-4 C
New York
Friday, February 13, 2026
Home Blog Page 38

Leveraging Twitter For Customer Service and Engagement

0

Latest Blog from RPR Comando: “Leveraging Twitter For Customer Service and Engagement”. Twitter has evolved far beyond just a platform for sharing thoughts in 280 characters. Twitter has transformed into a powerful customer service and engagement tool that can enhance your business strategy. With millions of active users, it offers an immediate way to connect with customers, address their concerns, and build lasting relationships. #BookMarketing #VideoShorts #PressReleaseMarketing #RPRComando  
This article originally appeared on https://rprcomando.com/leveraging-twitter-for-customer-service-and-engagement/

Press release marketing for brand visibility.
Leveraging Twitter For Customer Service and Engagement 2

LifeX Analyzes 2026 Health Trends Affecting Freelancers in the Gig Economy

0
lifeX9image
LifeX Analyzes 2026 Health Trends Affecting Freelancers in the Gig Economy 7

LifeX, an innovative leader in population health analytics, has just released their much-anticipated 2026 Population Health Analytics Report. This report dives deep into the health challenges faced by freelancers today while offering actionable
strategies for enhancing well-being in this rapidly evolving landscape.

Atlanta, GA, November 30, 2025 – Freelancing is no longer just a side hustle; it’s become a thriving career path for millions. As this gig economy continues to expand, the need for tools and insights that support freelancer wellness has never been more critical. LifeX’s findings can transform the way freelancers approach their health and wellness amidst the demands of modern work life.

The Rise of Freelancing in the Gig Economy

Freelancing has surged in popularity, reshaping the traditional workforce landscape. More individuals are embracing flexible work arrangements that align with their lifestyles. They seek autonomy and the ability to choose projects that resonate with them.

Technology plays a pivotal role in this shift. Online platforms connect freelancers to clients across the globe, breaking geographical barriers. This newfound accessibility empowers talented professionals from diverse backgrounds to showcase their skills.

Impact of Freelancing on Health and Wellness

Freelancing offers flexibility and independence, but it also comes with its own set of challenges. Many freelancers face irregular hours and inconsistent income. This unpredictability can lead to stress that takes a toll on mental health.

Isolation is another common issue. Working from home or cafés often means limited social interaction. Loneliness may creep in, impacting emotional well-being significantly.

Physical health can suffer too. Without the structure of a traditional office environment, maintaining an active lifestyle becomes difficult. Long hours at a desk often lead to poor posture and sedentary habits.

Freelancers frequently juggle multiple projects simultaneously, which can result in burnout. It’s vital for those in the gig economy to recognize these risks and prioritize their wellness amidst the hustle culture surrounding them. Awareness is key in navigating this demanding landscape effectively.

Key Findings from the 2026 Population Health Analytics Report

The 2026 Population Health Analytics Report from LifeX reveals striking insights into the well-being of freelancers. Another critical aspect highlighted is mental health. A significant percentage of freelancers experience anxiety and isolation, exacerbated by irregular working hours.

Interestingly, the report shows a correlation between freelancer wellness initiatives and improved productivity. Those utilizing wellness tools reported higher job satisfaction and better physical health outcomes.

Access to telehealth services has also emerged as a game-changer for this demographic. Many freelancers rely on virtual consultations for timely medical advice, bridging gaps in traditional healthcare access.

These findings underscore the urgent need for tailored resources aimed at supporting freelancer health in an ever-evolving gig economy landscape.

Tools and Strategies for Improving Freelancer Wellness

Freelancers face unique challenges that can affect their wellness. LifeX has developed a range of tools specifically designed to tackle these issues head-on. Their platform offers mental health resources, such as meditation guides and stress management workshops, enabling freelancers to cultivate resilience.

LifeX incorporates fitness tracking features that encourage regular physical activity. By setting personalized goals, users can stay motivated while integrating exercise into their daily routines.

Time management is another critical aspect of freelancer wellness. Tools for scheduling breaks and optimizing work hours help maintain productivity without burnout.

Community support plays a vital role in enhancing wellbeing. LifeX fosters connections among freelancers through forums and peer support groups, creating an environment where individuals feel understood and encouraged on their personal journeys toward better health.

The Importance of Prioritizing Wellness in a Gig Economy Future

As the gig economy continues to expand, prioritizing wellness for freelancers becomes increasingly vital. The 2026 Population Health Analytics Report from LifeX sheds light on this urgent need. It emphasizes that a healthier workforce leads to increased productivity and satisfaction.

Freelancers often juggle multiple responsibilities with little support. By leveraging innovative tools and strategies highlighted in the report, they can take charge of their health proactively. This not only benefits individuals but also enhances overall community well-being.

With the right focus on wellness, freelancers can thrive within this evolving landscape. Addressing mental health, physical fitness, and work-life balance is essential for sustainable growth in a rapidly changing job market. Embracing these insights will pave the way for a healthier future where every freelancer has the resources needed to succeed and flourish in their endeavors.

