-4.8 C
New York
Friday, February 13, 2026
Home Blog Page 39

How to find your dead phone using iPhone and Android tracking tools

0


NEWYou can now listen to Fox News articles!

Losing your phone can leave you in panic mode, especially when the battery dies. The good news is that both Apple and Android offer built-in tools that help you track a missing device even when it is powered off or offline.

With an iPhone, you can use the Find My network on another Apple device or sign in from a browser. With Android, you can use Google’s Find My Device system to see the last known location and secure your phone fast.

This guide walks you through clear steps for iPhone and Android so you know exactly what to do next.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

An array of apple products

You can still find your lost Apple device even when it’s dead. (Apple)

Does Find My work when your iPhone is dead?

Yes, it does. Your iPhone uses low power mode in the background so it stays findable for a period after powering off. If other Apple devices are nearby, your phone can still send out a Bluetooth signal that helps pinpoint the last known location.

You can check this location from any Apple device or a browser.

Use Find My from another Apple device

If you have an iPad, Mac, or another iPhone, you can look up your missing device in seconds. Family Sharing works too, so you can track a shared device even if it is offline. Here is how to do it:

  • Open the Find My app
  • Tap the Devices tab
  • Swipe up to see your full list of devices
  • Select your missing iPhone
  • View the location on the map
  • Tap Directions to navigate to it
  • Tap Play Sound if the phone is on and nearby
Steps to enable Find My on iPhone

Steps to use Find My from another Apple device. (Kurt “CyberGuy” Knutsson)

  • Turn on Lost Mode by tapping continue at the bottom of the screen to lock it and show a message with a callback number.
  • Enter a phone number that can be used when someone finds your iPhone and wants to contact you. Then, tap Next. 
  • If the screen icon is black, the phone is dead. You will still see the last known location, so you know where to start looking.
Steps to enable Find my on iPhone

Steps to use Find My from another Apple device. (Kurt “CyberGuy” Knutsson)

Find your iPhone from a web browser

If you only have access to a computer or an Android phone, use iCloud.com to locate your device. The browser version gives fewer tools, but it still shows your iPhone on the map. Follow these steps:

  • Go to iCloud.com/find
  • Sign in with your Apple ID
  • Approve two-factor if needed
A Find Devices sign in screen

Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

  • Select All Devices
  • Choose your missing iPhone
A map with location of iPhone

Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

  • Use Play Sound if the device is on
  • Turn on Lost Mode to lock the phone

Use this method when you have no Apple hardware nearby.

A map with location of iPhone

Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

Use the Help a Friend feature in Find My

If you need to borrow another person’s iPhone, avoid signing in to their device directly. That triggers security checks you cannot complete without your missing phone. Instead, use Help a Friend inside the Find My app:

  • Open Find My on your friend’s iPhone
  • Scroll to Help a Friend
  • Sign in with your Apple ID
  • View the last known location of your iPhone

This tool bypasses two-factor prompts so you can get your location without any issues.

Help a Friend feature on iPhone

Steps to use the Help a Friend feature in Find My. (Kurt “CyberGuy” Knutsson)

Can you find an iPhone without Find My

If ‘Find My’ was never enabled, you must retrace your steps. You can check ‘Your Timeline’ in Google Maps if you use that app and have location history on.

Without ‘Find My,’ there is no way to remotely lock, track, or erase the device.

Once you recover your phone, turn on ‘Find My’ and enable ‘Send Last Location’ so you are covered next time.

Best iPhone settings to turn on before your device goes missing

Before your iPhone ever goes missing, take a minute to set up these key protections.

1) Turn on Find My iPhone

This keeps your device trackable whether it is on or off. Go to Settings, then tap your name, then click Find My, then Find My iPhone and enable it. 

2) Enable Send Last Location

Go to Settings, then tap your name, then click Find My, then Find My iPhone and scroll down and enable Sent Last Location. 

Your phone will save its final location before the battery dies.

3) Turn on Find My network

Go to Settings, tap your name, click Find My, then tap Find My iPhone and enable Find My network.
This keeps your iPhone discoverable through nearby Apple devices even when it is off or offline.

4) Keep two-factor authentication on

Go to Settings, tap your name, tap Sign-In & Security, select Two-Factor Authentication (2FA), then tap your iPhone and make sure 2FA is turned on.
This blocks anyone from accessing your Apple ID without approval.

5) Use a strong passcode

Go to Settings, then tap Face ID & Passcode, then enter your current passcode.
Tap Change Passcode and follow the prompts to set a unique passcode that is hard to guess.

6) Add a recovery contact

Go to Settings, tap your name, tap Sign-In & Security, then tap Recovery contacts. Then, click Add Recovery Contact. 
Add a trusted person as your recovery contact so you can verify your identity if you ever lose your iPhone. 

CAN’T FIND YOUR ANDROID PHONE? HERE’S WHAT TO DO TO TRACK IT DOWN

How to find an Android phone that is off or dead

Android users can also track a missing device using Google’s Find My Device system. While you cannot see live location when the phone is powered off, you can view the last known location, lock the phone, or display a message for anyone who finds it. Here is how to track it:

Find your Android from a browser

Settings may vary depending on your Android phone’s manufacturer.

  • Go to android.com/find
  • Sign in with your Google account
  • Select your missing device
  • View the last known location on the map
  • Select Secure Device to lock it and display a callback message
  • Select Play Sound if the phone is on and nearby

Find your Android from another phone

Settings may vary depending on your Android phone’s manufacturer.

