3.7 C
New York
Friday, March 6, 2026
Home Blog Page 42

Nevada wildlife department confirms fungus linked to deadly white-nose syndrome in bats

0

NEWYou can now listen to Fox News articles!

The Nevada Department of Wildlife (NDOW) confirmed the presence of a fungus linked to white-nose syndrome in bats.

The fungus, Pseudogymnoascus destructans (Pd), was discovered by officials during routine monitoring of the Lake Mead National Recreation Area, according to an NDOW press release.

Pd was confirmed in the sample by officials. But they stated that no bats “showed clinical signs” of white nose syndrome.

The disease shows visible white fungal growth on infected bats’ muzzles and wings.

Fox News senior medical analyst Dr. Marc Siegel told Fox News Digital the disease has no impact on humans – unless it were to mutate.

Pseudogymnoascus destructans fungus is confirmed in Nevada bats, with officials monitoring areas for a white-nose syndrome outbreak (not pictured).  (Ricky Carioti/The Washington Post via Getty Images)

“It spreads easily from bat to bat during hibernation, and humans unintentionally spread it from cave to cave by tracking the spores on their shoes,” said Siegel.

CLICK HERE FOR MORE LIFESTYLE STORIES

He added, “Fungus likes cold blood, and the bats cool down when they are hibernating. But the fungus forms a fuzz on their wings and muzzles. As they wake up from hibernation, they start behaving strangely and often die of starvation.”

Bat flying

The disease has no impact on humans, unless it were to mutate, said a medical expert.  (iStock/Getty Images Plus)

White-nose syndrome was first detected in New York in 2006.

It spread across the country until most recently being detected in Nevada for the first time, according to NDOW.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“Nevada’s bats are incredibly important, and this fungus could have serious implications for their conservation,” said NDOW specialist Jonathan Young.

“We knew it was a matter of time before Pd arrived in Nevada, and we have been vigilantly surveying bats for many years now, not only for this fungus but also to track their population trends,” said Young.

white nose bats NYSDEC

White-nose syndrome shows visible white fungal growth on infected bats’ muzzles and wings (pictured). (NYSDEC/Nancy Heaslip)

Young said officials are continuing to monitor the situation.

They’re working to reduce the spread of the fungus with equipment sterilization, habitat protection and public education, he indicated. 

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Officials are urging visitors to avoid entering abandoned mines for their own safety, and to prevent unintentionally carrying the fungus to new bat sites.

Lake Mead National Recreation Area spans over 1.5 million acres of mountains, canyons and valleys, and has two reservoirs, according to the National Park Service (NPS).

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

The park is open year-round, located in southeastern Nevada and northwestern Arizona.

MetaMask wallet verification scam warning and how to stay safe from fraud

0


NEWYou can now listen to Fox News articles!

Recently, you may have received alarming emails like the one below from “sharfharef” titled “Wallet Verification Required” that uses the MetaMask logo and branding.

These messages warn you to verify your wallet by following a link, but scammers use emails like this to steal your crypto information.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

FBI WARNS EMAIL USERS AS HOLIDAY SCAMS SURGE

Woman typing on her laptop.

Scam emails posing as MetaMask alerts are tricking users into revealing their crypto wallet details. (Photographer: Wei Leng Tay/Bloomberg via Getty Images)

What is MetaMask and why scammers love it

MetaMask is a popular crypto wallet and browser extension that lets you store tokens and connect to blockchain apps on networks such as Ethereum. Because MetaMask is widely known and trusted, criminals impersonate it in phishing campaigns that ask users to “verify” wallets and then harvest recovery phrases or keys.

What makes this email a wallet verification scam

The scam email copies MetaMask visuals and even routes through a Zendesk address to look more professional, yet the “Verify Wallet Ownership” button points to an unrelated domain that has nothing to do with MetaMask. That mismatch between branding and destination is a major red flag in crypto phishing attacks. It also relies on classic pressure tactics and vague corporate language. The body reads:

Dear Valued User,
As part of our ongoing commitment to account security, we require verification to confirm ownership of your wallet.
This essential security measure helps protect your assets and maintain the integrity of our platform.
Action Required By: December 03, 2025
Your prompt attention to this verification will help ensure uninterrupted access to your account and maintain the highest level of security protection.

Phrases like “Dear Valued User,” “essential security measure” and “Action Required By” are common in phishing emails that pretend to be MetaMask and threaten restrictions if you do not comply. Genuine MetaMask support will direct you to metamask.io or official apps and will never ask you to reveal your secret recovery phrase through a link in an unsolicited email.

In this case, the message even claims to come from “МеtаМаsk.io (Support@МеtаМаsk.io)” . That display name looks like MetaMask Support, but the real sending address is an unrelated Zendesk subdomain, which is a classic red flag. MetaMask explains that legitimate support messages only come from specific official addresses, so anything else should be treated as a scam and ignored.

Why mention Zendesk can be misleading

Zendesk is a legitimate customer support platform that many companies use to manage tickets and notifications. Scammers sometimes route fake alerts through such services or spoof similar addresses, so messages look like real support tickets, which can fool users who associate Zendesk branding with trust.