For more information, visit: https://lifexresearch.com/

Media Contact:

LifeX Research Corp.
Attn: Media Relations
Atlanta, GA
support@lifexresearch.com

20250712 213641736 1
LifeX Analyzes 2026 Health Trends Affecting Freelancers in the Gig Economy 8

Mysterious bones found near landmark location in Edinburgh, Scotland, spark investigation

0

NEWYou can now listen to Fox News articles!

An unusual grouping of bones was found near one of Scotland’s most iconic landmarks — and officials aren’t sure how the bones got there.

The remains were found on Crow Hill near Arthur’s Seat in Edinburgh, a rise within Holyrood Park that overlooks Duddingston Loch and the Firth of Forth.

Park rangers uncovered the bones during a routine patrol after a wildfire burned part of the park in August, according to Historic Environment Scotland (HES).

SHOPPERS AT POPULAR MARKETPLACE WALKED OVER ‘VILE’ DUNGEON AS ARCHAEOLOGISTS CITE ‘REMARKABLE’ FINDS

The cause of the wildfire is still under investigation. Though the collection was found over the summer, officials did not disclose the discovery until November. 

Once alerted, archaeologists quickly arrived to assess and remove the cache. 

The collection of mixed remains was found near Arthur’s Seat, prompting a formal review by archaeologists. (Peter Summers/Getty Images; Historic Environment Scotland)

The curious collection of bones consists of several specials, according to the HES, including “cattle, horse, sheep or goat and possibly even cat.”

The HES added, “The remains do not seem to have been part of a wider feature. However, the number and variety of bones make it an unusual — and potentially significant — discovery.”

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

An HES official told Fox News Digital the bones are likely post-medieval, but no age has been determined yet. 

“It is likely this area was used for grazing, as much of the land in Holyrood Park was grazed in the past,” an HES spokesperson said.

“The number and variety of bones make it an unusual — and potentially significant — discovery.”

“However, the bones belong to various species of animal and are not complete skeletons, so there is no obvious or direct link to sheep grazing.”

Specialists plan to radiocarbon date the bones, which they hope will shed light on how old they are and why they were dumped.

CLICK HERE FOR MORE LIFESTYLE STORIES

The HES also noted that Crow Hill is near a prehistoric hillfort that once surrounded the summits of both Crow Hill and Arthur’s Seat.

Split image of burned landscape, mysterious bones

Park rangers discovered an unusual assortment of animal bones on Crow Hill after an August wildfire exposed them. (Historic Environment Scotland)

The spokesperson added that Holyrood Park is a “hugely rich archaeological landscape” — with much more of its history still to be uncovered.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“We are continually learning about its past and the nature of what survives here,” the official added.

The bone collection adds to a number of eyebrow-raising archaeological discoveries in Scotland over the past year.

Aerial view of flames on Arthur's Seat

The cause of the Aug. 10 wildfire is still under investigation, authorities said. (Peter Summers/Getty Images)

Over the summer, an archaeology student found a finely carved ancient head, featuring an eerie smile, during a dig on a Scottish farm.

CLICK HERE TO GET THE FOX NEWS APP

In Inverness, archaeologists discovered a prehistoric village beneath a future golf course earlier this year.

FBI official says every American likely impacted by Chinese cyberattack

0

NEWYou can now listen to Fox News articles!

A former FBI official claims that it’s likely every American has been impacted by a Chinese-state-sponsored cyberattack.

International law enforcement agencies, including the FBI and National Security Agency, issued a joint advisory in September warning the public that CCP-sponsored actors are “targeting” many aspects of American lives, including telecommunications, government, transportation, lodging, and military infrastructure networks.

The cyberattack wasn’t limited to the U.S. and targeted many countries around the globe, according to the advisory. According to the international agencies, the three Chinese companies believed to be behind Salt Typhoon work for China’s intelligence services, which include units in the People’s Liberation Army and Ministry of State Security. 

Through the information gathered during the cyberattacks, the Chinese intelligence services can “identify and track their targets’ communications and movements around the world.”

FBI DIRECTOR PATEL LEADS CHARGE TO ROOT OUT CHINESE INFLUENCE ON US SOIL

The cyberattack impacted many counties around the globe. (Getty Images)

Cynthia Kaiser, a former high-ranking official in the FBI’s cyber division, told the New York Times it’s hard to envision a scenario where any American wasn’t impacted by the hack.

“I can’t imagine any American was spared given the breadth of the campaign,” she said.

Those directly impacted by the cyberattack include senior U.S. government officials and prominent political figures whose communications were accessed, according to the FBI.

TRUMP-APPOINTED FCC CHAIRMAN PROBES BIDEN CYBERSECURITY PROGRAM OVER CHINA CONCERNS

The national flags of the United States and China

The national flags of the United States and China flutter at the Fairmont Peace Hotel on April 25, 2024 in Shanghai, China. (Wang Gang/VCG via Getty Images)

Pete Nicoletti, chief information security officer at Check Point, told Fox News Digital that those behind the Salt Typhoon cyberattack had unprecedented access to phone calls being placed by Americans.