  • Download the Find My Device app on another Android
  • Sign in with your Google account
  • Tap your missing phone to view its last known location

If the phone is off or dead, the map will show its last saved location. You can still lock the device or leave a message for whoever finds it.

Best Android settings to turn on before your device goes missing

Before your Android phone ever goes missing, take a minute to set up these key protections.

Settings may vary depending on your Android phone’s manufacturer.

1) Turn on Find My Device

This lets you track your phone or lock it from any browser.
Go to Settings, tap Security & privacy, tap Find My Device or Device Finders and turn it on.
(Names may vary by manufacturer.)

2) Enable Location Services

This improves accuracy and helps Google save your phone’s last known location.
Go to Settings, tap Location and turn on Use Location.

3) Turn on Google Location History

This allows Google to show past locations even when your phone is off.
Go to Settings, tap Location, tap Location Services, then choose Google Location History or Google Location Sharing and turn it on.

4) Add a recovery phone number or email

This helps you verify your identity and recover your account fast.
Go to Settings, tap Google, tap Manage your Google Account, then open the Security tab and add a recovery phone number or email.

5) Use a strong screen lock

Choose a secure lock to keep your data safe.
Go to Settings, tap Security, then Screen lock, and select a PIN, pattern, or password that is hard to guess.

6) Turn on “Send last location” (If available)

Some Android models save the phone’s last known location before the battery dies.
Go to Settings, tap Security & privacy, tap Find My Device and enable Send last location if your device supports it.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com 

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

A dead or powered-off phone does not have to stay lost. Apple’s Find My network and Google’s Find My Device system both give you a last known location and fast tools that help you lock or secure your phone. With the right settings in place before anything happens, you can recover your device sooner and protect your personal data.

What would you do first if your phone went missing today? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved.



Source link

Pictures of the Year from National Geographic include stunning shark encounter

0

NEWYou can now listen to Fox News articles!

The year 2025 has been captured in stunning photography by many around the globe.

In its annual highlight reel of the year, National Geographic has released its Pictures of the Year, featuring 25 of the top shots of people, places, cultural moments and wildlife in action.

Five images were taken right here in the United States. 

NATIONAL GEOGRAPHIC RELEASES ITS PICTURES OF THE YEAR: SEE SOME OF THE JAW-DROPPING SHOTS

Check out these standout photo moments below, all with a particular focus on animal life.

“From thousands of images made by our photographers all around the world, we present the ones that moved and inspired us most,” the editors write. 

The details in the captions are all courtesy of National Geographic. 

‘Chicken or Egg?’ — Berkeley, California

The cover of National Geographic’s December 2025 edition highlights its annual Pictures of the Year. (Anand Varma/National Geographic)

CLICK HERE FOR MORE LIFESTYLE STORIES

An embryo of a chick

For years, photographer Anand Varma has attempted to document when an egg yolk can still be seen but a bird form has clearly emerged. He experimented by incubating embryos in artificial shells before finally capturing the transformation at 12 days old. Varma separately raised some embryos to chicks, which he donated to people in the community.  (Anand Varma)

‘A Bee’s ZZZs’ — Davis, California

A bee rests on a sunflower

A sunflower chimney bee rests on a pillow of velvety ochers in the early evening, likely already snoozing after a long day’s work pollinating plants. This species of bee often nests at the base of sunflowers, moving with commercial farmers as they rotate their crops.  (Karine Aigner)

CLICK HERE TO GET THE FOX NEWS APP

‘A Great Sighting’ — The Gulf of Maine

A great white shark shows its teeth while swimming in water

Photographer Brian Skerry has been chronicling marine life for decades, but this image represents his first run-in with a great white shark in the Gulf of Maine, a place he did not expect to encounter one — especially from four feet away. Sightings of sharks like this 10-footer are increasing from Cape Cod to Nova Scotia, perhaps due in part to changing climate patterns. (Brian Skerry)

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

‘The Unlikely Hero’ — Wisconsin

a piglet stands in an incubator

This two-day-old piglet was bred to save lives. Scientists modified its genes in an attempt to harvest kidneys for human transplantation. Pigs like this represent new hope for the tens of thousands of Americans in desperate need of kidneys, 66% of whom remain on the waiting list for more than a year. (Craig Cutler)

CLICK HERE TO GET THE FOX NEWS APP

More of this year’s Pictures of the Year can be found on National Geographic’s website.

Rare IDF firefight with al-Jama’a al-Islamiyya terrorists in Syria

0

NEWYou can now listen to Fox News articles!

The IDF released body-camera footage Friday from a rare face-to-face gun battle in southern Syria, where troops from the 55th Brigade were fired on while arresting members of al-Jama’a al-Islamiyya, a Sunni terrorist group Israel identifies as part of the wider Muslim Brotherhood network. 

The cross-border gun battle comes as the Trump administration moves to target Brotherhood affiliates and tensions spike between Netanyahu and Syria’s interim president.

The overnight operation took place in the Beit Jann area, roughly 10 kilometers inside Syria, under the 210th Division. According to the IDF, troops entered the area to detain suspects involved in planting IEDs and planning future attacks against Israel, including potential rocket fire. Two suspects were arrested before an exchange of fire erupted.

Six IDF soldiers were wounded, including three in serious condition. Several terrorists were killed, the IDF said, and the suspects were transferred to Israel for interrogation.

