from a necessity to a hobby. He compared future jobs to gardening for fun rather than buying vegetables at a store.

Musk said he expects money to lose relevance as artificial intelligence and robotics advance. He also claimed humanoid robots will become the biggest product in history. In his view, there is one clear path to universal wealth. He said AI and robotics can eliminate poverty and allow people to choose work only when it brings joy.

Nvidia CEO Jensen Huang offered a more cautious perspective. He agreed that jobs will change but noted that currency will continue to matter for the foreseeable future.

A Tesla Optimus robot on display

The Tesla Bot humanoid robot of Tesla “Optimus” is displayed at the 2023 World Artificial Intelligence Conference in Shanghai, China, July 6, 2023. (CFOTO/Future Publishing via Getty Images)

What this means for you

The world Elon Musk describes raises big questions about daily life. Robots that can cook, build and respond to emergencies could reshape our communities. They may also transform what people see as valuable work. Even if full robot integration is years away, companies like Tesla are already starting to show how quickly this tech can evolve. You may not see an Optimus on your street yet, but the direction is clear, and the pace is fast.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP 

Kurt’s key takeaways

Musk’s reposted montage video has pushed the conversation about humanoid robots into sharper focus. The video shows how close companies like Tesla want us to be to a future filled with robots that move, react and work alongside us. The reactions range from excitement to real concern, which shows how uneasy many feel about a world shaped by machines that can cook, patrol and even respond to emergencies. The speed of this progress is hard to ignore. Each new video hints at a future where robots handle more daily tasks and take on work that once needed human hands. Whether that future feels promising or unsettling will depend on how we prepare for it and how much control we keep as this technology grows.

How would you feel if a robot like Optimus began taking on tasks in your daily life? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link