“They had full reign access,” Nicoletti, said. “So, you know, your grandmother calling you to remind you to pick up groceries was not a targeted person and they’re gonna listen into that call. But Trump, Vance, Kamala Harris, and dozens of other US government officials were specifically targeted.”

Nicoletti said the Salt Typhoon hackers “established a foothold and exfiltrated data for five years,” which is “almost unprecedented.”

Yet the cybersecurity expert says his greatest concern is not what Salt Typhoon may target in the future, but whether the group remains embedded inside companies and agencies that still haven’t discovered the intrusion.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Military

Chinese military personnel head to a field to participate in the Golden Dragon military exercise in Svay Chok village, Kampong Chhnang province, north of Phnom Penh Cambodia, Thursday, May 16, 2024. (AP Photo/Heng Sinith)

“My biggest concern is they’re still in various organizations and undetected,” he said. “So the thing that I worry about is not the next time that these guys hack somebody, it’s what they’re doing currently and who they’re in.”

When discussing the cyberattack in December 2024, then-deputy national security adviser Anne Neuberger said the hackers worked to identify the owners of various devices, then spy on phone calls and text messages if they were “government targets of interest.”

Fox News Digital’s Landon Mion contributed to this report.

Isidor Straus’ pocket watch from Titanic sinking fetches $2.3 million at auction

0

NEWYou can now listen to Fox News articles!

A gold pocket watch owned by one of the most famous passengers to die on the Titanic has sold for a record-breaking $2.3 million at auction.

Isidor Straus, who was the co-owner of Macy’s, brought the watch with him on the ill-fated voyage he was taking with his wife home to New York after a trip to Europe.

“Pocket watches are incredibly personal items,” Andrew Aldridge, managing director of Henry Aldridge and Son, where the watch sold last Saturday, said in a statement.

“Every man, woman and child passenger or crew had a story to tell, and they are told 113 years later through the objects that they owned,” Aldridge added. “Items like this keep the story alive and bring us closer to the memory of one of the biggest tragedies of the 20th century.”

TITANIC PASSENGER’S RARE GOLD POCKET WATCH COULD BECOME PRICIEST ARTIFACT EVER SOLD

Titanic passenger Isidor Straus and his gold pocket watch that sold at auction. (Bettmann via Getty Images; Henry Aldridge & Son/BPNS)

The 18-carat gold Jules Jürgensen pocket watch was an 1888 birthday gift to Straus from his wife, Ida, who famously refused to get into a lifeboat and instead died on the boat with her husband.

“My place is with you,” she reportedly told him. “I have lived with you. I love you, and, if necessary, I shall die with you.”

Instead, her maid was shuffled into a lifeboat and given Ida’s fur coat to keep warm.

The pocket watch supposedly stopped ticking at 2:20 a.m. April 15, 1912, when the ship became submerged.

REMEMBERING THE TITANIC OVER A CENTURY LATER: WHAT CAUSED THE LUXURY SHIP TO SINK, HOW MANY LIVES WERE LOST? 

Photo of Titanic passengers Isidor and Ida Straus

Titanic passengers Isidor and Ida Straus (Bettmann via Getty Images)

Their love was depicted in James Cameron’s Oscar-winning epic “Titanic,” showing the couple holding hands in their stateroom bed as the ship went down.

The watch was recovered from his body and returned to his family until this month’s auction.

A photo of the Titanic

The ill-fated White Star liner RMS Titanic, which struck an iceberg and sank on her maiden voyage across the Atlantic in 1912. (Hulton Archive)

The pocket watch broke the record for the sale of Titanic memorabilia a year after another pocket watch, which was given to the captain of RMS Carpathia by John Jacob Astor’s widow and two other survivors as thanks for their rescue, sold at the same auction house for $1.97 million.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

“Some of the prices seen at this sale indicate the continued fascination with this amazing story,” Aldridge said.

Chinese hackers use Anthropic’s Claude AI in major cyberattack campaign

0


NEWYou can now listen to Fox News articles!

Cybersecurity has been reshaped by the rapid rise of advanced artificial intelligence tools, and recent incidents show just how quickly the threat landscape is shifting.

Over the past year, we’ve seen a surge in attacks powered by AI models that can write code, scan networks and automate complex tasks. This capability has helped defenders, but it has also enabled attackers who are moving faster than before.

The latest example is a major cyberespionage campaign conducted by a Chinese state-linked group that used Anthropic’s Claude to carry out large parts of an attack with very little human involvement.