TRUMP MOVES AGAINST MUSLIM BROTHERHOOD AS ISLAMIST GROUP SPREADS IN WEST

IDF troops move through the Beit Jann area in southern Syria during the overnight operation to apprehend members of Al-Jama’a al-Islamiyya, the Muslim Brotherhood-linked militant group. (IDF) (IDF)

Al-Jama’a al-Islamiyya, founded as the Lebanese branch of the Muslim Brotherhood, has cooperated with Hamas and Hezbollah, maintaining infrastructure in southern Lebanon and along the Syria-Lebanon border. The IDF says it has struck the organization’s sites in Syria and Lebanon repeatedly during the current war.

Channel 12 political correspondent Amit Segal noted Friday that the incident marks the first time since December 2024 — when Israeli forces took control of the Syrian side of Mount Hermon — that Israeli troops were wounded in a Syrian firefight.

Segal wrote: “Could Syria become the IDF’s new Lebanon? … With six soldiers wounded overnight, the big question is whether this is a one-off event, or if it signals the beginning of a long, uncomfortable Israeli presence in Syria.”

Tensions between Syrian interim president Ahmed al-Sharaa and Israeli Prime Minister Benjamin Netanyahu have intensified since Sharaa’s unprecedented visit to Washington earlier this month. Sharaa met President Donald Trump at the White House for discussions on sanctions relief and counterterrorism coordination, making him the first Syrian leader to visit Washington since the Syrian war began.

IDF STRIKES HAMAS ‘TERRORIST TARGETS’ ACROSS GAZA FOLLOWING REPORTED CEASEFIRE VIOLATION

Israeli forces secure the area around Beit Jann, Syria

Israeli forces secure the area around Beit Jann after detaining two suspects and coming under fire in one of the most serious clashes on the Syrian front this year. (IDF)

Netanyahu publicly criticized the visit the same day, saying Sharaa “returned inflated with a sense of international legitimacy,” and warning that any U.S.-Syria discussions must “not come at Israel’s expense.”

Additional reporting in the Jerusalem Post and Channel 12 noted that security arrangements affecting Israel’s northern front were discussed in broad terms between U.S. and Syrian officials, though no agreements were reached, and Washington stressed that consultations with Israel were ongoing.

Friday’s clash came the same week the Trump administration launched a sweeping effort to designate Muslim Brotherhood affiliates as terrorist organizations. The White House directive instructs federal agencies to evaluate and sanction Brotherhood entities in countries including Egypt, Jordan and Lebanon, citing global financial, political and operational ties among affiliates.

ISRAEL’S STRIKE IN QATAR TRIGGERS RARE US REBUKE, TESTS TRUMP’S GULF DIPLOMACY

IDF armored vehicles maneuver in the Beit Jann area of southern Syria

IDF armored vehicles maneuver in the Beit Jann area of southern Syria during the overnight counterterrorism operation against Al-Jama’a al-Islamiyya. (IDF)

The White House statement said the Brotherhood “fuels terrorism and destabilization campaigns against U.S. interests and allies.”

Sen. Ted Cruz, R-Texas, praised the move on his podcast Verdict, telling co-host Ben Ferguson that the designation marks the culmination of a decade of legislative efforts. Cruz said “This is literally 10 years of hard work, and it will make America safer because the Muslim Brotherhood is funding terrorists that want to murder you and want to murder me.”

He noted that many U.S. allies in the Middle East — including Egypt, Jordan, Saudi Arabia, Bahrain and the UAE — have already outlawed the organization, telling listeners: “They really want the United States to do what President Trump did this week.”

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

As Washington intensifies pressure on Brotherhood-linked movements, Israel is increasingly confronting Brotherhood-affiliated armed groups across the northern arena — from Hamas in Gaza to al-Jama’a al-Islamiyya in Syria and Lebanon.

With Beit Jann emerging as a focal point for cross-border operations, and American policy tightening, analysts say the regional confrontations involving Brotherhood-connected groups may be entering a new phase.

City of London considers introducing new tourist tax for overnight visitors

0

NEWYou can now listen to Fox News articles!

London is weighing whether to implement a new tourist tax targeting overnight guests.

Mayor Sadiq Khan is reportedly looking into charging overnight visitors a tax on stays at hotels and short-term rentals.

“The mayor has been clear [about considering] a modest tourist levy, similar to other international cities,” a spokesperson for the mayor of London told the Local Democracy Reporting Service.

DOG TAX SLAMMED AS ‘SHORT-SIGHTED AND UNFAIR’ AS TOURIST HOT SPOT AIMS FOR PUBLIC-AREA CLEANUP

The spokesperson added that such a tax “would boost [the] economy, deliver growth and help cement London’s reputation as a global tourism and business destination.”

London remains a popular tourist attraction, drawing some 21 million visitors in recent years — with around 3.6 million “overnight visits” coming from North America, according to the U.K.’s Office for National Statistics

The City of London is weighing whether to implement a new tourist tax that would target overnight guests. (Richard Heathcote/Getty Images)

The potential tax stems from the English Devolution and Community Empowerment Bill, which includes a clause permitting local leaders to “raise revenue locally through a new overnight visitor levy.”

While there has been no official declaration of the specifics, many suggest the levy could be 5% per night.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Andrew Carter, chief executive of Centre for Cities, told Conde Nast Traveler that introducing a tourist tax “is the start of a bigger [program] of devolving tax and spending powers to the capital.”

