3.3 C
New York
Friday, February 13, 2026
Home Blog Page 45

Saudi Arabia releases U.S. citizen after 4 years following Trump meeting

0

NEWYou can now listen to Fox News articles!

A U.S. citizen jailed in Saudi Arabia for criticizing the royal family online was freed Wednesday by Saudi authorities, ending a four-year ordeal in the country, according to media reports.

Saad Almadi’s release came just a day after President Donald Trump met with Crown Prince Mohammed bin Salman in Washington, D.C., per the New York Post.

Almadi, 75, a retired engineer and U.S. resident since 1976, was detained in 2021 during a family visit to Riyadh and later sentenced to more than 19 years in prison on terrorism charges tied to a series of posts online.

US AND QATAR SECURE RELEASE OF AMERICAN CITIZEN AMIR AMIRY FROM AFGHANISTAN DETENTION

President Donald Trump walks with Saudi Crown Prince Mohammed bin Salman during an official state arrival ceremony at the Saudi Royal Court on May 13, 2025, in Riyadh, Saudi Arabia (Win McNamee/Getty Images)

The charges were reduced to cyber crimes, and although he was released from prison in 2023, Almadi was held in the country under an exit ban which prevented him from going back home to the U.S.

The Almadi family issued a statement Wednesday celebrating the good news and thanking Trump.

“Our family is overjoyed that, after four long years, our father, Saad Almadi, is finally on his way home to the United States!” they said.

“This day would not have been possible without President Donald Trump and the tireless efforts of his administration. We are deeply grateful to Dr. Sebastian Gorka and the team at the National Security Council, as well as everyone at the State Department.”

TRUMP DESIGNATES SAUDI ARABIA AS MAJOR NON-NATO ALLY DURING CROWN PRINCE WHITE HOUSE VISIT

A third portion of the statement expressed appreciation to others who had supported the case over the years.

“We extend our thanks to the U.S. Embassy in Riyadh for keeping our father safe, and to the nonprofit organizations and members of Congress who fought for his freedom,” the statement read.

Almadi’s case also drew attention from human rights groups and U.S. lawmakers after he was accused of terrorism over 14 social media posts.

SAUDI ARABIA’S 40-YEAR-OLD DISRUPTOR: HOW MBS REWIRED THE KINGDOM IN 10 SHORT YEARS

One suggested that a street in Washington be renamed after Jamal Khashoggi, who was murdered in the Saudi Consulate in Istanbul in 2018.

U.S. pressure to lift Almadi’s exit ban had also intensified since Trump’s May visit to Saudi Arabia.

The president’s national security advisor, Sebastian Gorka, also met with Almadi’s son at the White House.

Sebastian Gorka

Sebastian Gorka at the 2024 Mom’s for Liberty National Summit in Washington D.C., Friday, August 30, 2024. (DOMINIC GWINN/Middle East Images/AFP via Getty Images)

The Foley Foundation, which advocates for Americans detained overseas, praised the news Wednesday, saying it was “so excited” the family’s fight had finally succeeded.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Per reports, Almadi was flying to the U.S. from Riyadh on Wednesday, according to his family, after Trump and the crown prince set foot on stage at a forum in Washington.

Fox News Digital has reached out to Sebastian Gorka, the Department of State and The White House for comment.

NASA’s Perseverance discovers potential meteorite Phippsaksla on Mars

0


NEWYou can now listen to Fox News articles!

NASA’s Perseverance rover may have stumbled on a visitor from outer space – a strange, shiny rock on Mars that scientists think could be a meteorite forged in the heart of an ancient asteroid.

According to a new blog post on the rover’s mission page, the rock – nicknamed “Phippsaksla” – stood out from the flat, broken terrain around it, prompting NASA scientists to take a closer look.

Tests revealed high levels of iron and nickel, the same elements found in meteorites that have crashed onto both Mars and Earth.

While this isn’t the first time a rover has spotted a metallic rock on Mars, it could be the first for Perseverance. Earlier missions – including Curiosity, Opportunity, and Spirit – discovered iron-nickel meteorites scattered across the Martian surface, making it all the more surprising that Perseverance hadn’t seen one until now, NASA said.

MASSIVE ASTEROID BIGGER THAN A SKYSCRAPER HEADING TOWARD EARTH AT 24,000 MPH

NASA Perseverance Rover

NASA’s Perseverance rover discovered a shiny metallic rock that scientists believe could be a meteorite forged in the heart of an ancient asteroid. (NASA via Getty Images)

Now, just beyond the crater’s rim, the rover may have finally found one – a metallic rock perched on ancient impact-formed bedrock. If confirmed, the discovery would place Perseverance alongside the other Mars rovers that have examined fragments of cosmic visitors to the red planet.

To learn more about the rock, the team aimed Perseverance’s SuperCam – an instrument that fires a laser to analyze a target’s chemical makeup – at Phippsaksla. The readings showed unusually high levels of iron and nickel, a combination NASA said strongly suggests a meteorite origin.

Mounted atop the rover’s mast, SuperCam uses its laser to vaporize tiny bits of material, so sensors can detect the elements inside from several meters away.

SCIENTISTS SPOT SKYSCRAPER-SIZED ASTEROID RACING THROUGH SOLAR SYSTEM

NASA Perseverance discovers possible meteorite on Mars

The shiny rock nicknamed “Phippsaksla,” discovered by NASA’s Perseverance rover, showed high levels of iron and nickel consistent with meteorites found on Mars and Earth. (NASA)

The finding is significant, NASA noted, because iron and nickel are typically found together only in meteorites formed deep within ancient asteroids – not in native Martian rocks.