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

How Chinese hackers turned Claude into an automated attack machine

In mid-September 2025, Anthropic investigators spotted unusual behavior that eventually revealed a coordinated and well-resourced campaign. The threat actor, assessed with high confidence as a Chinese state-sponsored group, had used Claude Code to target roughly thirty organizations worldwide. The list included major tech firms, financial institutions, chemical manufacturers and government bodies. A small number of those attempts resulted in successful breaches.

HACKER EXPLOITS AI CHATBOT IN CYBERCRIME SPREE

Apps displayed on phone within an "AI" folder.

Claude handled most of the operation autonomously, triggering thousands of requests and generating detailed documentation of the attack for future use. (Kurt “CyberGuy” Knutsson)

How the attackers bypassed Claude’s safeguards

This was not a typical intrusion. The attackers built a framework that let Claude act as an autonomous operator. Instead of asking the model to help, they tasked it with executing most of the attack. Claude inspected systems, mapped out internal infrastructure and flagged databases worth targeting. The speed was unlike anything a human team could replicate.

To get around Claude’s safety rules, the attackers broke their plan into tiny, innocent-looking steps. They also told the model it was part of a legitimate cybersecurity team performing defensive testing. Anthropic later noted that the attackers didn’t simply hand tasks to Claude; they engineered the operation to make the model believe it was performing authorized pentesting work, splitting the attack into harmless-looking pieces and using multiple jailbreak techniques to push past its safeguards. Once inside, Claude researched vulnerabilities, wrote custom exploits, harvested credentials and expanded access. It worked through these steps with little supervision and reported back only when it needed human approval for major decisions.

The model also handled the data extraction. It collected sensitive information, sorted it by value and identified high-privilege accounts. It even created backdoors for future use. In the final stage, Claude generated detailed documentation of what it had done. This included stolen credentials, systems analyzed and notes that could guide future operations.

Across the entire campaign, investigators estimate that Claude performed around eighty to ninety percent of the work. Human operators stepped in only a handful of times. At its peak, the AI triggered thousands of requests, often multiple per second, a pace still far beyond what any human team could achieve. Although it occasionally hallucinated credentials or misread public data as secret, those errors underscored that fully autonomous cyberattacks still face limitations, even when an AI model handles the majority of the work.

Why this AI-powered Claude attack is a turning point for cybersecurity

This campaign shows how much the barrier to high-end cyberattacks has dropped. A group with far fewer resources could now attempt something similar by leaning on an autonomous AI agent to do the heavy lifting. Tasks that once required years of expertise can now be automated by a model that understands context, writes code and uses external tools without direct oversight.

Earlier incidents documented AI misuse, but humans were still steering every step. This case is different. The attackers needed very little involvement once the system was in motion. And while the investigation focused on usage within Claude, researchers believe similar activity is happening across other advanced models, which might include Google Gemini, OpenAI’s ChatGPT or Musk’s Grok.

This raises a difficult question. If these systems can be misused so easily, why continue building them? According to researchers, the same capabilities that make AI dangerous are also what make it essential for defense. During this incident, Anthropic’s own team used Claude to analyze the flood of logs, signals and data their investigation uncovered. That level of support will matter even more as threats grow.

We reached out to Anthropic for comment, but did not hear back before our deadline.

Chinese hackers target US telecoms: What you need to know to protect your data

Hackers used Claude to map networks, scan systems, and identify high-value databases in a fraction of the time human attackers would need. (Kurt “CyberGuy” Knutsson)

FORMER GOOGLE CEO WARNS AI SYSTEMS CAN BE HACKED TO BECOME EXTREMELY DANGEROUS WEAPONS

You may not be the direct target of a state-sponsored campaign, but many of the same techniques trickle down to everyday scams, credential theft and account takeovers. Here are seven detailed steps you can take to stay safer.

1) Use strong antivirus software and keep it updated

Strong antivirus software does more than scan for known malware. It looks for suspicious patterns, blocked connections and abnormal system behavior. This is important because AI-driven attacks can generate new code quickly, which means traditional signature-based detection is no longer enough.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

2) Rely on a password manager

A good password manager helps you create long, random passwords for every service you use. This matters because AI can generate and test password variations at high speed. Using the same password across accounts can turn a single leak into a full compromise.

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

3) Consider using a personal data removal service

A large part of modern cyberattacks begins with publicly available information. Attackers often gather email addresses, phone numbers, old passwords and personal details from data broker sites. AI tools make this even easier, since they can scrape and analyze huge datasets in seconds. A personal data removal service helps clear your information from these broker sites so you are harder to profile or target.

FAKE CHATGPT APPS ARE HIJACKING YOUR PHONE WITHOUT YOU KNOWING

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

4) Turn on two-factor authentication wherever possible

Strong passwords alone are not enough when attackers can steal credentials through malware, phishing pages or automated scripts. Two-factor authentication adds a serious roadblock. Use app-based codes or hardware keys instead of SMS. While no method is perfect, this extra layer often stops unauthorized logins even when attackers have your password.

