3.6 C
New York
Saturday, March 7, 2026
Home Blog Page 55

TSA to charge travelers $18 fee if they don’t have proper ID at airports

0

NEWYou can now listen to Fox News articles!

The Transportation Security Administration (TSA) will now charge passengers $18 if they show up at airport checkpoints without an acceptable form of identification, such as a passport or REAL ID.

The enforcement comes as TSA launches a “modernized alternative identity verification program” for travelers who do not have a passport or REAL ID.

“This modernized program provides an alternative that may allow these individuals to gain access to the sterile area of an airport if TSA is able to establish their identity,” says TSA’s published notice.

SHUTDOWN’S IMPACT AT AIRPORTS WILL WORSEN, SAYS TSA — TRAVELERS SHOULD ‘GO EARLY’ AND ‘BE PATIENT’

The fee will cover any “government-incurred costs,” valid for 10-day use.

Participation is not required. However, it is not clear if passengers can still travel without identification.

A new TSA policy charges passengers $18 for alternative ID verification at security checkpoints. (Ronaldo Schemidt/AFP via Getty Images)

“[The] program does not guarantee that an individual’s identity will be verified or that the individual will be provided access to the sterile area of the airport,” reads the notice.

A TSA spokesperson told Fox News Digital in a statement that additional guidance will be announced in the coming days.

CLICK HERE FOR MORE LIFESTYLE STORIES

“This notice serves as a next step in the process [of] REAL ID compliance, which was signed into law more than 20 years ago and finally implemented by Secretary [Kristi] Noem as of May 2025,” said the spokesperson.

Scenes at the airport as REAL ID requirements go into effect

The fee will cover any “government-incurred costs,” and is valid for 10-day use. (Robin Rayne for Fox News Digital)

The spokesperson added, “TSA is working with stakeholders and partners to ensure both security and efficiency at our checkpoints.”

CLICK HERE TO GET THE FOX NEWS APP

The implementation comes as nearly 82 million Americans are projected to travel over the Thanksgiving holiday period, from Nov. 25 to Dec. 1, according to AAA.

Scenes at the airport as REAL ID requirements go into effect

A TSA spokesperson told Fox News Digital in a statement that additional guidance will be announced in the coming days. (Robin Rayne for Fox News Digital)

Of the millions of Americans traveling, six million are expected to fly domestically, for an increase of 2% from last year.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

AAA found that roundtrip domestic flight tickets average $700, which is not a big change from last year.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Flying on Thursday, Thanksgiving Day, is the cheapest — with the Sunday and Monday after the holiday predicted as the busiest, according to AAA.

Arizona truck driver is delivering the Capitol Christmas tree to DC from across the country

0

NEWYou can now listen to Fox News articles!

An American truck driver has embarked on a cross-country journey in honor of a special Yuletide delivery.

Arizona native Michael Porter is bringing holiday cheer to Washington, D.C., by transporting the annual Christmas Tree to the U.S. Capitol — just as two truckers, Alaska natives John Schank and Fred Austin, did last year. 

This year’s tree was selected from Nevada’s National Forests. It’s traveling nearly 3,000 miles from Humboldt-Toiyabe National Forest, plus making 12 stops along the way — all so that Americans have a chance to see “the People’s Tree.”

FOX NEWS TO PRESENT 6TH ANNUAL ‘ALL AMERICAN CHRISTMAS TREE LIGHTING’ ON NOV. 21

The 53-foot-tall red fir tree, nicknamed “Silver Belle,” is being carried by Swift Transportation in a 101-foot flatbed truck.

In an interview with Fox News Digital, Porter said he found out two weeks ahead of his departure that he would be transporting the tree.

Arizona truck driver Michael Porter is shown embarking on an epic 3,000-mile journey to deliver the Capitol Christmas Tree, named “Silver Belle,” from Nevada to Washington, D.C. (Swift Transportation)

“I left to go to Reno to pick up the tree, and I found out exactly what I was going to be doing and how big of a deal it was,” said Porter. 

“It’s definitely a huge honor to represent Knight Swift and just trucking in general with a project of this size. It’s an honor to do something like this.”

 “It was amazing to see everyone come together and create this.”

Porter has been driving trucks for seven years.

“Behind the scenes, there was a lot of work — planning the route, planning the stops, our permits. Just everything that makes all of this happen without a problem,” he said. 

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

He added, “It was amazing to see everyone come together and create this.”

He said his ultimate goal was to “not mess it up” — sharing that there have been a lot of people watching, so he’s felt the pressure.