If confirmed, Phippsaksla would join a long list of meteorites identified by earlier missions, including Curiosity’s “Lebanon” and “Cacao” finds, as well as metallic fragments spotted by Opportunity and Spirit. NASA said each discovery has helped scientists better understand how meteorites interact with the Martian surface over time.

Because Phippsaksla sits atop impact-formed bedrock outside Jezero crater, NASA scientists said its location could offer clues about how the rock formed and how it ended up there.

MASSIVE COMET ZOOMING THROUGH SOLAR SYSTEM COULD BE ALIEN TECHNOLOGY, HARVARD ASTROPHYSICIST SAYS

NASA Perseverance discovers possible meteorite on Mars

NASA scientists say the metallic rock spotted by Perseverance may be a meteorite formed deep within an ancient asteroid before crashing onto Mars. (NASA)

For now, the agency said its team is continuing to study Phippsaksla’s unusual makeup to confirm whether it truly came from beyond Mars.

If proven to be a meteorite, the find would mark a long-awaited milestone for Perseverance – and another reminder that even on a planet 140 million miles away, there are still surprises waiting in the dust.

Perseverance, NASA’s most advanced robot to date, traveled 293 million miles to reach Mars after launching on a United Launch Alliance Atlas V rocket from Cape Canaveral Space Station in Florida on July 30, 2020. It touched down in Jezero crater on Feb. 18, 2021, where it has spent nearly four years searching for signs of ancient microbial life and exploring the planet’s surface.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Built at NASA’s Jet Propulsion Laboratory in Pasadena, California, the $2.7 billion rover is about 10 feet long, 9 feet wide, and 7 feet tall – roughly 278 pounds heavier than its predecessor, Curiosity. 

Powered by a plutonium generator, Perseverance carries seven scientific instruments, a seven-foot robotic arm, and a rock drill that allows it to collect samples that could one day return to Earth.

 The mission will also help NASA prepare for future human exploration of Mars in the 2030s.



Source link

Holiday scams spike during Black Friday as scammers target shoppers

0


NEWYou can now listen to Fox News articles!

The holiday season is the happiest and riskiest time of year to be online. As millions of us gear up for Black Friday and Cyber Monday deals, scammers do the same.

Every year, they target holiday shoppers with fake websites, “too-good-to-be-true” deals and scam emails that look identical to legitimate retailers. But here’s the part most people miss: scammers don’t just rely on luck. They already have your personal data before you even click “add to cart.”

From leaked email addresses to exposed phone numbers and home addresses, your personal information is being bought and sold by data brokers, companies that collect and resell detailed profiles about you. Those profiles are exactly what scammers use to send realistic “order confirmations,” fake delivery alerts and “urgent payment” texts during this holiday period and beyond.

Let’s unpack how this works and what you can do now to stay safe before the holiday chaos begins.

RETIREES LOSE MILLIONS TO FAKE HOLIDAY CHARITIES AS SCAMMERS EXPLOIT SEASONAL GENEROSITY

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Christmas Decoration Shopping

Scammers ramp up fake websites and emails during the holiday shopping rush. (iStock)

Why scammers love the holiday season

November through December is a goldmine for cybercriminals. According to the CISA, reports of online shopping scams spike during this time of year and vary in their approaches. The reason? We let our guard down when we’re rushed, distracted or excited by a deal. Staying alert during the holiday season can help you avoid data exposure and financial losses. Here are some of the most common scams you should be aware of. 

Phantom stores

The surge of promotions during the holiday season is the perfect time for “phantom stores” to thrive. It’s a fraudulent store that mimics the interface and products of a well-known brand. Once you purchase from such a website, you’ll never receive your order as the store doesn’t actually exist.

Real-world example: Fake IKEA websites appeared with URLs spelled “ikeaa-sale.com” and “ikea-blackfriday.shop,” mimicking the official ikea.com interface with copied product images, logos and discount banners.

They lured shoppers with huge discounts and clearance offers to steal credit card data. Eventually, they were reported and taken down, but the damage has been done.

What to do? Always check the URL of the store you shop at and only click links from the store’s official website or social media.

Delivery scams

According to recent research, some of the most popular shopping apps like Temu are selling your location data to third parties. It’s no surprise that you might receive fake delivery texts.

man rating his experience on the app after ordering food to his house

Your leaked data fuels realistic “order” and “delivery” scams online. (iStock)

MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH

Real-world example: Temu is a popular app for scammers to mimic. They can easily find your contact information and order details to text “Your order couldn’t be delivered.” Each text contains a phishing link that can install malware on your device or steal your personal information. That’s why Temu warns its users about the couriers they partner with.

What to do? Make sure the texts you receive come from a legit courier service and double-check it on the store’s website.

Fake order emails

Some scammers use sophisticated phishing tactics to lure victims. They engineer emails from well-known brands, use an urgent tone, place malicious links and urge you to click on your order status. In reality, there is no order status – they’re stealing your data.

Real-world example: Amazon is one of the biggest online retailers worldwide, and that makes the brand easy to mimic. Scammers send emails on behalf of Amazon to try to steal customers’ personal data because it’s highly likely that their victims have used Amazon, making it less suspicious. However, phishing emails have some telltale signs you can look out for.