5) Keep your devices and apps fully updated

Attackers rely heavily on known vulnerabilities that people forget or ignore. System updates patch these flaws and close off entry points that attackers use to break in. Enable automatic updates on your phone, laptop, router and the apps you use most. If an update looks optional, treat it as important anyway, because many companies downplay security fixes in their release notes.

6) Install apps only from trusted sources

Malicious apps are one of the easiest ways attackers get inside your device. Stick to official app stores and avoid APK sites, shady download portals and random links shared on messaging apps. Even on official stores, check reviews, download counts and the developer name before installing anything. Grant the minimum permissions required and avoid apps that ask for full access for no clear reason.

7) Ignore suspicious texts, emails, and pop-ups

AI tools have made phishing more convincing. Attackers can generate clean messages, imitate writing styles, and craft perfect fake websites that match the real ones. Slow down when a message feels urgent or unexpected. Never click links from unknown senders, and verify requests from known contacts through a separate channel. If a pop-up claims your device is infected or your bank account is locked, close it and check directly through the official website.

woman using phone

By breaking tasks into small, harmless-looking steps, the threat actors tricked Claude into writing exploits, harvesting credentials, and expanding access.  (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaway

The attack carried out through Claude signals a major shift in how cyber threats will evolve. Autonomous AI agents can already perform complex tasks at speeds no human team can match, and this gap will only widen as models improve. Security teams now need to treat AI as a core part of their defensive toolkit, not a future add-on. Better threat detection, stronger safeguards and more sharing across the industry are going to be crucial. Because if attackers are already using AI at this scale, the window to prepare is shrinking fast.

Should governments push for stricter regulations on advanced AI tools? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link

Connecticut high schooler finds 150-million-year-old fossil in Montana

0

NEWYou can now listen to Fox News articles!

A 150-million-year-old fossil from the Jurassic era turned up at a Montana dig site this year — unearthed not by a scientist, but by a Connecticut high school student. 

Aidan Connor, a senior at Cheshire Academy in New Haven County, found the ancient bone in Red Lodge, Montana, this summer, according to a news release from the academy. 

With funding from the Rizzolo-Larson Venture Grant program, the student traveled west with the Elevation Science Institute as part of a dig that involved teenagers across the country.

SHOPPERS AT POPULAR MARKETPLACE WALKED OVER ‘VILE’ DUNGEON AS ARCHAEOLOGISTS CITE ‘REMARKABLE’ FINDS

On the first day of the excavation, Connor spotted a pinkie-sized finger bone that likely belonged to a small dinosaur during the Jurassic period.

It took the high school senior about an hour to extract the fossil, which is considered relatively quick. The teenager described the experience as “very nerve-wracking.”

Aidan Connor’s summer dig in Red Lodge, Montana, became memorable after he uncovered a Jurassic-era fossil during an expedition. (Aidan Connor/Cheshire Academy)

“A lot of field work, especially paleontology, is trying your hardest not to break very important things,” Connor said, per the release.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

After finding the bone, the student spent the rest of the week “jacketing” other fossils, a process that involves plastering them in order to prevent damage during transport.

“[W]hat we’re most proud of is his polyglot love of learning, and his willingness to combine passion with patience, practice and process.”

Speaking to Fox News Digital, Connor said the whole experience was “quite exciting.”

“[It was] very fulfilling for my inner child,” he added.

CLICK HERE FOR MORE LIFESTYLE STORIES

“It was definitely rewarding to finally get it, and many other fossils in the area, prepped for removal.”

Marc Arison, dean of academics at Cheshire Academy, told Fox News Digital the school community is extremely proud of the diligent student.

Jacketed dinosaur skull next to Aidan smiling

The week-long excavation allowed the Cheshire Academy student to practice careful fossil handling while preparing specimens for safe removal. (Aidan Connor/Cheshire Academy)

“Our pride in Aidan goes beyond the discovery he made,” said Arison.

“What we’re most proud of is his polyglot love of learning, and his willingness to combine passion with patience, practice and process.” 

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“Those are essential elements of learning.”

The dean added that Connor is looking at schools offering majors like paleontology and museum studies, and is still considering his options ahead of his graduation next spring.

Split image of archaeologists digging, Aidan holding bone

“[It was] very fulfilling for my inner child,” Connor told Fox News Digital. (Aidan Connor/Cheshire Academy)

The Rizzolo-Larson Venture Grant is the school’s way of letting students “do cool stuff,” allowing them to travel across the globe to pursue their passions

Students have worked on projects in countries like South Africa and Bangladesh in the past, Arison said.

CLICK HERE TO GET THE FOX NEWS APP

“Aidan’s work this summer is an excellent example of the ways in which Cheshire Academy helps students unlock not just their potential, but themselves,” he added.

Apple Watch gets new Sleep Score feature for better sleep tracking

0


NEWYou can now listen to Fox News articles!

Apple added a new Sleep Score feature that gives you a single number to sum up how you slept.