In this case, the presence of a Zendesk-style address does not make the message safe because the link still leads away from MetaMask’s official website and asks you to react to manufactured urgency.

NEW EMAIL SCAM USES HIDDEN CHARACTERS TO SLIP PAST FILTERS

Hacker typing on a computer.

Phishing messages urging MetaMask “wallet verification” direct victims to fake websites that steal recovery phrases. (Photo by Morteza Nikoubazl/NurPhoto via Getty Images)

Steps to stay safe from wallet verification scam emails

Taking the right precautions can protect your digital wallet and personal data from scammers.

1) Do not click suspicious links and use strong antivirus software

Avoid clicking buttons or links in unexpected wallet verification emails, even if they show the MetaMask logo. Instead, open your browser and type metamask.io yourself or use the official mobile app to check for any real alerts. Also, install strong antivirus software to detect malicious links, fake sites or malware that tries to capture your keystrokes. 

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Keep it updated so it can block new phishing infrastructure and known scam domains.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

2) Use official websites only

Always confirm that the address bar shows MetaMask’s official domain or your wallet provider’s genuine site before you sign in. If an email link sends you to a domain that looks odd, close it immediately.

3) Keep your credentials private

Never enter your secret recovery phrase, password or private keys on a site you reached by email. MetaMask support will not ask for that information, and anyone who gets it can empty your wallet.

4) Enable two-factor authentication

Turn on two-factor authentication (2FA) wherever your exchange or related accounts support it, since codes from an app or key add a barrier even if a password leaks. Store backup codes safely offline, so criminals cannot reach them.

REAL APPLE SUPPORT EMAILS USED IN NEW PHISHING SCAM

Person checking their emails on their laptop.

Criminals are spoofing Zendesk-style addresses to make fraudulent MetaMask support emails appear legitimate. (Photo by Felix Zahn/Photothek via Getty Images)

5) Use a data removal service

Data removal services can help reduce exposed personal details from data broker sites that attackers use to target victims by name and email. Less exposed information makes it harder for phishers to craft convincing wallet alerts tailored to you.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

6) Mark suspicious emails

Mark any fake MetaMask messages as spam or phishing in your inbox so filters learn to block similar attacks. You can also report phishing attempts through MetaMask and your email provider to help protect other users.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

Emails like the one from “sharfharef” use MetaMask’s trusted name, polished design and alarming language to push you into clicking before you think. When you slow down, check the sender, read the wording and confirm the website address, you strip scammers of their biggest advantage, which is panic.

What questions do you still have about protecting your digital accounts and crypto wallets that you want us to answer in a future article? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved.



Source link

Cold Emailing Strategies That Actually Work

0

Latest Blog from RPR Comando: “Cold emailing strategies that actually work”. Cold emailing strategies are often underestimated in today’s digital landscape. Yet, employing effective cold emailing strategies serves as a direct line to potential clients and collaborators who might not know you exist. Exploring these strategies can significantly enhance your outreach efforts. #BookMarketing #VideoShorts #PressReleaseMarketing #RPRComando  This article originally appeared on https://rprcomando.com/cold-emailing-strategies/

RPR Comando press release distribution
Cold Emailing Strategies That Actually Work 12

5 confusing phone terms explained in simple language for everyday users

0


NEWYou can now listen to Fox News articles!

Technology shouldn’t feel confusing or intimidating, especially when most of us are just trying to use our phones to stay connected, stay informed and stay safe.

The problem is that modern devices throw around terms that sound complicated, even when the concepts are actually pretty simple. Understanding just a few of these everyday phrases can make a huge difference in how confidently you use your phone.

Here are five key phone terms you’ll often see, along with what they really mean.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

HOW TO HELP OLDER RELATIVES WITH TECH OVER THE HOLIDAYS

Person using their iPhone.

Understanding common phone settings helps users stay safer, avoid scams and cut down on battery drain. (Photo by Silas Stein/picture alliance via Getty Images)

1) Background permissions

This refers to what an app is allowed to do when you’re not actively using it. Some apps continue running behind the scenes, checking your location, refreshing content or connecting to the internet, even after you’ve closed them.

Why it matters: If an app has background permission, it may: Use more battery, use more data, track your location or run when you’re not using it.

Examples:

  • A weather app checking your location every hour
  • A fitness app reading your steps even when closed
  • A shopping app accessing data when it shouldn’t

Where to check this on your phone:

On iPhone:

  • Go to Settings
  • Tap Privacy & Security
  • Choose Location Services, Microphone or Camera
  • Review which apps have access and set them to While Using the App instead of Always, or toggle permissions off entirely if the app doesn’t need that access in the background.

On Android:

Settings may vary depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Security and Privacy
  • Click More privacy settings 
  • Tap Permission Manager
  • Select a category like Location or Camera

Adjust each app’s level of access to Allow only while using the appAsk every time or Deny, depending on what it actually needs to function

2) Auto-join networks

Your phone remembers Wi-Fi networks you’ve connected to before, like stores, gyms, hotels, airports or even an old home router and reconnects automatically whenever it detects them again. The problem is that scammers can create look-alike networks with the same name, tricking your phone into joining without you noticing.