“London is the most productive big city in the U.K., and devolving more fiscal powers would give the capital more policy tools to accelerate growth in the economy,” said Carter.

four tourists taking selfie in london

While there has been no official declaration of the specifics, many suggest the levy could be 5% per night. (iStock)

London recently launched a “Mind the Grab” campaign to warn pedestrians about phone snatches.

CLICK HERE TO GET THE FOX NEWS APP

Bold purple chalk signs on the edge of some sidewalks say, “Mind the Grab,” and “Step back from the Kerb! Phone snatching hot spot.”

The latest news comes as European cities and other destinations have been grappling with overtourism.

London Bridge U.K.

London remains a popular tourist attraction, drawing some 21 million visitors in recent years, with around 3.6 million “overnight visits” coming from North America. (Reuters/Henry Nicholls)

Greek officials, for example, are planning to impose a $22 tax on visitors cruising to Santorini or Mykonos.

Aberdeen, Scotland, greenlighted a 7% visitor levy in August to begin on April 1, 2027.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

The City of Edinburgh, Scotland, plans to charge a 5% per night tax on accommodations starting in July 2026.

Norway also introduced a tourist tax, allowing certain cities to introduce a 3% tax on overnight stays in “areas particularly affected by tourism,” as Fox News Digital previously reported.

CLICK HERE FOR MORE LIFESTYLE STORIES

Venice, Italy, introduced a pilot program in 2024 to charge day-trippers a $5.17 (5 euros) entry fee. The city is now now looking to double the tax.

Artificial intelligence newsletter: Stop Google from scanning your email

0


NEWYou can now listen to Fox News articles!

Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.

IN TODAY’S NEWSLETTER:

– How to stop Google AI from scanning your Gmail
– IRS to roll out Salesforce AI agents following workforce reduction: report
– AI chatbots shown effective against antisemitic conspiracies in new study

EYES OFF THE INBOX: Google shared a new update on Nov. 5, confirming that Gemini Deep Research can now use context from your Gmail, Drive and Chat. This allows the AI to pull information from your messages, attachments and stored files to support your research.

‘CHANGE IS COMING’: The Internal Revenue Service (IRS) is implementing a Salesforce artificial intelligence (AI) agent program across multiple divisions in the wake of a mass workforce reduction earlier this year, according to a report.

FACT CHECK TECH: AI chatbots could be one of the tools of the future for fighting hate and conspiracy theories, a new study shows. Researchers found that short dialogues with chatbots designed to engage with believers of antisemitic conspiracy theories led to measurable changes in what people believe.

A rendering of Archer Aviation's plans for potential developments to Hawthorne Airport.

The image depicts Archer’s development plans for Hawthorne Airport in Los Angeles, CA. (Archer Aviation)

SKY TAKEOVER: Archer Aviation, a leading developer of electric vertical takeoff and landing (eVTOL) aircraft, just made one of its boldest moves yet. The company agreed to acquire Hawthorne Airport for $126 million in cash. 

DIGITAL IMPOSTERS: App stores are supposed to be reliable and free of malware or fake apps, but that’s far from the truth. For every legitimate application that solves a real problem, there are dozens of knockoffs waiting to exploit brand recognition and user trust. We’ve seen it happen with games, productivity tools and entertainment apps. Now, artificial intelligence has become the latest battleground for digital impostors.

AI TRANSFORMATION: HP announced Tuesday that it plans to cut between 4,000 and 6,000 employees by the end of 2028 as part of its push to adopt artificial intelligence.

An AWS AI stand at a trade fair

A lettering AI for “Artificial Intelligence” stands at the Amazon Web Services AWS stand at the Hannover Messe 2025 industrial trade fair. (Julian Stratenschulte/picture alliance via Getty Images)

RACE FOR AI: Amazon Web Services (AWS) on Monday announced a plan to build and deploy purpose-built artificial intelligence (AI) and high-performance computing for the U.S. government for the first time.

BREAKING CHINA: Beijing has repeatedly shown the world that it is willing to weaponize its dominance of supply chains, and President Donald Trump had to de-escalate the latest rare-earth dispute during his recent trip to Asia. But rare earths are only a small window into the power that China could have over the U.S. economy as we start adopting tomorrow’s technologies. 

NO RESERVATIONS: Maybe you order sparkling water, start every meal with an appetizer or prefer dining right when the restaurant opens. You might not track these habits. OpenTable might.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
X
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

Fox News
Fox Business
Fox Weather
Fox Sports
Tubi

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements, and learn about the challenges and opportunities AI presents now and for the future with Fox News here.





Source link

‘Admin’ tops list of most common passwords used in US for 2025 study

0


NEWYou can now listen to Fox News articles!

Passwords play a huge role in how you stay safe online. They protect your accounts, devices and money. Still, many people pick logins that criminals can guess in seconds. 

The latest NordPass report shows this problem again. This year, “admin” took the top spot as the most common password in the United States.

NordPass and NordStellar, two cybersecurity companies that track leaked credentials and online threats, reviewed millions of exposed passwords to spot trends. They also examined how password habits differ across generations. The pattern is clear: many of us still rely on simple words, easy number strings and familiar keyboard patterns. These choices give attackers a quick path into countless accounts.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

183 MILLION EMAIL PASSWORDS LEAKED: CHECK YOURS NOW

securing passwords 1

Weak passwords like “admin” give attackers a quick way into your accounts before you even realize it.  (Kurt “CyberGuy” Knutsson)

Most common passwords in the United States

NordPass shared its top 20 list for 2025. “Admin” sits at number one. Variations of the word “password” take up five spots. Number strings appear nine times. One explicit term even made the list.