It pulls data from your Apple Watch and turns it into an easy rating you can check first thing in the morning. This makes it much easier to understand your sleep without sorting through charts.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

System requirements for Apple Watch Sleep Score

You need an Apple Watch running watchOS 26 or later paired with an iPhone running iOS 26 or later. This feature was tested on an iPhone 15 Pro Max and an Apple Watch Series 11. If you run older software, update your devices before you begin.

iPhone: Settings > General > Software Update > Install iOS 26

Apple Watch: Watch app > General > Software Update > Install watchOS 26

hands holding apple watch

Apple CEO Tim Cook holds up the new Apple Watch Series 11 during a launch event at Apple Park in Cupertino, California, on Sept. 9, 2025. (David Paul Morris/Bloomberg)

How to set up sleep tracking on your Apple Watch

It only takes a minute to get your Apple Watch and iPhone working together to monitor your nightly sleep habits. Here’s how to do it:

  • Open the Health app on your iPhone.
  • Tap the Search icon in the bottom right of the screen, then choose Sleep.
  • Tap Get Started, then tap Next if you haven’t set it up before. Otherwise, click Sleep again.
  • Scroll down to Your Schedule and click Add to set your Sleep Goal by tapping where it says BEDTIME and WAKE UP
  • Choose the days you want this schedule active, then tap Add.
  • You can always revise it by clicking Edit. 

Once your Apple Watch sleep tracking is set up in the Health app, the Sleep Score appears in both your watch and iPhone. You can view your history and see how your habits change over time.

How to check your Sleep Score on Apple Watch

You can see your Sleep Score right on your Apple Watch as soon as you wake up. The score usually appears within about fifteen minutes and gives you a quick look at how you slept. Here are the steps:

  • Press the Digital Crown to open your apps
  • Open the Sleep app
  • Tap the i in the circle next to your Sleep Score once it appears. Then tap the X.
  • Use the crown to scroll down to view your Sleep Stages, Time Asleep, and Last 14 Days.
  • Open the Health app on your iPhone for full charts and history (see below for steps).

This keeps everything fast and simple on your wrist while your iPhone shows the deeper breakdown.

ADAPTIVE POWER IN IOS 26 BOOSTS IPHONE BATTERY LIFE

How to check your Apple Watch sleep score on iPhone

Follow these steps to see your score each morning:

  • Open the Health app
  • Tap the search icon in the bottom right corner
  • Select Sleep
  • Tap Sleep Score
  • Tap Sleep Score again to view more details
  • Choose Show in Charts to track your score over time
  • Pick W for weeks, M for months, or 6M for six months of history
  • Look under Levels to see how many nights fell into each score range
  • Select Elements to check your average duration, bedtime, and interruptions
  • Tap the info icon to learn what each Sleep Score level means
woman sleeping

Apple’s new Sleep Score feature gives users a rating each morning to show how well they slept and met nightly goals. (iStock)

How your sleep score works

Your Sleep Score is a number out of 100. Apple uses three main factors to build your final rating. Sleep duration provides up to 50 points. Bedtime consistency offers up to 30 points. Interruptions and wake-ups make up the last 20 points. These elements combine to show how close you came to your nightly sleep goals.

When Apple calculates your score, it places you into one of five levels. These levels help you understand the quality of your rest. They may not always match how you feel in the morning, but they give you a steady way to track trends over time.

Excellent Your body and mind likely received the rest needed for the day. With consistency, this level may also support long-term health.

High You may not have slept perfectly, but you got the sleep you needed. Your night was likely restorative and may still benefit your health over time.

OK An OK score often means your body and mind did not get the full amount of rest they need.

Low A low score means you did not get enough time to rest and restore.

Very Low A very low score suggests your body did not get the sleep it needs. If you see this level often, it can affect your mental and physical health.

APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERS

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com 

Photo of a man wearing an Apple Watch on his wrist.

An Apple Watch running watchOS 26 pairs with an iPhone on iOS 26, or later, to track nightly sleep habits. (Apple)

Kurt’s key takeaways

The new Sleep Score makes the Apple Watch’s sleep tracking easier to read and more useful day to day. You get a clear number that shows how your routines guide your rest. If you want a quick pulse check each morning, this tool keeps things simple.

What part of your nightly routine affects your score the most? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved. 



Source link

Social media influencer’s viral strategy video with wife reaches millions

0

NEWYou can now listen to Fox News articles!

Your current situation is not your final destination. That’s the message Durelle Bailey is determined to share across social media, a reminder that no matter where you start, you’re capable of achieving anything.

Durelle Bailey is a 31-year-old social media influencer who posts inspirational content about life, finances, and relationships on social media. Bailey spoke with Fox News Digital about the inspiration behind his content.

By 2023, Bailey’s social media following had grown significantly, and his annual strategy meeting video with his wife, Samantha, reached millions of viewers. Now Bailey has over 427,000 Instagram followers and over 94,000 TikTok followers.