Why it matters: Auto-join saves data and speeds things up, but it also removes your control. Your phone could quietly connect to networks you no longer trust or to fake hotspots designed to steal logins, read unencrypted traffic or inject malicious content. Turning off auto-join for places you don’t use often keeps you safer from these silent, high-risk connections.

Examples:

  • Your phone reconnects to the “Airport Wi-Fi” months later
  • You join a café network once, and your phone keeps connecting every time you pass by
  • A fake “Starbucks Wi-Fi” network that tricks devices that auto-join

How to manage auto-join:

On iPhone:

  • Go to Settings
  • Tap Wi-Fi
  • Tap the (i) next to a network
  • Toggle off Auto-Join to stop automatic connections while keeping the network available for future use, like gyms, coffee shops, hotels and airports or choose Forget This Network if you want it gone entirely.

On Android: 

Settings may vary depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Network & Internet
  • Tap Internet
  • Tap the gear next to the Wi-Fi network
  • Turn off Auto-connect (or Auto-reconnect on Samsung) to stop automatic connections while still keeping the network available when you choose to join it manually.

FIND A LOST PHONE THAT IS OFF OR DEAD

Person holding their phone.

Background permissions let apps run quietly behind the scenes and may use data or track location if not adjusted. (NIC COURY/AFP via Getty Images)

3) Push notifications

These are the pop-up alerts or banners you get from apps, even when those apps are closed. Some notifications are helpful (messages, alerts, reminders). Others just bombard you with ads or updates you don’t need.

Why it matters: Push notifications can keep you informed, but they also distract you, drain your battery, expose personal details on your lock screen and give apps a way to pull you back in with constant ads or engagement tactics. Managing them reduces noise and limits how much access apps have to your attention and data.

Examples:

  • Bank fraud alerts
  • Weather warnings
  • Sale notifications from a shopping app
  • Games trying to get you to come back

How to manage push notifications:

On iPhone:

  • Go to Settings
  • Tap Notifications
  • Scroll through apps one by one
  • Toggle off Allow Notifications for anything you don’t want

On Android:

Settings may vary depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Notifications
  • Tap App Notifications
  • Turn off alerts for apps you no longer want to hear from

4) Security updates

These are small software updates designed specifically to fix vulnerabilities that scammers or hackers could exploit. They don’t add new features; they close holes. Skipping security updates leaves your device exposed. They run quickly, often in the background and keep your phone protected from the latest threats.

Why it matters: Security updates patch weaknesses before attackers can use them, and delaying them gives hackers more time to target your device. Installing them promptly helps block malware, stop data theft and keep your phone safe from new exploits that emerge every month.

Examples:
Patches that fix a flaw in your browser
Updates that stop malware from working
Protection against new phishing techniques

Where to find the security updates:

On iPhone

  • Go to Settings
  • Tap General
  • Tap Software Update
  • Install any available updates, including Security Responses & System Files if they appear

On Android

Settings may vary depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Security and Privacy 
  • Tap Security Update, System & Updates or Updates 
  • Tap Security update 
  • Check for new patches

Click Install now or Schedule install

5) App Refresh (also known as Background App Refresh)

This is when apps update their content even when you’re not using them, refreshing news, updating emails, pulling in notifications or syncing data. It keeps apps “fresh,” but also drains more battery and uses more mobile data.

Why it matters:  Background App Refresh can quietly drain your battery, use mobile data and let apps run more often than they need to. Limiting it gives you more control over what apps do behind the scenes and reduces unnecessary tracking, resource use and surprise data charges.

Examples:

  • A news app updating headlines every few minutes
  • Email syncing continuously
  • A social media app is loading new posts in the background

How to manage App Refresh:

On iPhone

  • Go to Settings
  • Tap General
  • Tap Background App Refresh
  • Click Background App Refresh again
  • Turn it off entirely to stop all background activity, or choose specific apps that you want to allow refreshing.

APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERS

Man holding up his phone.

Security updates and app refresh tools protect devices by patching vulnerabilities and limiting unnecessary activity. (Eric Thayer/Bloomberg via Getty Images)

On Android

Settings may vary depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Network & Internet or Connections
  • Tap Data Saver, or you might have to click Data Usage and then Data Saver 
  • Toggle on Data Saver to limit background activity

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

Tech terms don’t have to feel like a foreign language. Background permissions help you keep apps from accessing too much information. Auto-join networks show how your phone reconnects to Wi-Fi without asking. Push notifications explain why your phone keeps buzzing. Security updates keep your device protected from new threats. And App Refresh reveals why your battery might drain faster than you expect. Understanding these basics makes your phone safer, faster and easier to use.

What terms still confuse you? Send your questions to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
 

Copyright 2025 CyberGuy.com.  All rights reserved. 



Source link

Marjorie Taylor Greene says she will vote against the NDAA

0

NEWYou can now listen to Fox News articles!