Here are the 20 most common passwords in the USA this year:

  • admin
  • password
  • 123456
  • 12345678
  • 123456789
  • 12345
  • Password
  • 12345678910
  • Gmail.12345
  • Password1
  • Aa123456
  • f*******t
  • 1234567890
  • abc123
  • Welcome1
  • Password1!
  • password1
  • 1234567
  • 111111
  • 123123

Weak logins remain a major problem because criminals rely on automated tools. These tools try simple words and common patterns first. When millions of people reuse the same easy passwords, attackers succeed fast.

HOW TO USE PASSKEYS TO KEEP YOUR COMPUTER SAFE

Reusing the same login across sites makes it easy for criminals to jump from one hacked account to another.

Reusing the same login across sites makes it easy for criminals to jump from one hacked account to another. (Kurt “CyberGuy” Knutsson)

Global trends show the same risky password behavior

The United States is not alone. Globally, “123456” ranks as the most common password. “Admin” and “12345678” follow closely behind. These patterns appear because they are easy to remember. Sadly, they are also easy to crack.

Researchers noticed one shift worth noting: more passwords now include special characters. The increase is sharp. However, most examples remain weak. Strings like P@ssw0rd and Abcd@1234 still follow predictable rules that tools can break with little effort.

The word “password” stays popular around the world. People even use it in local languages. This shows how widespread the problem is.

Why younger generations still make unsafe password choices

Many people assume younger adults understand digital safety. They grew up with phones and social media. Research shows that this assumption is wrong.

NordPass found that an 18-year-old often picks the same weak password patterns as an 80-year-old. Younger users favor long number sequences. Older users lean toward names. Neither group creates secure or random strings. Generations Z and Y tend to avoid names. Generations X and older use them often. Each approach carries risk because attackers expect both patterns.

AI-POWERED SCAMS TARGET KIDS WHILE PARENTS STAY SILENT

Researchers found that weak and predictable passwords still appear in leaked data again and again.

Researchers found that weak and predictable passwords still appear in leaked data again and again. (Kurt “CyberGuy” Knutsson)

Why weak passwords remain a big threat

Weak passwords fuel data breaches and account takeovers. Criminals run scripts that check billions of combinations every second. When your password is common, they break in fast.

A single stolen login can expose your email, social accounts, bank information and more. Many attacks start this way. Once criminals get inside one account, they often try the same password on others.

Steps to stay safe with your passwords 

You can improve your digital safety with a few simple habits. These steps help block common attacks and protect your accounts.

1) Create strong random passwords

Pick long passwords or short passphrases. Aim for at least 20 characters. Mix letters, numbers and special characters. Avoid patterns. 

2) Avoid password reuse

Use a unique password for each account. If one login gets hacked, the others stay safe.

3) Review and update weak passwords

Check your old logins. Replace anything short, predictable or reused. Fresh passwords lower your risk.

4) Use a password manager

A password manager creates secure passwords and stores them safely. It also fills them in for you, so you do not need to remember them.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

5) Turn on multi-factor authentication (MFA)

MFA adds a second check before you log in. It is one of the easiest ways to block attackers.

6) Keep your software updated

Update your phone, computer browsers and apps on a regular schedule. These updates patch security gaps that criminals try to exploit. When you fall behind on updates, weak passwords become even riskier because attackers can pair old software flaws with easy logins.

Pro Tip: Use a data removal service

Leaked passwords often come from old profiles on data broker sites you forgot about. A data removal service can wipe your personal info from those sites and reduce how much of your data ends up on breach lists. When less of your information is floating around online, your accounts become less tempting targets.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways 

Weak passwords remain a huge issue in 2025, even with new tools and better education. You have the power to improve your security with a few quick changes. When you build strong habits, you make it harder for criminals to get inside your accounts. Small steps add up fast and give you far more protection online.

What do you think keeps people stuck on weak passwords even when the risks are clear? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link

Cross-Platform Social Media Marketing Strategies

0

Latest Blog from RPR Comando: “Cross-Platform Social Media Marketing Strategies”. Cross-platform social media marketing is the practice of promoting content across multiple social media channels. This strategy allows businesses to connect with audiences where they are most active. #BookMarketing #VideoShorts #PressReleaseMarketing #RPRComando  
This article originally appeared on https://rprcomando.com/social-media-marketing-strategies/

Wisconsin lake yields oldest dugout canoe found in Great Lakes region

0

NEWYou can now listen to Fox News articles!

Wisconsin officials recently announced the discovery of a trove of ancient canoes in an underwater “parking lot” of sorts — including one that predates the Pyramids of Giza.

The Wisconsin Historical Society (WHS) announced this month that its experts have identified 14 canoes in Madison’s Lake Mendota so far, six of which were found this spring. The WHS worked with the First Nations of Wisconsin during the research process, a release noted.

The WHS also recovered a 1,200-year-old dugout canoe in 2021 and retrieved another 3,000-year-old one in 2022.