TEXAS DAD SHOWS WHAT PRESENT FATHERHOOD LOOKS LIKE THROUGH VIRAL CHEERLEADING STUNTS WITH DAUGHTER

In their 2023 planning video, the young couple showed how they map out their goals for the upcoming year. Bailey said he didn’t expect the video to go viral. 

“I said, I’m going to take the camera and film this whole thing, and I’m going to post it online and see if people can use this and maybe to help them in their own marriages and to help them get aligned,” Bailey said.

Bailey, who says he had an unstable childhood, has shared other planning videos with his wife which inspired the start of businesses The Planning Playbook and The Blueprint Circle. 

“I had a pretty rough upbringing,” Bailey said. “My mom having me when she was 15, my father wasn’t in my life, and we were pretty unstable… we moved around quite a bit.”

Bailey wants his story to show others that if he can achieve the American Dream, so can they, and he’s learned that life is about taking risks.

“Having gone through all of those things, I discovered that one, taking risk is actually like a superpower, right? Like leaving your home and doing something new, even though you’ve never seen it before,” Bailey said.

Some of these risks for Bailey included joining the military, getting married at 22, and obtaining four college degrees.

HOW DIY DAD MASON SMITH OF ‘DAD SOCIAL’ IS MAKING A DIFFERENCE ONE PROJECT AT A TIME

Durelle Bailey shares about his life and marriage to encourage others across social media. (Instagram @durellebailey)

Bailey added that pursuing higher education was a risk as well, because his parents hadn’t even earned a high school diploma.

“I started finding creative ways to put it into my content and talking about my story and taking visuals and B-roll of my past and present and what I’m doing now and posting on social media. And it started to help a lot of people. And so now I’m just fully committed to it,” he said.

Bailey hopes his marriage content shows the value of commitment and that “two is better than one.” He also described faith as his anchor. 

“All of the circumstances that I went through as a kid, I always, always felt that I was covered. I always felt I was safe. Why? Because I knew that God was allowing me to go through it for a reason,” he said.

BUILDING YOUR ADVENTURE: CIA VETERAN SHARES AN INSPIRING STORY ABOUT COURAGE WITH GRADUATES

Social media influencer Durelle Bailey

Durelle Bailey is inspiring others on social media when it comes to life, faith, and relationships. (Mike Nelson @thatdopeshot)

I referred back to just what his Word says, and it pretty much took me through the most difficult times in my life, and I think even now, now that I’m experiencing success by working with some of the biggest brands in the world, and able to travel and speak at conferences and speak on panels and doing things like that, it’s like that’s great, but I always want to make sure that… I’m in the will of God no matter what,” he said.

CLICK HERE TO GET THE FOX NEWS APP

How to find your dead phone using iPhone and Android tracking tools

0


NEWYou can now listen to Fox News articles!

Losing your phone can leave you in panic mode, especially when the battery dies. The good news is that both Apple and Android offer built-in tools that help you track a missing device even when it is powered off or offline.

With an iPhone, you can use the Find My network on another Apple device or sign in from a browser. With Android, you can use Google’s Find My Device system to see the last known location and secure your phone fast.

This guide walks you through clear steps for iPhone and Android so you know exactly what to do next.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

An array of apple products

You can still find your lost Apple device even when it’s dead. (Apple)

Does Find My work when your iPhone is dead?

Yes, it does. Your iPhone uses low power mode in the background so it stays findable for a period after powering off. If other Apple devices are nearby, your phone can still send out a Bluetooth signal that helps pinpoint the last known location.

You can check this location from any Apple device or a browser.

Use Find My from another Apple device

If you have an iPad, Mac, or another iPhone, you can look up your missing device in seconds. Family Sharing works too, so you can track a shared device even if it is offline. Here is how to do it:

  • Open the Find My app
  • Tap the Devices tab
  • Swipe up to see your full list of devices
  • Select your missing iPhone
  • View the location on the map
  • Tap Directions to navigate to it
  • Tap Play Sound if the phone is on and nearby
Steps to enable Find My on iPhone

Steps to use Find My from another Apple device. (Kurt “CyberGuy” Knutsson)

  • Turn on Lost Mode by tapping continue at the bottom of the screen to lock it and show a message with a callback number.
  • Enter a phone number that can be used when someone finds your iPhone and wants to contact you. Then, tap Next. 
  • If the screen icon is black, the phone is dead. You will still see the last known location, so you know where to start looking.
Steps to enable Find my on iPhone

Steps to use Find My from another Apple device. (Kurt “CyberGuy” Knutsson)

Find your iPhone from a web browser

If you only have access to a computer or an Android phone, use iCloud.com to locate your device. The browser version gives fewer tools, but it still shows your iPhone on the map. Follow these steps:

  • Go to iCloud.com/find
  • Sign in with your Apple ID
  • Approve two-factor if needed
A Find Devices sign in screen

Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

  • Select All Devices
  • Choose your missing iPhone
A map with location of iPhone

Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

  • Use Play Sound if the device is on
  • Turn on Lost Mode to lock the phone

Use this method when you have no Apple hardware nearby.