Republican Rep. Marjorie Taylor Greene of Georgia announced Tuesday that she intends to vote against the proposed fiscal year 2026 National Defense Authorization Act, saying the legislation spends too much taxpayer money on foreign priorities. 

Greene said in a post on X that the NDAA is “filled with American’s hard earned tax dollars used to fund foreign aid and foreign country’s wars.”

Greene pointed to the rising national debt, which, according to fiscaldata.treasury.gov, is more than $38.39 trillion.

MTG DEFENDS HERSELF AS ‘AMERICA FIRST’ AFTER TRUMP SLAMS HER ON TRUTH SOCIAL

Rep. Marjorie Taylor Greene, R-Ga., talks with reporters after a meeting of the House Republican Conference at the Capitol Hill Club on Tuesday, Sept. 9, 2025. (Tom Williams/CQ-Roll Call, Inc via Getty Images)

“These American People are $38 Trillion in debt, suffering from an affordability crisis, on the verge of a healthcare crisis, and credit card debt is at an all time high. Funding foreign aid and foreign wars is America Last and is beyond excuse anymore. I would love to fund our military but refuse to support foreign aid and foreign militaries and foreign wars. I am here and will be voting NO,” Greene declared in her post.

But House Speaker Mike Johnson has praised the proposed NDAA.

REPUBLICANS ‘TERRIFIED’ TO STEP OUT OF LINE WITH TRUMP, GREENE SAYS IN CANDID INTERVIEW

“This year’s National Defense Authorization Act helps advance President Trump and Republicans’ Peace Through Strength Agenda by codifying 15 of President Trump’s executive orders, ending woke ideology at the Pentagon, securing the border, revitalizing the defense industrial base, and restoring the warrior ethos,” Johnson said in part of a lengthy statement.

MARJORIE TAYLOR GREENE SPARS WITH ‘60 MINUTES’ HOST OVER ‘ACCUSATORY’ QUESTIONS

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Greene plans to leave office early next month, in the middle of her two-year term.

Ancient 1,500-year-old reindeer trap discovered by archaeologists in Norway mountains

0

NEWYou can now listen to Fox News articles!

An ancient reindeer trap and weapons recently emerged from Norway’s melting mountains, surprising archaeologists and giving them a glimpse into mountain life 1,500 years ago.

The discovery, announced by the Vestland County Municipality on Nov. 10, was made on the Aurlandsfjellet plateau in Sogn, a remote region in western Norway. Archaeologists from the University Museum of Bergen and Vestland County worked together to document the site. 

The research began when a hiker noticed wooden logs near the melting ice and reported them to local authorities.

WARRIORS FOUND STACKED IN ANCIENT WELL REVEAL VIOLENT TALE OF BATTLEFIELD DEFEAT: ARCHAEOLOGISTS

The remains, it turns out, were a 1,500-year-old reindeer hunting facility, consisting of several hundred hewn wooden logs and two fences made of wooden stakes.

Officials also found iron spearheads, arrow shafts, parts of bows and a wooden spear — along with a massive number of well-preserved reindeer antlers.

Archaeologists recently uncovered a 1,500-year-old reindeer hunting trap on a Norwegian mountain plateau. (Thomas Bruen Olsen, Universitetsmuseet, UiB)

Speaking to Fox News Digital, archaeologist Leif Inge Åstveit said the entire facility came as a “significant surprise” to researchers.

“We have long been aware that stone trapping facilities existed in the mountains of Norway, but the fact that this facility is entirely constructed of wood was unexpected,” he said.

‘HUGELY EXCITING’ PREHISTORIC ARTIFACTS UNCOVERED DURING HUNT FOR LONG-LOST IRISH CASTLE

“Building this has been challenging,” he said. “Thousands of logs, weighing several tons in total, were transported high into the mountains.”

The facility was designed to lure reindeer into a pen. Åstveit said the barriers of the reindeer trap “stretched far out” into a funnel that measured as much as 1,000 feet wide.

“The antlers are incredibly well-preserved, still retaining a reindeer scent after 1,500 years.”

“The animals were likely calmly driven forward at first, but as they were funneled into a narrower area, their pace increased and panic may have spread through the herd,” he said.

“The barrier probably became more solid closer to the trapping pen, preventing any reindeer from breaking free. Eventually, the animals were clustered into a sluice-like enclosure, and then the animals would be extracted one by one.”

ANCIENT CHRISTIAN FIGURINES DISCOVERED IN 1,500-YEAR-OLD DESERT GRAVES

The spears that archaeologists found were used for this purpose. 

Researchers also found a pile of antlers that were collected and discarded. Most of them likely belonged to younger reindeer and females, while larger buck antlers were probably repurposed as items like combs and pins.

Man pointing at ancient facility, shot of reindeer antlers

The wooden trap system stretched across the mountainside, funneling animals into a narrow enclosure. (Thomas Bruen Olsen, Universitetsmuseet, UiB; Leif Inge Åstveit, Universitetsmuseet, UiB)

Remarkably, after 1,500 years, Åstveit said the antlers still smell like the animals that once bore them. 