What to do? Never click on any suspicious links and always check the sender’s contact information.

Unwanted data exposure

When you shop online, you should be aware of the data you share, including your contact information, shopping habits, credit card details and more. All stores collect some type of data about you. However, some companies collect more than you think.

Real-world example: The infamous Target controversy in 2012 revealed how big retailers use data analysis to predict your shopping behavior. The company collected shopping data and managed to produce a predictive model for soon-to-be mothers.

They sent out brochures with baby clothes, vouchers for baby formula and more before the customers even knew they were pregnant. Thankfully, modern shopping looks a bit different. You can opt out of certain data collection and exercise your right to remove personal information from websites that collect it.

What to do? Check what data the stores collect about you and request the removal of any private information you don’t want them to have.

THE TRUTH BEHIND THOSE MYSTERIOUS SHIPMENT EMAILS IN YOUR INBOX

How scammers find you

Imagine you’re browsing for gifts online. Within minutes, your activity generates data points – device info, IP address, browsing habits that feed into online databases. At the same time, data brokers already have your full profile: age, income, address history, family members and even shopping behavior. These profiles are sold to marketers and often leak into criminal databases.

That’s why scam calls, texts and emails often feel so “real.” They use your name, the right retailer, even your city. They’re not guessing. They’ve bought your digital footprint.

The “holiday cleanup” your data needs

Most people clear their browser cookies or delete old emails to “stay private.” But that’s like locking your front door while leaving all your personal documents on the lawn.

If you want to stop scammers from targeting you this holiday season, you need to remove your personal data from the source, the data broker databases that feed these scams.

That’s where a data removal service comes in. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Practical steps before you shop

To make sure your online shopping season stays stress-free and scam-free, here’s what CyberGuy recommends doing this week:

INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU

1) Run a privacy scan with a data removal service

Before the holiday rush, remove your exposed data from data brokers. You’ll reduce the number of scam calls, emails and texts you get this season and protect your financial info before it’s too late.

man holding credit card and on laptop

Take control by removing personal data from broker databases before you shop. (iStock)

2) Secure your email

Use strong, unique passwords for each online store or service. Consider a password manager to simplify this.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

3) Check for fake stores

Before clicking a social media ad or email, hover over the link. Legit retailers use secure “https://” URLs and their exact brand name – no extra words or letters.

4) Avoid public Wi-Fi

Don’t shop or enter payment info over public Wi-Fi in an airport, café or mall, for example. Scammers can easily intercept unencrypted traffic.

5) Use credit cards or PayPal – not debit cards

HACKERS TARGET ONLINE STORES WITH NEW ATTACK

Credit cards have stronger fraud protection and make it easier to dispute unauthorized charges.

6) Enable two-factor authentication (2FA)

Turn on 2FA for your email, bank and shopping accounts. Even if scammers get your password, they can’t log in without your second verification step.

7) Keep your software and apps updated

Cybercriminals often exploit outdated browsers or apps. Update your phone, computer and shopping apps before the holiday rush to close those security holes.

8) Monitor your bank and credit statements

Check your accounts daily during the shopping season. The faster you spot a suspicious charge, the easier it is to reverse and protect your funds.

Kurt’s key takeaways

Black Friday through Cyber Monday is the peak time for data harvesting. Every purchase, coupon code and sign-up adds to the profile that marketers and data brokers hold on you. That information can linger online for years, long after the sales end. The good news? It’s easier than ever to reclaim your privacy. By taking just a few minutes today, you can enjoy the holidays knowing your personal data is no longer on the open market.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

How confident are you that your personal data isn’t already fueling a scam this holiday season? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved.  



Source link

The Louvre museum is adding 100 cameras following the theft of $102 million in jewels

0

NEWYou can now listen to Fox News articles!

Following the recent heist at the Louvre in Paris, officials have announced stricter security measures, along with new insights into how the thieves successfully robbed the world’s most visited museum.

Louvre director Laurence des Cars shared the changes and new details with the Committee of Cultural Affairs of the National Assembly on Wednesday, according to The Associated Press.

Des Cars said the power tools used by robbers to cut through the display cases were disc cutters made to cut concrete.

LOUVRE HEIST IN BROAD DAYLIGHT AMID APPARENT SECURITY LAPSES PUTS GLOBAL MUSEUMS ON ALERT

In 2019, display cases had been replaced to protect against weapon attacks within the museum, but the disc-cutting method “had not been imagined at all,” said des Cars.

“Videos show how difficult it was for the thieves,” she said. She added that the display cases “held up remarkably well and did not break apart.”

Thieves connected to the October Louvre heist used disc cutters to steal $102 million in jewels. (AP Photo/Thibault Camus)

On Oct. 19, a four-person team broke into the Apollo Gallery in broad daylight and stole eight jewels valued collectively at 88 million euros ($102 million).

About 100 hundred cameras will be installed by the end of 2026, while anti-intrusion systems will be running within the next two weeks, the museum said.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

“After the shock, after the emotion, after the assessment, it’s time for action,” said des Cars.

She said the new surveillance cameras will guarantee “complete protection of the museum’s surroundings.”

Police car parked outside Louvre Museum

On Oct. 19, a four-person team broke into the Apollo Gallery in broad daylight and stole eight jewels valued collectively at $102 million. (AP Photo/Thomas Padilla)

The new measures are a part of over 20 new emergency measures, including the establishment of the new role of “security coordinator.”