A map with location of iPhone

Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

Use the Help a Friend feature in Find My

If you need to borrow another person’s iPhone, avoid signing in to their device directly. That triggers security checks you cannot complete without your missing phone. Instead, use Help a Friend inside the Find My app:

  • Open Find My on your friend’s iPhone
  • Scroll to Help a Friend
  • Sign in with your Apple ID
  • View the last known location of your iPhone

This tool bypasses two-factor prompts so you can get your location without any issues.

Help a Friend feature on iPhone

Steps to use the Help a Friend feature in Find My. (Kurt “CyberGuy” Knutsson)

Can you find an iPhone without Find My

If ‘Find My’ was never enabled, you must retrace your steps. You can check ‘Your Timeline’ in Google Maps if you use that app and have location history on.

Without ‘Find My,’ there is no way to remotely lock, track, or erase the device.

Once you recover your phone, turn on ‘Find My’ and enable ‘Send Last Location’ so you are covered next time.

Best iPhone settings to turn on before your device goes missing

Before your iPhone ever goes missing, take a minute to set up these key protections.

1) Turn on Find My iPhone

This keeps your device trackable whether it is on or off. Go to Settings, then tap your name, then click Find My, then Find My iPhone and enable it. 

2) Enable Send Last Location

Go to Settings, then tap your name, then click Find My, then Find My iPhone and scroll down and enable Sent Last Location. 

Your phone will save its final location before the battery dies.

3) Turn on Find My network

Go to Settings, tap your name, click Find My, then tap Find My iPhone and enable Find My network.
This keeps your iPhone discoverable through nearby Apple devices even when it is off or offline.

4) Keep two-factor authentication on

Go to Settings, tap your name, tap Sign-In & Security, select Two-Factor Authentication (2FA), then tap your iPhone and make sure 2FA is turned on.
This blocks anyone from accessing your Apple ID without approval.

5) Use a strong passcode

Go to Settings, then tap Face ID & Passcode, then enter your current passcode.
Tap Change Passcode and follow the prompts to set a unique passcode that is hard to guess.

6) Add a recovery contact

Go to Settings, tap your name, tap Sign-In & Security, then tap Recovery contacts. Then, click Add Recovery Contact. 
Add a trusted person as your recovery contact so you can verify your identity if you ever lose your iPhone. 

CAN’T FIND YOUR ANDROID PHONE? HERE’S WHAT TO DO TO TRACK IT DOWN

How to find an Android phone that is off or dead

Android users can also track a missing device using Google’s Find My Device system. While you cannot see live location when the phone is powered off, you can view the last known location, lock the phone, or display a message for anyone who finds it. Here is how to track it:

Find your Android from a browser

Settings may vary depending on your Android phone’s manufacturer.

  • Go to android.com/find
  • Sign in with your Google account
  • Select your missing device
  • View the last known location on the map
  • Select Secure Device to lock it and display a callback message
  • Select Play Sound if the phone is on and nearby

Find your Android from another phone

Settings may vary depending on your Android phone’s manufacturer.

  • Download the Find My Device app on another Android
  • Sign in with your Google account
  • Tap your missing phone to view its last known location

If the phone is off or dead, the map will show its last saved location. You can still lock the device or leave a message for whoever finds it.

Best Android settings to turn on before your device goes missing

Before your Android phone ever goes missing, take a minute to set up these key protections.

Settings may vary depending on your Android phone’s manufacturer.

1) Turn on Find My Device

This lets you track your phone or lock it from any browser.
Go to Settings, tap Security & privacy, tap Find My Device or Device Finders and turn it on.
(Names may vary by manufacturer.)

2) Enable Location Services

This improves accuracy and helps Google save your phone’s last known location.
Go to Settings, tap Location and turn on Use Location.

3) Turn on Google Location History

This allows Google to show past locations even when your phone is off.
Go to Settings, tap Location, tap Location Services, then choose Google Location History or Google Location Sharing and turn it on.

4) Add a recovery phone number or email

This helps you verify your identity and recover your account fast.
Go to Settings, tap Google, tap Manage your Google Account, then open the Security tab and add a recovery phone number or email.

5) Use a strong screen lock

Choose a secure lock to keep your data safe.
Go to Settings, tap Security, then Screen lock, and select a PIN, pattern, or password that is hard to guess.

6) Turn on “Send last location” (If available)

Some Android models save the phone’s last known location before the battery dies.
Go to Settings, tap Security & privacy, tap Find My Device and enable Send last location if your device supports it.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com 

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

A dead or powered-off phone does not have to stay lost. Apple’s Find My network and Google’s Find My Device system both give you a last known location and fast tools that help you lock or secure your phone. With the right settings in place before anything happens, you can recover your device sooner and protect your personal data.

What would you do first if your phone went missing today? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved.



Source link