“The antlers are incredibly well-preserved, still retaining a reindeer scent after 1,500 years,” he said. 

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

“[They] are clustered only a few meters from the trapping pen, suggesting they were likely severed from the skull with an axe, as almost all have distinct cut marks.”

Oddly, no bones or skeletons have been found at the site so far. This suggests it was a “specialized” facility where animals were processed and transported, Åstveit said. 

Split image of man holding artifact, man holding long wooden spear

The trap was used for meat processing, the researchers believe, and likely supported a specialized operation. (Thomas Bruen Olsen, Universitetsmuseet, UiB.)

“Transporting such large quantities of meat — potentially tons — would undoubtedly have been a demanding task,” he said.

CLICK HERE FOR MORE LIFESTYLE STORIES

Another star find, Åstveit said, was a decorated oar made of pine, which he called a “major revelation.”

“What this oar, which clearly belonged to a rowboat located 1,400 meters lower in the landscape, is doing up here is a mystery,” he said.

“This finding is exceptionally rare and was selected as the ‘Find of the Year’ at the annual archaeology conference in Norway.”

“Our hypothesis is that it may have been used in the assembly of the guiding barriers … [but it] is also eye-opening to consider that an oar features such elaborate ornamentation. These people likely surrounded themselves with items that exhibited various artistic expressions and ornamentation.”

Archaeologists also found an axe-shaped clothing pin made of antler, which Åstveit said is “so well-preserved and sharp that it is entirely possible to sting yourself on it.”

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

He added, “Such items have not been found in Norway previously.”

Looking forward, Åstveit said future work won’t be a traditional excavation in the way most people imagine; rather, it will involve monitoring and documenting what emerges from melting ice.

Split image of spear, spear in stream, man looking at pile of debris

“Such items have not been found in Norway previously,” said an archaeologist. (Adnan Icagic, Universitetsmuseet, UiB; Leif Inge Åstveit, Universitetsmuseet, UiB)

“This finding is exceptionally rare and was selected as the ‘Find of the Year’ at the annual archaeology conference in Norway, despite very strong competition this year,” he said.

But Åstveit emphasized that much more research will need to be done on the subject, and archaeologists have only collected samples so far.

CLICK HERE TO GET THE FOX NEWS APP

“This material will likely be vital for research at the University of Bergen in the near future,” he said.

“As new scientific methods emerge, it will undoubtedly provide new insights into various aspects of Early Iron Age society.”

Secret organ-harvesting ring uncovered in Nigeria after surveillance

0

NEWYou can now listen to Fox News articles!

An extensive organ-harvesting ring has been uncovered in Nigeria after weeks of covert surveillance, local officials have said.

In a statement shared on X, the Imo State Police Command said their investigation was launched after reports of a worrying spate of kidnappings near a hotel and mortuary in Ngor Okpala.

According to police, intelligence-led investigations went on to identify a man called High Chief Stanley Oparaugo, also known as “Morocco,” as the suspected leader of the criminal network and who is now on the run and wanted, per reports.

52 CATHOLIC SCHOOL STUDENTS IN NIGERIA KIDNAPPED BY GUNMEN IN LATEST ATTACK: REPORT

A man described as High Chief Stanley Oparaugo from the Jessy Best Hotel is now wanted.

Oparaugo is alleged to own Jessy Best Hotel in Ihitte Okwe and the nearby mortuary known as Ugwudi.

Police said victims were said to have been lured into the hotel before being robbed and abducted, with families also forced to pay ransom. 

Authorities said some people who paid never saw their loved ones again.

The Command said abducted victims were then taken from the hotel to the mortuary, where they were allegedly killed and their organs harvested for sale.

GUNMEN ATTACK CHURCH IN NIGERIA, KILLING TWO AND KIDNAPPING OTHERS

Ngor Okpala

Local Nigerian officials said a suspected secret organ-harvesting ring has been uncovered in Nigera following weeks of covert surveillance. (Imo State Command.)

When officers raided the Jessy Best Hotel, it was abandoned, but at the mortuary they found decomposed and mutilated corpses.

Police spokesperson Henry Okoye said more than 100 bodies had been found.

“A hotel and a private mortuary owned by the suspect, allegedly used by kidnappers and violent criminals, were inspected,” he said in a statement.

TRUMP ADMIN TARGETS ANTI-CHRISTIAN VIOLENCE WITH NEW VISA CRACKDOWN POLICY FOLLOWING NIGERIA ATTACKS

Nigeria

Victims were allegedly lured to hotel before being killed at nearby mortuary for organ sales.

“At the mortuary, decomposed and mutilated corpses were discovered in unhygienic conditions, raising suspicions of illegal organ-harvesting activities.”

He added that the suspect’s residence was also searched and “crucial exhibits” were recovered, with forensic teams documenting evidence for the ongoing investigation.

Maximum security has been deployed along the Owerri–Aba Expressway. The Command assures travelers during the holidays of its commitment to their safety,” he added.