CLICK HERE FOR MORE LIFESTYLE STORIES

Fox News Digital previously contacted the Louvre to ask whether the heist will affect its security measures, but the museum said it does not “discuss security matters.”

louvre museum building

About 100 hundred cameras will be installed by the end of 2026, while anti-intrusion systems will be running within the next two weeks. (Thibault Camus : AP)

“The extensive modernization that the Louvre underwent in the 1980s is now technically obsolete, with equipment that has been overperforming for 40 years,” des Cars said.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

The “Louvre New Renaissance,” launched this year, will narrow in on easing crowding by modernizing infrastructure.

CLICK HERE TO GET THE FOX NEWS APP

The Associated Press contributed to this report. 

Strategies For Combating Shopping Cart Abandonment

0

Latest Blog from RPR Comando: “Strategies For Combating Shopping Cart Abandonment”. Picture this: you’ve carefully crafted the perfect online store, filled it with amazing products, and set everything up for a seamless shopping experience. But just as customers are ready to check out… they disappear! Shopping cart abandonment is a common hurdle faced by e-commerce businesses. #BookMarketing #VideoShorts #PressReleaseMarketing #RPRComando  
This article originally appeared on https://rprcomando.com/strategies-for-combating-shopping-cart-abandonment/

Is This The Head of Your PR Department 1
Strategies For Combating Shopping Cart Abandonment 20

Commerce Department proposes TP-Link ban over China security risks

0


NEWYou can now listen to Fox News articles!

A major national security debate is unfolding, and it affects more than government networks. It touches your home, your devices, and the Wi-Fi your family uses every day. The Commerce Department has proposed blocking new sales of TP-Link products after a months-long review into the company’s ties to China, citing a growing TP-Link security risk.

Multiple agencies, including Homeland Security and Defense, supported that proposal. They believe the company’s connections could expose American networks to foreign influence.

Security experts warn that foreign-backed hackers have targeted home and office routers for years. These devices often act as silent stepping stones that help attackers move deeper into sensitive systems. When compromised, they can expose everything connected to them, including computers, smart home gear, military devices used on base and more.

This potential ban would be one of the biggest consumer tech actions in U.S. history. It comes as lawmakers raise fresh alarms about Chinese-made cameras, routers and connected home products sold on military exchanges and in homes across the country.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

CHINESE HACKERS BREACH US NUCLEAR SECURITY AGENCY IN CYBERATTACK OPERATION, OFFICIALS SAY

Close-up of a Wi-Fi router showing Ethernet ports and connected network cables.

The proposed TP-Link ban stems from growing concerns that foreign-linked routers and cameras could expose American homes and networks to outside influence. (Kurt “CyberGuy” Knutsson)

Why military families are even more vulnerable

Lawmakers from both parties say military households face extra risk. Sen. Joni Ernst (R-Iowa), who leads a bipartisan group of 23 lawmakers, warns that TP-Link cameras and networking devices sold on Army, Navy and Air Force exchange sites could expose sensitive footage from base housing and dorms. Rep. Ashley Hinson (R-Iowa) echoed that concern, saying these devices could act as a backdoor for Chinese intelligence to collect information on service members and their families. Even when products appear out of stock, officials worry they remain popular in military communities.

These lawmakers say Chinese laws could force companies to share data or push hidden software changes that weaken U.S. networks. They argue that this creates a real risk for households on or near military installations. While TP-Link disputes every allegation and states that it stores U.S. data inside America, lawmakers want a deeper investigation.

“China will use any way to infiltrate us, and we must ensure they cannot access our homeland or military bases,” said Ernst.”High-tech security cameras sending video and audio directly back to Beijing must be treated like the grave threat that they are. We have seen this playbook from China before, with Huawei Technologies, and need the Trump administration to investigate and determine if TP-Link is a trojan horse compromising our national security.”

10M AMERICANS HIT IN GOVERNMENT CONTRACTOR DATA BREACH

How Congress is responding to TP-Link security risks

Sen. Ernst is pressing the Commerce Department to finish its investigation by November 30. Sen. Tom Cotton (R-Arkansas), who chairs the Senate Intelligence Committee, says TP-Link could give the Chinese government access to American networks and wants faster action. Their concerns reflect past decisions involving Huawei and Kaspersky, which lost access to the U.S. market due to national security risks.

Congressional leaders say foreign-made smart home devices sold on military bases should face strict scrutiny. They see routers, cameras and other connected home gear as critical targets in a time when cyberthreats continue to grow.

We reached out to TP-Link Systems Inc., and a spokesperson provided CyberGuy with the following statement:

“TP-Link Systems Inc. (TP-Link), an American company based in California, refutes the claims in this letter. This letter repeats false and misleading media reports and attacks that have been thoroughly debunked.

TP-Link emphatically objects to any allegation it is tied to the Communist Party of China, dependent on the Chinese government, or otherwise subject to interference under Chinese national security laws. The company is not controlled by any government, foreign or domestic. TP-Link has split from and has no affiliation with the China-based TP-LINK Technologies Co. Ltd., which is separately owned and operated.

A child walks next to a soldier.