ANCIENT ROMAN FORT YIELDS 2,000-YEAR-OLD FRUIT THAT SURVIVED THE CENTURIES, PLUS OTHER TREASURES

All in all, the oldest canoe is 5,200 years old, while the most recent one dates back to the 1300s A.D. The vessels were used to catch fish, make travel more efficient and facilitate trade, the WHS said.

“The landscape around Madison lakes looked very different before European settlers arrived in the area and conducted terraforming to suit modern transportation, with large bluffs that made traveling over the land difficult in some areas,” the statement noted.

The Wisconsin Historical Society is studying the unusually large cache of canoes after identifying 14 vessels preserved beneath Lake Mendota. (Tamara Thomsen, Wisconsin Historical Society; Wisconsin Historical Society)

“Canoe travel may have been more efficient for certain routes for the communities who lived in the area spanning thousands of years before Wisconsin became a state,” the statement also said. 

WHS maritime archaeologist Tamara Thomsen told Fox News Digital the canoes were preserved by being buried under Lake Mendota for thousands of years.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

“The canoes have all been found eroding from a bank underwater, in about 25 feet of water,” said Thomsen. “They survived because they remained buried for so many millennia.”

There are no current plans to retrieve the 14 canoes that remain underwater, Thomsen added. The two that have been retrieved, however, are slated to be included in a museum display at the Wisconsin History Center in 2027.

Split image of canoe at bottom of lake, person treating wood

The canoes survived because they remained buried in deep water for millennia, according to a maritime archaeologist.  (Wisconsin Historical Society; Dean Witter, Wisconsin Historical Society)

“The oldest Lake Mendota canoe identified to date was likely crafted sometime around 3000 B.C., before the Great Pyramid of Giza was built in Egypt, and around the time of the invention of writing in Sumer,” she added.

“Constructed of red oak, it is now the oldest dugout canoe recorded from the Great Lakes region and the third oldest in eastern North America.”

CLICK HERE FOR MORE LIFESTYLE STORIES

The cache is rare in the Midwest, as such discoveries are more common in the Southeast.

“This is the only cache of canoes that has so far been discovered in Wisconsin,” the archaeologist said.

Various angles of retrieved ancient canoe

The canoes’ construction reflects early forms of bioengineering long before the modern term existed, said experts.  (Wisconsin Historical Society)

The WHS also said the canoes were made of either red or white oak — curious choices, as they tend to be water-absorbent.

Thomsen speculated that the builders may have intentionally selected trees that were damaged, or may have damaged them on purpose to impact their growth cycle.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“We think of bioengineering as a modern practice, but the samples we have suggest this may have been taking place long before the term was coined in the mid-20th century,” she said.

“Archaeology is kind of like putting together pieces of a puzzle, and the more pieces you can find, the better you can start to form a picture of what was going on and why during a period of history,” Thomsen added.

Close-up of ancient canoe

“This is the only cache of canoes that has so far been discovered in Wisconsin,” said maritime archaeologist Tamara Thomsen. (Tamara Thomsen, Wisconsin Historical Society)

Bill Quackenbush, a tribal historic preservation officer for the Ho-Chunk Nation, said the project “gives us a meaningful opportunity to gain a deeper perspective on our heritage and our ancestors.”

He added, “It is important that we document and share these stories, so that our youth feel that connection to our past.”

CLICK HERE TO GET THE FOX NEWS APP

“Protecting and preserving this knowledge ensures that the next generation understands where we come from and why these stories matter. That is why we share them and continue this work.”

Oregon survey asks 11-year-olds about sexual orientation, gender identity

0

NEWYou can now listen to Fox News articles!

An Oregon father is outraged after discovering that his 11-year-old son was slated to receive a state-issued sexual orientation and gender identity survey that asked children to identify their sexual orientation, gender identity, and whether they are transgender.

“I was made aware of this survey somehow online,” Chuck Gonzales told Fox News Digital in an interview Tuesday, whose son, Maxwell, attends Minter Bridge Elementary School in Hillsboro, a suburb of Portland, Oregon.  

“I might’ve got it through an email, but it was a survey that is asking our children grades six, eighth, and eleventh grade issued by the Oregon Health Authority,” Gonzales said. “And the survey, it asks a lot of really confusing things to sixth graders. And one of those is it discusses and asks about their gender and sexual identity. So when I heard about this, I went to the website, downloaded the PDF form, and sure enough, it was just right there. ” 

EDUCATION DEPT LAUNCHES INVESTIGATION INTO SCHOOL DISTRICT ACCUSED OF FORCING EXPLICIT SURVEY ON STUDENTS

Oregon father Chuck Gonzales with his sons. Maxwell is in the football jersey. (Photo courtesy: Chuck Gonzales)

The 2024 Student Health Survey asked questions such as “What is your gender identity,” with the multiple choice answers being “girl or woman, boy or man, demigirl/demiboy, nonbinary, genderfluid, genderqueer or questioning, and agender/no gender.”

A demigirl/demiboy, according to gender terminology, is defined as someone who partially identifies as a girl or woman, and a demiboy is someone who partially identifies as a boy or man. The “demi” prefix is meant to communicate the belief that gender is partial, not whole, and the other part of their gender identity can be anything, including another gender, genderless, or a fluid gender.

Another question asks the student if they are transgender, with the answer options being, “Yes,’ ‘No,’ ‘I am not sure,’ ‘I don’t know what this question is asking,’ and ‘I prefer not to answer.’” 