Nigeria has seen a rising amount of crime with kidnappings and abductions. 

As reported by Fox News Digital, the government of Nigeria also secured the release of the 100 schoolchildren who were abducted, according to local media.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Those children were taken from St. Mary’s School in Papiri, Niger state, on Nov. 21. 

The news came as Christians face ongoing persecution in Nigeria, leading President Donald Trump to declare the West African nation a “country of particular concern.”

Norovirus outbreak hits AIDAdiva cruise ship, sickening nearly 100 passengers

0

NEWYou can now listen to Fox News articles!

The U.S. Centers for Disease Control and Prevention (CDC) has confirmed another norovirus outbreak aboard a cruise ship.

Aida Cruises’ AIDAdiva cruise ship was hit with a norovirus outbreak that sickened nearly 100 passengers during its Nov. 10–Dec. 16 voyage.

The cruise notified the CDC of the outbreak on Nov. 30, according to the agency’s report.

CDC REPORTS 19TH CRUISE SHIP NOROVIRUS OUTBREAK THIS YEAR, AFFECTING PASSENGERS AND CREW

The vessel departed from Hamburg, Germany and was heading to England, the U.S., Mexico, and Costa Rica, according to CruiseMapper.

Ninety-five passengers and six crew reported diarrhea and vomiting, the CDC’s data shows.

Aida Cruises’ AIDAdiva was hit by a norovirus outbreak during its almost month-long voyage, leaving nearly 100 passengers sick. (Krisztian Bocsi/Bloomberg)

Over 2,000 passengers, plus 640 crew members, were on board.

In response to the outbreak, Aida Cruises said it increased cleaning and disinfection efforts across the ship. It also isolated sick passengers and crew, and collected stool samples for testing.

NOROVIRUS SICKENS OVER 200 CRUISE SHIP PASSENGERS ON MONTH-LONG VOYAGE

“Seasonal illness peaks between November and April, and the AIDAdiva report reflects infection patterns on land,” an AIDA spokesperson told USA TODAY

“Therefore, we’ve added more hygiene protocols onboard, and cases are already going down.”

A large cruise ship, decorated with a painted mouth and eye, moves across the ocean.

Ninety-five passengers and six crew members reported symptoms, according to CDC data. (iStock)

The cruise line also consulted with CDC Vessel Sanitation Program officials about sanitation procedures and case reporting.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Scott Weisenberg, M.D., medical director of the NYU Langone Infectious Disease Associates and the NYU Travel Medicine Program, previously told Fox News Digital that the virus is highly contagious — and that it can spread quickly in crowded settings such as cruise ships.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“If people have acute vomiting, they should avoid public areas, since even if they don’t touch anything, the virus can spread through the air,” he said.

Large AIDA cruise ship departing a harbor as people watch and take photos from the waterfront promenade.

As a result of the outbreak, enhanced sanitation measures were implemented on board, along with isolating those who became ill. (Krisztian Bocsi/Bloomberg)

Weisenberg also noted that proper hygiene plays a key role in preventing transmission. Shared surfaces can easily become contaminated, putting anyone who touches them at risk of infection.

He added that washing hands with soap and water offers better protection than using alcohol-based sanitizers.

CLICK HERE FOR MORE LIFESTYLE STORIES

This latest incident adds to a growing number of norovirus outbreaks reported on cruise ships this year.

There have now been a total of 21 outbreaks, according to the CDC.

CLICK HERE TO GET THE FOX NEWS APP

Fox News Digital reached out to Aida Cruises for comment.

Criminals test stolen data by opening deposit accounts in your name

0



couple looks at bills

NEWYou can now listen to Fox News articles!

Identity theft now hits people in sneaky ways. Criminals no longer stop at credit cards or loans. They test stolen personal data by applying for deposit accounts under your name, which confuses many victims and leaves them unsure how to respond. Brian in Clinton, Pennsylvania recently experienced this twice in the same week. Here is the email he sent us:

“I was recently notified by two different banking institutions that someone completed an online application to open a deposit account in my name. Both banks denied the applications and sent me notifications. One bank sent an email and the other sent a letter. Neither bank will share any information with me about what information was submitted or why the applications were denied. I understand why fraudsters try to open credit accounts, but why would they try to open deposit accounts? One bank told me they could not share any information with me about the failed application due to privacy policy and the other bank said they do not save any information from declined applications from non-customers. 

Why would banking institutions not capture or share information about declined online applications? As far as I know, the credit bureaus do not collect information about deposit accounts and Early Warning Services only has information from banks that voluntarily report to them. So, how do I respond or react to someone trying to open deposit accounts in my name? I have put a one year fraud alert on with the credit bureaus but I don’t believe that will help me if someone tries to open a deposit account. Any help or advice would be greatly appreciated. Thanks.”  Brian, Clinton, PA

You are right to take this seriously. Deposit account fraud is rising fast as criminals build synthetic identities and test stolen data. When thieves apply for a checking or savings account in your name, they are gathering information about which stolen identities work and which fail. That gives them room to launch more damaging attacks later.