Lawmakers warn that TP-Link devices sold on military bases may put service members and their families at greater risk, especially inside base housing. (John Moore/Getty Images)

This letter has nothing to do with security and everything to do with a competitor trying to remove TP-Link Systems’ products from the marketplace. The “open source information” the members reference is actually a manufactured echo chamber of false and misleading attacks that the media has parroted over the past year. Instead of directly engaging with TP-Link Systems, these members essentially pressed “copy and paste” on unsubstantiated claims about our American company.

TP-Link has not been contacted by policymakers to discuss the alleged concerns, but if we were to meet with them, they would learn that TP-Link has located its core security functions and data infrastructure in the United States. U.S. user data is securely stored on Amazon Web Services infrastructure in Virginia, under the full control of the company’s U.S. operations.

TP-Link Systems currently holds a very small share of the U.S. security camera market, representing approximately 3% of the consumer market segment according to Circana checkout data. The company has virtually no business presence in the enterprise segment. Additionally, TP-Link Systems’ router market share in the U.S. has been inaccurately reported as being much higher than it actually is. Recent market research from Dell’Oro Group, Inc., found that TP-Link Systems’ market share of residential Wi-Fi router sales in North America is under 10%.

TP-Link does not enable foreign surveillance of U.S. networks or users. The company’s operations are built to prevent potential attempts to subvert its business by outside influence. TP-Link’s substantial security investments cover its entire product portfolio, including security cameras and routers.

TP-Link continually monitors its products and services and takes timely and appropriate action to address vulnerabilities it becomes aware of. TP-Link has not identified any reliable information regarding new vulnerabilities in its products in connection with this letter.”

FBI WARNS OF HACKERS EXPLOITING OUTDATED ROUTERS. CHECK YOURS NOW

Steps to protect yourself from this growing threat

Even as the debate continues, you can take simple steps to secure your home. These easy moves help defend against threats tied to any router brand.

1) Check your router and update it

Look at the brand on your router. Then update the firmware through the official app or web dashboard. If your device is several years old or no longer supported, replace it. Check out our article on the top routers for the best security at Cyberguy.com.

2) Change your Wi-Fi and admin passwords

Default passwords are dangerous. Create strong, unique passwords for both your Wi-Fi and the router’s admin panel. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2025 atCyberguy.com

Wifi router

Congress is pressing for a fast investigation amid fears that foreign-made smart home gear could become a gateway for cyberthreats across the country. (Cyberguy.com)

3) Use strong antivirus protection on every device

Threats like this continue to grow. Install strong, real-time antivirus protection on every computer, phone, and tablet in your home. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

4) Turn off any of these features you do not need

Disable remote access, WPS and extra features you never use. These settings can open doors for attackers.

5) Put smart home devices on a guest network

Keep laptops and phones on your main network. Put cameras, plugs, TVs and IoT devices on a separate guest network so they cannot reach your sensitive devices.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

The debate around TP-Link shows how something as routine as a home router can become part of a broader security conversation. Whether or not the government issues a ban, this moment is a clear reminder that cybersecurity starts at home. Small steps make a meaningful difference in how well your devices stand up against foreign-backed hacking groups.

Should the government ban router brands linked to foreign influence or should consumers decide for themselves? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved.



Source link

Newly unsealed Amelia Earhart disappearance documents now made public

0

NEWYou can now listen to Fox News articles!

Newly unsealed government records related to famed American aviator Amelia Earhart have been made public.

The U.S. National Archives released 4,624 pages related to the disappearance of Earhart on the Electra on Friday.

A variety of documents detail Earhart’s last known communications, maps, tables and logs.

AMELIA EARHART MYSTERY EXPEDITION HALTED AS RESEARCHERS SEEK ANSWERS ON MISSING PLANE

Her last communication was documented on July 2, 1937, the day of her disappearance over the Pacific. It reads, “We are on the line 157 337 wl rept msg we wl rept…”

Among the documents released is the U.S. Navy Report of the Search for Amelia Earhart from 1937.

Government officials made previously unseen records related to Amelia Earhart public this past Friday. (Miami Herald/Tribune News Service via Getty Images)

The report began immediately after Earhart’s last transmission; it spanned 16 days, until July 18, 1937.

Earhart’s last confirmed radio transmission was reaffirmed in the report at 1912 GMT near 157° east longitude, 337° south latitude.

Four distinct areas were noted as potential landing sites. 

The report details the search by USS Colorado and USS Lexington that covered nearly 250,000 square miles of the Pacific. PBY-1 seaplanes, meanwhile, searched a 25,000-square-mile region of the ocean daily.

TRUMP VOWS TO ORDER DECLASSIFICATION OF ALL AMELIA EARHART FILES AFTER NEARLY 90-YEAR AVIATION MYSTERY

Four distinct areas were noted as potential landing sites, along with speculation notes.

McKean Island was mentioned as having a “recent disturbance of guano surface,” while Gardner Island (Nikumaroro) showed “signs of habitation or fire marks.”

Pilot Amelia Earhart poses for a portrait in and airplane in circa 1936.

The published National Archives documents include Navy search reports and Earhart’s final radio communications on July 2, 1937. (Library of Congress/Getty Images)

Purdue University recently delayed an expedition to search for Amelia Earhart’s missing plane in Nikumaroro to next year, due to issues with permits, as well as hurricane season concerns.

McKean Reef contained “unusual debris,” while the search team saw a “dark object, possibly wreckage,” at Sydney Island Lagoon.