Michael porter in nevada snow forrest with us capitol christmas tree

Michael Porter has been driving trucks for seven years. (Swift Transportation)

He said there was a “a really big turnout” at a lot of the stops he made. He said he was “pulling into these whistle stops and having the big crowds — and everybody was cheering, smiling and having a great time.”

CLICK HERE FOR MORE LIFESTYLE STORIES

Porter said he’s seen people standing on bridges along the route to see the truck pass by. While he’s on the highway, he’s had passersby honk at him and give him a thumbs up.

He listens to a lot of ’90s country tunes, he said, to help the time pass.

“We had plenty of Christmas music at the event,” he said. 

“So I stayed away from the Christmas playlist,” he joked.

U.S. Capitol Christmas Tree Lit For Holiday Season

The tree will make a stop at Joint Base Andrews in Maryland before its arrival at the Capitol’s West Lawn on Friday. (Kevin Dietsch/Getty Images)

The 55-year tradition of the Capitol Christmas Tree began when then-Speaker of the House John McCormack, D-Mass., placed a live Christmas tree on the Capitol lawn, according to the U.S. Department of Agriculture.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

Each year a different national forest is selected to provide “the People’s Tree,” all part of an annual campaign to celebrate national forests.

CLICK HERE TO GET THE FOX NEWS APP

The tree will stop at Joint Base Andrews in Maryland before its arrival at the Capitol’s West Lawn on Friday.

New Google Play Store feature lets you uninstall apps across all devices

0


NEWYou can now listen to Fox News articles!

If you use more than one Android device with the same Google account, you know how messy things can get.

Tracking which apps are installed on which phone or tablet can quickly become confusing. The Google Play Store already showed how many of your devices had a particular app, but uninstalling apps across multiple devices required digging through several menus.

That’s changing now, thanks to Google’s latest Play Store update.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERS

A person holding an Android phone

A new Play Store update makes it easier to manage apps across all your Android devices. (Kurt “CyberGuy” Knutsson)

The new uninstall button rolls out

Google is rolling out version 48.8 of the Play Store, and it introduces a new ‘Uninstall’ button right on each app’s listing. You can now remove an app from any of your devices directly from your main phone. This eliminates the need to pick up each device and remove the app one by one. According to Android Authority and other reliable tech outlets, this feature appears beside each Android device listed under your account, making it faster to keep your devices organized and clutter-free.

The update replaces the older process that required navigating through ‘Profile,’ then ‘Manage Apps and Devices,’ then applying a device filter before uninstalling. That long-winded method still works, but the new shortcut saves time and effort. The feature is rolling out gradually, so you might not see it right away, but it should appear soon as part of the stable update.

Why this update matters

For anyone juggling a phone, tablet or even a work device, this new feature makes a real difference. Over time, unused apps pile up, taking up storage space and slowing down performance. Being able to remove them remotely helps keep every device clean and efficient without switching between screens.

The change also improves digital hygiene. Many people forget about apps on old phones that still have access to personal data or permissions. Now you can easily remove those apps before they become a privacy or security risk. The update also makes it simpler for parents managing family devices to stay in control of what’s installed on their kids’ phones.

How to use the new uninstall button on Android 

Settings may vary depending on your Android phone’s manufacturer. 

  • Open the Play Store app on your device.
  • Navigate to the listing of an app that you know is installed on another device signed in to your account.
  • Under the “Installed on X devices” section, you may see a new ‘Uninstall’ button next to each listed device.
  • Tap Uninstall next to the one you want to remove from your Android.

Then click This Device.

GOOGLE CHROME AUTOFILL NOW HANDLES IDS

An Android screen tutorial

Steps to use the new uninstall button on Android. (Kurt “CyberGuy” Knutsson)

How to uninstall Android apps when the new Play Store button isn’t showing

Wait for the update to roll out if key features aren’t showing yet. If the button isn’t present, you can still uninstall an app with these steps:

Settings may vary depending on your Android phone’s manufacturer.

  • Click Profile.
  • Tap Manage apps & devices.
  • Click Manage.
  • Use the device filter to select the target device.
  • Press the app you want to uninstall.

Click uninstall.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

A tutorial on how to uninstall apps from Android across multiple devices

The new feature saves time and improves organization across a user’s Android devices. (Kurt “CyberGuy” Knutsson)

What this means to you

This feature saves time, improves organization and helps you keep your Android devices running smoothly. By uninstalling unused apps remotely, you free up valuable storage and reduce unnecessary background activity that can drain battery life. You also make your devices more secure by removing older apps that might not be receiving updates anymore. It’s a thoughtful update that shows how Google is paying attention to everyday usability rather than adding flashy new tools. Even if it seems like a small change, the impact adds up for people who live in a multi-device world.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

The new ‘Uninstall’ button in Play Store version 48.8 is a quiet but powerful improvement for Android users. It makes it easier to manage your apps and maintain a cleaner digital environment across all your devices. Once this update reaches your phone, it’s worth exploring which apps you no longer need and removing them in just a few seconds.