LANDLINE IDENTITY THEFT LEADS TO MAJOR BANK FRAUD

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Why criminals open deposit accounts

Criminals use deposit accounts for several strategic reasons that help them test stolen data and prepare bigger attacks.

Testing stolen data

Fraudsters often begin with deposit accounts because the approval process can be less tied to credit checks. They want to see if your data passes early verification steps.

Moving stolen money

A new deposit account helps criminals launder funds or receive payments linked to scams, unemployment fraud or tax refund theft.

Setting up future attacks

Once they confirm your identity can be used, they may open credit lines or build a synthetic profile that blends your real data with fake details.

Why banks won’t share details

Banks follow strict privacy rules under federal law. Those rules limit the information they can share about any application, even when it misuses your identity. Many banks:

  • Purge declined applications fast to reduce their exposure to unnecessary data
  • Use external verification services that store the data outside the bank
  • Require subpoenas before releasing IP addresses to law enforcement

Even though an IP address can help identify a fraudster, banks will not share it without a legal request tied to an active investigation.

How to protect yourself from deposit account fraud

Take these actions now to lock down your identity and reduce the chances that a criminal can misuse your information again.

 1) Consider identity monitoring

Deposit account fraud often falls outside normal credit monitoring. A service that looks at bank accounts and dark web activity adds extra protection. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

2) File an FTC Identity Theft Report

Go to IdentityTheft.gov and complete the report. It creates a formal record you can use if you need to file a local police report later.

3) Add stronger alerts or freezes

Brian, you already placed a one-year fraud alert, but you can upgrade to a seven-year alert. You can also freeze your credit at Equifax, Experian and TransUnion to stop new credit lines from opening.

4) Use a data removal service

A data removal service scrubs your personal details from people search sites that criminals often use to build synthetic identities. This reduces how much of your information can be exploited in future attacks.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

5) Check ChexSystems and Early Warning Services

These companies track deposit account activity. Request your reports at chexsystems.com and earlywarning.com. Look for unauthorized entries and add a security alert or freeze to both.

6) Notify the banks

Even if they cannot share details, ask them to document the attempt on your record. This helps flag future fraud attempts.

7) Watch your mail

Look for debit cards, 1099 forms or bank statements you did not request. Those often reveal when criminals succeed somewhere else.

Next steps

Print every letter or email from the banks. Complete the FTC report and use it if you need to file a police report. Review your ChexSystems and Early Warning reports and add freezes where possible so your identity becomes less useful to criminals.

Kurt’s key takeaways

Deposit account fraud feels confusing because it works outside traditional credit systems. Yet the goal is simple. Criminals want to see which stolen identities pass early checks so they can launch larger attacks later. A few fast steps can shut that door and give you control again.

What other questions do you want us to tackle about identity theft and online banking safety? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved.



Source link

Study links early smartphone use to depression, obesity in kids under 12

0


NEWYou can now listen to Fox News articles!

Parents everywhere wrestle with one big question. What is the right age to let a child have a smartphone?

Tweens ask for one long before many adults feel ready. At the same time, researchers keep sounding alarms about how early access may shape health and behavior. Now, a large new study gives parents even more to think about.

Published in Pediatrics, the research tracked more than 10,500 children in the national Adolescent Brain Cognitive Development Study. It found strong links between early smartphone ownership and higher odds of depression, obesity and insufficient sleep by age 12. The earlier kids got a phone, the greater their risk.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

What the study reveals about early smartphone ownership

The study compared 12-year-olds who owned smartphones with those who did not. Kids with phones were more likely to show signs of depression, carry extra weight and sleep less than their peers without devices. Researchers noted that these patterns held even after accounting for income, neighborhood, parental monitoring and other factors.

TEENS TURNING TO AI FOR LOVE AND COMFORT

A boy holds a smartphone horizontally.

Parents can lower these risks by delaying devices, setting limits and keeping phones out of bedrooms at night. (Kurt “CyberGuy” Knutsson)

They also looked at children who still did not own a phone at age 12. One year later, those who had finally received one showed more mental health concerns and worse sleep than those who still did not have a device. These shifts happened quickly, which raised concerns about how powerful the change can be.

Lead author Dr Ran Barzilay explained that parents should treat the decision like a real health milestone. A device changes how kids sleep, move and socialize. That combination may create more strain for a 12-year-old than for a 16-year-old who has more maturity and self-regulation.

Why age matters more than many parents expect

The research shows an association, not a direct cause. Yet the patterns match earlier findings. Kids with smartphones often stay up later, scroll more and move less. That mix can disrupt physical health and emotional well-being. Adolescence is a sensitive stage when small shifts in sleep or mood can have long-lasting effects.

Experts also pointed out how nearly every teen now has smartphone access. That makes the decision even harder for families who want to delay. Still, researchers say the data is strong enough to guide parents toward waiting when possible. Parents do not need perfect evidence to choose a slower timeline.