“It is infuriating that the government, the state of Oregon, and these liberal progressives down in Salem can think that they can go into the bedrooms of our children and ask them about things they have no clue about,” Gonzales said. “My son had no idea what any of this meant, but he knew that it was weird and sick and gross.”

HOUSE REPUBLICAN SAYS TEEN SON’S SCHOOL PROMOTES ‘NON-MONOSEXUAL IDENTITIES’ IN AM ANNOUNCEMENTS, URGES ACTION  

An additional question asked students their sexual orientation and told them that they could choose more than one answer. 

Answers to the question included “straight, lesbian, gay, bisexual, pansexual, asexual or aromantic, queer, questioning, ‘Something else fits better, Please tell us more,’ ‘I am not sure of my sexual orientation,’ ‘I don’t know what this question is asking,’ and ‘I prefer not to answer.’”

person on computer

The 2024 Student Health Survey asked questions such as “What is your gender identity,” with the multiple choice answers being “girl or woman, boy or man, demigirl/demiboy, nonbinary, genderfluid, genderqueer or questioning, and agender/no gender.” (Thomas Trutschel/Photothek via Getty Images)

Gonzales said he thought most parents he spoke with had no idea the survey existed.

COLORADO PARENTS SAY SCHOOL SILENCED DAUGHTER AFTER TRANSGENDER ROOMING INCIDENT AS LEGAL FIGHT ESCALATES

“When I had heard of this survey, none of the parents that I had spoken with or comments online had heard anything about it,” Gonzales said. “And of course, plenty of people thought that it was completely made up and ridiculous. But when it actually came out, when I posted the link and I had parents private messaging me to send them the link to the survey so they could opt out.” 

He said he believes the survey is a direct affront to parental rights. 

“They have no right to step on the values that we have as Christians, he said. “They certainly have no right to step into whatever kind of sexual values that a child doesn’t even have. They’re just, they’re projecting their own ideologies on our children. So I mean, yes, it’s infuriating as a Christian and as a Catholic, but just simply as a parent and standing up for what is good based on what is clearly evil in this case.”

Gonzales encouraged other parents to get involved rather than stay silent.

“Parents, don’t be afraid to go to your city council meetings, to go to your school district meetings, but also don’t blow your gasket,” Gonzales said. “The way that we are going to win is for us to stay in control of our own thoughts, our own words, and our own emotions.”

SURVEY SCHOOL ADMINS DON’T WANT YOU TO SEE ASKS YOUNG CHILDREN ABOUT GENDER IDENTITY, CLIMATE CHANGE FEARS 

School bus

In a statement to Fox News Digital, Beth Graser, communications officer at Hillsboro School District, said, “Every parent/guardian received advance information about this survey in two ways: through our ParentSquare communication system and via hard copy that was sent home with students. The school received a signed opt-out form for this student, and they did not participate in the survey.” (AP Photo/Mike Stewart, File)

He also posted a video to Facebook showing his son reading portions of the survey and urging parents to act.

“Parents, wake up! The state of Oregon is shoving invasive surveys at our 11-year-old sixth graders – yes, our KIDS – asking they spill about their ‘sexual orientation,’” Gonzales said in a recent Facebook post

“What in God’s name is happening,” he asked. “I’m a dad who prays day and night over my kids’ souls. I teach them right from wrong, but now, bureaucrats in Salem think they get a say? Without one word to me? This isn’t education – it’s a sneaky end-run around us, probing tender hearts before they’re ready. These kids are still trading Pokémon cards and scraping knees, not dissecting their identities!”

“It’s wrong,” Gonzales said in the post. “It’s a violation. And as a Catholic conservative, I’m done playing nice. Our children aren’t lab rats for some progressive experiment. They’re gifts from God, entrusted to us – not the state. This erodes everything: our rights, our faith, their innocence. Fellow parents, rise up! Call your reps. Flood the schools. Sign petitions. Protect the little ones – because if we don’t, who will? #HandsOffOurKids #OregonParentsUnite #CatholicMomFight #ParentalRights Share if you’re with me. Let’s pray – and act. Ave Maria.”

CLICK HERE TO DOWNLOAD THE FOX NEWS APP 

In a statement to Fox News Digital, Beth Graser, communications officer at Hillsboro School District, said, “Every parent/guardian received advance information about this survey in two ways: through our ParentSquare communication system and via hard copy that was sent home with students. The school received a signed opt-out form for this student and they did not participate in the survey.”

Fox News’ Alba Cuebas-Fantauzzi contributed to this report.

New Android malware BankBot YNRK targets banking apps and crypto wallets

0


NEWYou can now listen to Fox News articles!

Android users have been dealing with a steady rise in financial malware for years. Threats like Hydra, Anatsa and Octo have shown how attackers can take over a phone, read everything on the screen and drain accounts before you even notice anything wrong. Security updates have helped slow some of these strains, but malware authors keep adapting with new tricks. 

The latest variant spotted in circulation is one of the most capable yet. It can silence your phone, take screenshots of banking apps, read clipboard entries, and even automate crypto wallet transactions. This threat is now known as Android BankBot YNRK, and it is far more advanced than typical mobile malware.

Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

How the malware infiltrates devices

HOW ANDROID MALWARE LETS THIEVES ACCESS YOUR ATM CASH

Someone typing on a computer in a dark room.