A section of the Navy report notes there were seven credible distress signals detected between July 2 and July 6.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Two were logged near Gardner Island — in support of the Nikumaroro theory.

Lockheed Electra performance charts show the Navy recalculated Earhart’s fuel endurance at 20 hours and 13 minutes.

Amelia Earhart standing in front of plane

Lockheed Electra performance charts show the Navy recalculated Earhart’s fuel endurance at 20 hours and 13 minutes. (U.S. National Archives)

Under this calculation, her expected flight time was extended by nearly 40 minutes beyond the initial Coast Guard estimate, speculating that Earhart could have passed Howland.

The report also reaffirmed that the Navy found no confirmed aircraft debris. 

It stated, “No evidence of aircraft remains was discovered within the search radius.”

Navy’s request

A memo dated Nov. 18, 1936, also shows the Navy’s request to assist in refueling Earhart’s airplane ahead of her planned world flight in 1937.

CLICK HERE FOR MORE LIFESTYLE STORIES

“The Navy Department will cooperate in refueling the airplane of Miss Amelia Earhart … at Midway Island, and undertake such other operations as are required to prepare for and carry out this task,” it reads.

In addition, various documents show that Earhart’s husband, George Putnam, was also her manager. He communicated with the Navy on matters of the trip.

navy cable authorizing refuel of amelia earharts airplane on midway island

A memo dated Nov. 18, 1936, shows the Navy’s desire to assist in refueling Earhart’s airplane. (U.S. National Archives )

The Navy was not funding Earhart’s trip, but it was authorized to assist with logistical aid.

Another document shows a translated diplomatic letter from Japan after Earhart’s disappearance.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

“Japan wishes to express her most profound condolences for the Earhart tragedy,” the message says.

“She does so on behalf of both the government and the people.”

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

It continues, “The South Seas Islands Government Office has ordered all ships, stations and sentinels near the Marshall Islands, the suspected scene of the accident, to give every possible assistance in discovering the lost plane.”

Director of National Intelligence Tulsi Gabbard announced the release of the Earhart documents on X. She added that as agencies identify additional files, those documents will be released on a rolling basis.

“Delivering on President [Donald] Trump’s promise, the release of the Amelia Earhart files will shine light on the disappearance of a beloved American aviator who has been at the center of public inquisition for decades,” she said in a statement last week.

UC Berkeley’s free speech legacy shattered by Antifa violence and inaction

0

NEWYou can now listen to Fox News articles!

The University of California at Berkeley was once famed as the birth of America’s modern free speech movement in 1964, led by graduate student Mario Savio. But, that legacy has been marred by successive incidents and policies at the university antithetical to our First Amendment ideals. The growing trend of left-wing violence targeting free speech in America was on full display this week when Antifa thugs crashed a peaceful Turning Point USA event at UC Berkeley. The mob attacked attendees and vandalized university property in its attempt to oust Turning Point from the event space. Police made only a few arrests.

University organizers did little to protect students or the public, despite being on notice of similar incidents of organized violence in the past. They are also accused of interfering with ticketed access to the event featuring Christian comedian Rob Schneider. Berkeley’s legacy as a bastion of free speech is in tatters, stained with the blood of event attendees who came in good faith and were beaten and attacked by a vicious, organized mob while Berkeley police and campus administrators did little to stop the carnage.

Before the event, it was reported that the campus was littered with flyers promising violence against the Turning Point event, and the violent groups that are well known to the campus and the city openly took credit for their desired goals. This is a feature that has become all-too common among radical left-wing groups embracing violence as a tool to achieve political outcomes. Broadcasting their aims to silence their perceived opponents — the classic “heckler’s veto” but with a twist — the Antifa hecklers are now armed and prepared to wreak mayhem.

CALIFORNIA WOMAN CHARGED IN CONNECTION WITH DISRUPTING APRIL TURNING POINT USA EVENT ON A COLLEGE CAMPUS

It’s for this very reason that President Donald Trump issued an executive order earlier this year designating Antifa a terrorist organization, and Attorney General Pam Bondi is vigorously enforcing this directive. What we saw at Berkeley only reinforces the need for a coordinated response to targeted, ideologically motivated violence.

History shows that violence against conservatives is nothing new at UC Berkeley. In 2018, the university settled a lawsuit brought by Young America’s Foundation and the Berkeley College Republicans after it sought to saddle the student groups with exorbitant security costs that were only necessary because many violent leftist students on campus were threatening event safety. I was the attorney who represented the plaintiffs in that case. And as a part of the settlement, UC Berkeley agreed to ensure conservative student groups would be able to exercise their First Amendment rights, just like every other student group on campus. This includes providing adequate security to ensure a mob of protesters can’t disrupt events.

Based on the events of this week, it appears UC Berkeley may not be living up to its end of the deal. Worse, reports of university officials suppressing turnout at the event and not recognizing or admitting certain ticketed attendees, are deeply concerning and merit investigation.

CLICK HERE FOR MORE FOX NEWS OPINION

The number of protesters at a high-profile event requires ample security by the university. The First Amendment demands that a public university provide such protection in an equal and unbiased manner, regardless of the speaker’s viewpoint. This is true even if the need for more security is the result of a hostile environment on campus. Peaceful speakers and those who come to hear them should not be left to shoulder the burden of the university’s failure to foster an accepting, non-violent culture for students.