Do you plan to tidy up your devices using the new Google Play Store feature, or do you prefer to manage apps directly from each phone? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link

2,000-year-old Roman fruit found at ancient fort in northern England

0

NEWYou can now listen to Fox News articles!

Rare relics of Ancient Rome were recently found at a fort in northern England — including a 2,000-year-old piece of fruit.

In an announcement from the Northumberland National Park, officials said in late October that a record number of finds were made at Bremenium Fort in High Rochester, roughly 33 miles northwest of Newcastle upon Tyne.

The fort is over 20 miles north of Hadrian’s Wall, an ancient wall designed to protect the northern border of Britannia from the Picts. 

DIVERS UNCOVER ‘EXTRAORDINARY’ MILITARY TREASURE TIED TO LEGENDARY ROMAN BATTLE

In the statement, the park said the recent excavation delivered “more artifacts and structural discoveries … than ever before.”

With the help of over 70 volunteers and archaeology students, excavators found various imported Roman pottery items, including some made in Northern Spain that were likely used to transport olive oil.

More than 70 volunteers helped uncover pottery, military items and jewelry linked to ancient Roman life in Northumberland. (Elaine Vallack/Redesdale Archaeology Group)

Military items, including a spearhead and a slinger’s lead shot, were also found, along with a votive oil lamp and a lead seal.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Small, engraved gemstones known as intaglios were also uncovered, as well as several brooches and “intact dolphin-style pieces,” per officials.

One of the most intriguing finds was a preserved piece of fruit — which officials believe was a plum.

Votive lamp found during dig

The excavation included a votive oil lamp, lead seal and spearhead among the fort’s expanding collection of artifacts. (Elaine Vallack/Redesdale Archaeology Group)

In a statement, Northumberland National Park Authority historic environment officer Chris Jones said it was “inspiring to see so many people, of all ages, engaged in the uncovering of their shared heritage.”

CLICK HERE FOR MORE LIFESTYLE STORIES

“These discoveries help us understand how people in the past lived from the remains they left behind, which has made such a lasting imprint on the landscape,” said Jones.

Excavation supervisor Bob Jackson of Redesdale Archaeological Group (RAG) called the artifacts “exceptional, in both quantity and quality.”

Volunteers digging at site

The fort, located just north of Hadrian’s Wall, once served as one of Rome’s most northerly outposts in Britain nearly 2,000 years ago. (Elaine Vallack/Redesdale Archaeology Group)

“The range of pottery and metalwork, especially the amphora and the intact brooches, offer new insights into trade, craftsmanship and daily life at Bremenium,” said Jackson.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“It’s a privilege to work with such a committed team.”

Northern England’s ancient Roman forts have yielded fascinating historical treasures — and it doesn’t just stop at Bremenium Fort.

Shot of group working in English countryside

Bremenium Fort’s location near Hadrian’s Wall continues to yield insights into the Roman Empire’s defensive strongholds. (Northumberland National Park Authority)

At Vindolanda, another ancient fort, volunteers unearthed an ancient depiction of a Roman goddess earlier this spring.

CLICK HERE TO GET THE FOX NEWS APP

In May, volunteers at another fort in Northumberland were surprised after unearthing two different 2,000-year-old shoes.

Saudi Arabia releases U.S. citizen after 4 years following Trump meeting

0

NEWYou can now listen to Fox News articles!

A U.S. citizen jailed in Saudi Arabia for criticizing the royal family online was freed Wednesday by Saudi authorities, ending a four-year ordeal in the country, according to media reports.

Saad Almadi’s release came just a day after President Donald Trump met with Crown Prince Mohammed bin Salman in Washington, D.C., per the New York Post.

Almadi, 75, a retired engineer and U.S. resident since 1976, was detained in 2021 during a family visit to Riyadh and later sentenced to more than 19 years in prison on terrorism charges tied to a series of posts online.