Android banking malware is getting harder to spot as attackers use new tricks to take over phones and drain accounts. (Thomas Trutschel/Photothek via Getty Images)

BankBot YNRK hides inside fake Android apps that appear legitimate when installed. In the samples analyzed by researchers at Cyfirma, the attackers used apps that impersonated official digital ID tools. Once installed, the malware begins profiling the device by collecting details such as brand, model and installed apps. It checks whether the device is an emulator to avoid automated security analysis. It also maps known models to screen resolutions, which helps it tailor its behavior to specific phones.

To blend in, the malware can disguise itself as Google News. It does this by changing its app name and icon, then loading the real news.google.com site inside a WebView. While the victim believes the app is genuine, the malware quietly runs its background services.

One of its first actions is to mute audio and notification alerts. This prevents victims from hearing incoming messages, alarms or calls that could signal unusual account activity. It then requests access to Accessibility Services. If granted, this allows the malware to interact with the device interface just like a user. From that point onward, it can press buttons, scroll through screens and read everything displayed on the device.

BankBot YNRK also adds itself as a Device Administrator app. This makes it harder to remove and helps it restart itself after a reboot. To maintain long-term access, it schedules recurring background jobs that relaunch the malware every few seconds as long as the phone is connected to the internet.

What does the malware steal

Once the malware receives commands from its remote server, it gains near-complete control of the phone. It sends device information and installed app lists to the attackers, then receives a list of financial apps it should target. This list includes major banking apps used in Vietnam, Malaysia, Indonesia and India, along with several global cryptocurrency wallets.

With Accessibility permissions enabled, the malware can read everything shown on the screen. It captures UI metadata such as text, view IDs and button positions. This helps it reconstruct a simplified version of any app’s interface. Using this data, it can enter login details, swipe through menus or confirm transfers. It can also set text inside fields, install or remove apps, take photos, send SMS, turn call forwarding on and open banking apps in the background while the screen appears inactive.

In cryptocurrency wallets, the malware acts like an automated bot. It can open apps such as Exodus or MetaMask, read balances and seed phrases, dismiss biometric prompts, and carry out transactions. Because all actions happen through Accessibility, the attacker never needs your passwords or PINs. Anything visible on the screen is enough.

The malware also monitors the clipboard, so if users copy OTPs, account numbers or crypto keys, the data is immediately sent to the attackers. With call forwarding enabled, incoming bank verification calls can be silently redirected. All of these actions happen within seconds of the malware activating.

Google search

BankBot YNRK hides inside fake apps that look legitimate, then disguises itself as Google News while it runs in the background. (AP Photo/Don Ryan, File)

7 steps you can take to stay safe from banking malware

Banking trojans are getting harder to spot, but a few simple habits can reduce the chances of your phone getting compromised. Here are 7 practical steps that help you stay protected. 

FBI WARNS OVER 1 MILLION ANDROID DEVICES HIJACKED BY MALWARE

1) Install strong antivirus software

Strong antivirus software helps catch trouble early by spotting suspicious behavior before it harms your Android device or exposes your data. It checks apps as you install them, alerts you to risky permissions and blocks known malware threats. Many top antivirus options also scan links and messages for danger, which adds an important layer of protection when scams move fast.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

2) Use a data-removal service to shrink your digital footprint

Data brokers quietly collect and sell your personal details, which helps scammers target you with more convincing attacks. A reputable data-removal service can find and delete your information from dozens of sites so that criminals have less to work with. This reduces spam, phishing attempts and the chances of ending up on a malware attack list.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

3) Install apps only from trusted sources

Avoid downloading APKs from random websites, forwarded messages or social media posts. Most banking malware spreads through sideloaded apps that look official but contain hidden code. The Play Store is not perfect, but it offers scanning, app verification and regular take-downs that greatly reduce the risk of installing infected apps.

4) Keep your device and apps updated

System updates often patch security issues that attackers exploit to bypass protections. Updating your apps is just as important, since outdated versions may contain weaknesses. Turn on automatic updates so that your device stays protected without you having to check manually.

5) Use a strong password manager

A password manager helps you create long, unique passwords for every account. It also saves you from typing passwords directly into apps, which reduces the chance of malware capturing them from your clipboard or keystrokes. If one password gets exposed, the rest of your accounts remain safe.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

man working on cellphone

Once active, the malware can read your screen, steal financial data, automate crypto transfers and intercept OTPs within seconds. (Kurt “CyberGuy” Knutsson)

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

6) Enable two-factor authentication wherever possible

2FA adds a confirmation step through an OTP, authenticator app or hardware key. Even if attackers steal your login details, they still need this second step to get in. It cannot stop malware that takes over your device, but it significantly limits how far an attacker can go with stolen credentials.

GOOGLE ISSUES WARNING ON FAKE VPN APPS

7) Review app permissions and installed apps regularly

Malware often abuses permissions such as Accessibility or Device Admin because they allow deep control over your phone. Check your settings to see which apps have these permissions and remove anything that looks unfamiliar. Also, look through your installed apps and uninstall any tool or service you do not remember adding. Regular reviews help you spot threats early before they can steal data.

Kurt’s key takeaway

BankBot YNRK is one of the most capable Android banking threats discovered recently. It combines device profiling, strong persistence, UI automation and data theft to gain full control over a victim’s financial apps. Because much of its activity relies on Accessibility permissions, a single tap from the user can give attackers complete access. Staying safe means avoiding unofficial APKs, reviewing installed apps regularly and being cautious of any sudden request to enable special permissions.

Do you think Android phone makers like Samsung or Google are doing enough to protect you from malware? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link