CLICK HERE TO GET THE FOX NEWS APP

Given the concerning behavior by violent groups on campus and the wholly inadequate response of both the university and the city of Berkeley, the Civil Rights Division, under the leadership and direction of Attorney General Pam Bondi, has opened an investigation to determine if any violations of federal civil rights laws occurred. This includes both acts or omissions by university officials, and any conspiracy by private individuals to violate the civil rights of Turning Point members, its speakers, or its attendees. Any violation of law will be met with swift action. We are coordinating this work with the Joint Terrorism Task Force and other aspects of the DOJ, and may uncover additional claims as we investigate the Antifa coordination, campus violence, and policing failures we saw at Berkeley this week.

UC Berkeley was the birthplace of the free speech movement. But the events of this week confirm that the school still has a problem with left-wing violence. It’s a feature of life on Berkeley’s campus that contradicts the school’s venerable tradition supporting the free exchange of ideas. If UC Berkeley or the California Board of Regents does not get this violence under control, and we continue to witness policing practices in the city of Berkeley that leave innocent Americans at risk based upon their perceived viewpoints, the Justice Department will step in and ensure fidelity to our first principles of free speech on public campuses.

Pope Leo XIV backs U.S. bishops in condemning Trump’s immigration sweeps

0

NEWYou can now listen to Fox News articles!

Pope Leo XIV on Tuesday strongly affirmed U.S. bishops’ message condemning the Trump administration’s immigration sweeps, calling on Americans to listen to the migrants and treat them humanely and with dignity.

The pope was asked about the “special message” the U.S. Conference of Catholic Bishops adopted during their general assembly last week in Baltimore.

The bishops blasted President Donald Trump’s mass deportation agenda and the “vilification” of migrants, expressing concern over the fear and anxiety immigration raids stoking in communities, as well as the denial of pastoral care to migrants in detention centers.

“We are disturbed when we see among our people a climate of fear and anxiety around questions of profiling and immigration enforcement,” the bishops’ statement reads. “We are saddened by the state of contemporary debate and the vilification of immigrants. We are concerned about the conditions in detention centers and the lack of access to pastoral care,” reads the bishops’ statement, which also opposed “the indiscriminate mass deportation of people.”

US CATHOLIC BISHOPS VOTE TO OFFICIALLY PROHIBIT GENDER TRANSITION TREATMENT AT CATHOLIC HOSPITALS

Pope Leo XIV waves to the faithful after a special mass for the Jubilee of the poor, in St. Peter’s Square at The Vatican, Sunday, Nov.16, 2025. (AP)

Leo, the first American pope, said he appreciated the U.S. bishops’ message and encouraged Catholics and all people of goodwill to listen to treat migrants with dignity, even if they are in the country illegally.

“I think we have to look for ways of treating people humanely, treating people with the dignity that they have,” Leo told reporters. “If people are in the United States illegally, there are ways to treat that. There are courts, there’s a system of justice.”

The pope has previously urged local bishops to speak out on social justice concerns. Catholic leaders have been criticizing Trump’s mass deportation plan, as fear of immigration raids has slashed Mass attendance at some parishes.

President Trump listens as Secretary Noem speaks

Catholic leaders have been criticizing Trump’s mass deportation plan, as fear of immigration raids has slashed Mass attendance at some parishes. (Brendan SMIALOWSKI / AFP/Getty Images)

The federal government earlier this year reversed a Biden administration directive prohibiting immigration agents from carrying out raids at sensitive areas such as churches, schools and hospitals.

Leo acknowledged problems with the U.S. migration system, but he emphasized that nobody has argued for the U.S. to have open borders and that every country may choose who can enter and the methods to do so.

“But when people are living good lives, and many of them for 10, 15, 20 years, to treat them in a way that is extremely disrespectful to say the least — and there’s been some violence unfortunately — I think that the bishops have been very clear in what they said,” he told reporters as he left the papal country house south of Rome.

POPE LEO XIV CALLS OUT CHRISTIAN PERSECUTION AMID LATEST MASSACRE OF CIVILIANS IN AFRICAN NATION

ICE agent

The pope said he appreciated the U.S. bishops’ message and encouraged Catholics and all people of goodwill to listen to treat migrants with dignity. (Getty Images)

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

“I would just invite all people in the United States to listen to them,” Leo added.

The bishops’ “special message” was the first time since 2013 they had drafted a single-issue statement at one of their meetings.

The Associated Press contributed to this report.

Hyundai AutoEver America hack exposes 2,000 employee records and data

0


NEWYou can now listen to Fox News articles!

Hyundai AutoEver America discovered on March 1, 2025, that hackers had compromised its systems. Investigators found the intrusion began on February 22 and continued until March 2. 

Hyundai AutoEver America (HAEA) provides IT services for Hyundai Motor America, including systems that support employee operations and certain connected-vehicle technologies. While the company works across Hyundai’s broader ecosystem, this incident did not involve customer or driver data.

According to the statement provided to CyberGuy, the breach was limited to employment-related information tied to Hyundai AutoEver America and Hyundai Motor America. The company confirmed that about 2,000 current and former employees were notified of the incident in late October. HAEA said it immediately alerted law enforcement and hired outside cybersecurity experts to assess the damage.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

A Hyundai steering wheel

Cybercriminals targeted Hyundai AutoEver America’s systems, exposing sensitive data. (Kurt “CyberGuy” Knutsson)

Why this Hyundai AutoEver America breach matters

The exposed data reportedly includes names, Social Security numbers and driver’s license numbers, making this breach far more serious than one involving passwords alone. Experts warn that these details can be used for long-term identity theft and financial fraud. Because Social Security numbers cannot easily be changed, criminals have more time to create fake identities, open fraudulent accounts and launch targeted phishing attacks long after the initial breach.