Pediatric mental health experts warn that a smartphone is not a simple tool. It opens the entire internet with no natural limits. Families need clear rules and protections and those steps require real work from adults. Many parents feel pressure to hand over a device early, yet the expert urged families to trust their instincts when deciding the timing.

The sleep connection families cannot ignore

Most experts agree that phones disrupt sleep. A large share of preteens keep devices in their bedrooms, which leads to late-night scrolling and overnight notifications. Even the glow of the screen can make it harder to fall asleep.

Researchers who study adolescent sleep and screen habits have found that many 11 to 12-year-olds keep devices within reach at night, and a notable share report being awakened by notifications. Experts in this field urge parents to move phones out of bedrooms overnight because better sleep can reduce some of the risks tied to early smartphone access.

EVEN THE FUTURE KING DISCOVERS SMARTPHONES ARE A ROYAL PAIN FOR KIDS AND PARENTS

Boy looks at an iPhone

Researchers found that kids who got phones sooner showed more mental health strain within a year. (Matt Cardy/Getty Images)

The challenge is consistency. Many parents struggle to set rules when screens support school work, friendships and safety. Yet researchers stress that even one boundary, like no phones in bedrooms, can protect sleep and reduce stress.

How parents can use this information right now

No one wants to shame parents who already gave their kids a phone. Many families made the decision for safety or communication needs. The study does not claim that every early smartphone user will face health issues. It simply highlights patterns worth considering before making the call. Parents can use these insights to create a healthier plan.

1) Delay smartphones until children show readiness

Readiness is more than age. Look for consistent responsibility with chores, schoolwork and device-free rules on other screens.

2) Set clear family rules for screen time

Kids follow rules when they understand why they exist. Set limits that work for your household and adjust them as schedules and needs change.

3) Keep devices out of bedrooms at night

Nighttime use and notifications interrupt sleep. A “charging station” in the kitchen or living room solves this fast.

4) Talk often about online safety and emotional well-being

Short regular check-ins work better than one long conversation. Keep the tone open and supportive.

5) Use parental controls and app limits

Cell phones give parents straightforward tools to manage what kids can see and when they can use their devices.

TEENS FACE NEW PG-13 LIMITS ON INSTAGRAM

How to set healthy limits on an iPhone 

Set downtime

  • Open Settings
  • Tap Screen Time
  • Select Downtime
  • Toggle on Scheduled 
  • Scroll down and set a schedule where only essential apps are allowed

Use app limits

  • Go to Settings
  • Tap Screen Time
  • Select App Limits
  • Tap Add limit to set daily time limits for social apps, videos and games
  • Click Next and set the Time and Customize Days
  • Click the Check Mark in the upper right-hand corner

Restrict adult content

  • Open Settings
  • Tap Screen Time
  • Select Content & Privacy Restrictions
  • Turn on Content & Privacy Restrictions
  • Tap App Store, Media, Web & Games
  • Select Web Content
  • Select Limit Adult Websites

How to set healthy limits on Android 

Set digital wellbeing limits

Settings may vary depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Digital Wellbeing & parental controls
  • Select Dashboard
  • Choose an app
  • Tap App Timer and set a daily limit

Enable Google Family Link

Settings may vary depending on your Android phone’s manufacturer

  • Open the Family Link app on the parent device
  • Add your child’s Google account
  • Set app approvals
  • Restrict content through Filters on Google Play
  • Enable location and activity reports

Turn on SafeSearch (blocks explicit results in Google Search)

Settings may vary depending on your Android phone’s manufacturer

  • Open the Google app or go to google.com
  • Tap your profile photo
  • Select Settings
  • Tap SafeSearch
  • Turn on Filter explicit results

Strengthen browser protection in Chrome

Settings may vary depending on your Android phone’s manufacturer

  • Open Chrome
  • Tap the three dots
  • Select Settings
  • Tap Privacy and security
  • Select Safe Browsing
  • Choose Enhanced protection
  • Click the Left arrow to exit.

Experts who study youth mental health stress that the point is not fear. It is preparation. Thoughtful rules, controlled access and earlier boundaries can reduce risks associated with early smartphone ownership. Small changes make a big difference when kids are still developing the habits that shape their health.

Pro tip: Add device protection

Kids download apps, click links and explore online spaces that can expose them to harmful content or scams. Strong antivirus software adds an extra layer of protection by blocking risky sites and unsafe downloads. It helps keep their device safer while you work on healthy screen habits.

The best way to safeguard your kids’ devices from malicious links that install malware, potentially accessing their private information, is to have strong antivirus software installed on all their devices. This protection can also alert them to phishing emails and ransomware scams, keeping their personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your kids’ Windows, Mac, Android and iOS devices at Cyberguy.com.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Smartphones bring connection, opportunity and convenience. They also introduce stress distraction and real health challenges for younger users. Research keeps showing that age matters. A 12-year-old may not be built for the same digital world that a 16-year-old can handle with more confidence and self-control. Families do not need guilt. They need facts and support so they can choose what fits their values. As more data arrives, the message grows clearer. Slowing down may give kids the best chance to thrive online and off.

At what age do you think is right for a first smartphone? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved.  



Source link