A red Hyundai automobile

Experts warn that stolen Social Security and driver’s license information could be used for identity theft and fraud. (Kurt “CyberGuy” Knutsson)

Who was affected in the Hyundai AutoEver America data incident

AEA manages select IT systems tied to Hyundai Motor America’s employee operations, along with broader technology functions for Hyundai and Genesis across North America. Its role includes supporting connected-vehicle infrastructure and dealership systems.

According to the company, this incident was limited to employment-related data and primarily affected approximately 2,000 current and former employees of Hyundai AutoEver America and Hyundai Motor America. No customer information or Bluelink driver details were exposed. While some filings reference sensitive data types such as Social Security numbers or driver’s license information, the incident did not involve Hyundai customers or the millions of connected vehicles HAEA supports.. 

Earlier reports suggested that 2.7 million individuals were affected, but Hyundai says that figure is unrelated to the breach. Instead, 2.7 million is the estimated number of connected vehicles that Hyundai AutoEver America helps support across North America. None of that consumer or vehicle data was accessed.

GENESIS PREVIEWS G70 SPORTS SEDAN WITH NEW YORK CONCEPT

Hyundai also clarified that the United States has about 850 Hyundai dealerships and emphasized that the scope of this incident was narrow and contained.

We reached out to HAEA for a comment, and a representative for the company provided Cyberguy with this statement:

“Hyundai AutoEver America, an IT vendor that manages certain Hyundai Motor America employee data systems, experienced an incident to that area of business that impacted employment-related data and primarily affected current and former employees of Hyundai AutoEver America and Hyundai Motor America. Approximately 2,000 primarily current and former employees were notified of the incident. The 2.7 million figure that is cited in many media articles has no relation to the actual security incident. The 2.7 million figure represents the alleged total number of connected vehicles that may be supported by Hyundai AutoEver America across North America. No Hyundai consumer data was exposed, and no Hyundai Motor America customer information or Bluelink driver data was compromised.”

A blue Kia

 — ssssssssScammers may now pose as company representatives, contacting people to steal more personal details.  (Kurt “CyberGuy” Knutsson)

What you should do right now

  • Monitor your bank, credit card and vehicle-related accounts for suspicious activity.
  • Check for a notification letter from Hyundai AutoEver America or your car brand.
  • Enroll in the two years of complimentary credit monitoring offered by HAEA if you qualify.
  • Enable multi-factor authentication (MFA) on all important accounts, including those tied to your vehicle.
  • Be cautious of emails, texts, or calls claiming to be from Hyundai, Kia, or Genesis. Always verify through official websites.

Smart ways to stay safe after the Hyundai AutoEver America breach

Whether you were directly affected or just want to stay alert, this breach is a reminder of how important it is to protect your personal information. Follow these practical steps to keep your data secure and reduce the risk of identity theft or scams.

HYUNDAI TO RECALL GENESIS CARS TO FIX BRAKES

1) Freeze or alert your credit

Contact major credit bureaus — Experian, TransUnion and Equifax — to set a fraud alert or freeze. This helps block new accounts from being opened in your name.

2) Protect your vehicle apps

If you use apps tied to your vehicle, update passwords and enable multi-factor authentication. Avoid saving login details in unsecured places. Also, consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

3) Watch for fake support messages

Scammers may use news of the Hyundai AutoEver America breach as a way to contact Hyundai, Kia, or Genesis owners, pretending to be from customer support or the dealership. They might claim to help verify your account, update your information, or fix a security issue. Do not share personal details or click any links. Type the brand’s web address directly into your browser instead of clicking links in messages or emails. Always confirm through the official brand website or by calling the verified customer service number.

4) Use strong antivirus protection

Using strong antivirus software helps block phishing links, malware downloads and fake websites that might appear after a data breach. It can also scan your devices for hidden threats that may try to steal login data or personal files.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

5) Use a data removal service

Data removal tools automatically find and delete your personal information from people-search and data-broker sites. These services reduce the chances that criminals will use leaked data to target you with phishing or social-engineering scams.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

6) Monitor your digital footprint

Consider using identity monitoring services to track your personal information and detect possible misuse early.

Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

7) Keep your devices updated

Regularly install security updates on your phone, laptop and smart car systems to reduce the risk of further attacks.

8) Report suspicious activity the right way

If you notice unusual account activity, fraudulent charges, or suspicious messages that appear tied to this breach, report it immediately. Start by contacting your bank or credit card provider to freeze or dispute any unauthorized transactions. Then, file a report with the Federal Trade Commission (FTC) at IdentityTheft.gov, where you can create an official recovery plan. If you suspect a scam message or call, forward phishing emails to reportphishing@apwg.org and report fake texts to 7726 (SPAM).

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

This incident highlights how much personal data is connected to modern cars and how vulnerable those systems can be. When your vehicle is linked to your identity, protecting your data becomes just as important as maintaining the car itself. Stay alert, use the tools available to safeguard your accounts and report any suspicious activity right away.

Should companies like Hyundai AutoEver be doing more to keep customer data secure? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link