US AND QATAR SECURE RELEASE OF AMERICAN CITIZEN AMIR AMIRY FROM AFGHANISTAN DETENTION

President Donald Trump walks with Saudi Crown Prince Mohammed bin Salman during an official state arrival ceremony at the Saudi Royal Court on May 13, 2025, in Riyadh, Saudi Arabia (Win McNamee/Getty Images)

The charges were reduced to cyber crimes, and although he was released from prison in 2023, Almadi was held in the country under an exit ban which prevented him from going back home to the U.S.

The Almadi family issued a statement Wednesday celebrating the good news and thanking Trump.

“Our family is overjoyed that, after four long years, our father, Saad Almadi, is finally on his way home to the United States!” they said.

“This day would not have been possible without President Donald Trump and the tireless efforts of his administration. We are deeply grateful to Dr. Sebastian Gorka and the team at the National Security Council, as well as everyone at the State Department.”

TRUMP DESIGNATES SAUDI ARABIA AS MAJOR NON-NATO ALLY DURING CROWN PRINCE WHITE HOUSE VISIT

A third portion of the statement expressed appreciation to others who had supported the case over the years.

“We extend our thanks to the U.S. Embassy in Riyadh for keeping our father safe, and to the nonprofit organizations and members of Congress who fought for his freedom,” the statement read.

Almadi’s case also drew attention from human rights groups and U.S. lawmakers after he was accused of terrorism over 14 social media posts.

SAUDI ARABIA’S 40-YEAR-OLD DISRUPTOR: HOW MBS REWIRED THE KINGDOM IN 10 SHORT YEARS

One suggested that a street in Washington be renamed after Jamal Khashoggi, who was murdered in the Saudi Consulate in Istanbul in 2018.

U.S. pressure to lift Almadi’s exit ban had also intensified since Trump’s May visit to Saudi Arabia.

The president’s national security advisor, Sebastian Gorka, also met with Almadi’s son at the White House.

Sebastian Gorka

Sebastian Gorka at the 2024 Mom’s for Liberty National Summit in Washington D.C., Friday, August 30, 2024. (DOMINIC GWINN/Middle East Images/AFP via Getty Images)

The Foley Foundation, which advocates for Americans detained overseas, praised the news Wednesday, saying it was “so excited” the family’s fight had finally succeeded.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Per reports, Almadi was flying to the U.S. from Riyadh on Wednesday, according to his family, after Trump and the crown prince set foot on stage at a forum in Washington.

Fox News Digital has reached out to Sebastian Gorka, the Department of State and The White House for comment.

NASA’s Perseverance discovers potential meteorite Phippsaksla on Mars

0


NEWYou can now listen to Fox News articles!

NASA’s Perseverance rover may have stumbled on a visitor from outer space – a strange, shiny rock on Mars that scientists think could be a meteorite forged in the heart of an ancient asteroid.

According to a new blog post on the rover’s mission page, the rock – nicknamed “Phippsaksla” – stood out from the flat, broken terrain around it, prompting NASA scientists to take a closer look.

Tests revealed high levels of iron and nickel, the same elements found in meteorites that have crashed onto both Mars and Earth.

While this isn’t the first time a rover has spotted a metallic rock on Mars, it could be the first for Perseverance. Earlier missions – including Curiosity, Opportunity, and Spirit – discovered iron-nickel meteorites scattered across the Martian surface, making it all the more surprising that Perseverance hadn’t seen one until now, NASA said.

MASSIVE ASTEROID BIGGER THAN A SKYSCRAPER HEADING TOWARD EARTH AT 24,000 MPH

NASA Perseverance Rover

NASA’s Perseverance rover discovered a shiny metallic rock that scientists believe could be a meteorite forged in the heart of an ancient asteroid. (NASA via Getty Images)

Now, just beyond the crater’s rim, the rover may have finally found one – a metallic rock perched on ancient impact-formed bedrock. If confirmed, the discovery would place Perseverance alongside the other Mars rovers that have examined fragments of cosmic visitors to the red planet.

To learn more about the rock, the team aimed Perseverance’s SuperCam – an instrument that fires a laser to analyze a target’s chemical makeup – at Phippsaksla. The readings showed unusually high levels of iron and nickel, a combination NASA said strongly suggests a meteorite origin.

Mounted atop the rover’s mast, SuperCam uses its laser to vaporize tiny bits of material, so sensors can detect the elements inside from several meters away.

SCIENTISTS SPOT SKYSCRAPER-SIZED ASTEROID RACING THROUGH SOLAR SYSTEM

NASA Perseverance discovers possible meteorite on Mars

The shiny rock nicknamed “Phippsaksla,” discovered by NASA’s Perseverance rover, showed high levels of iron and nickel consistent with meteorites found on Mars and Earth. (NASA)

The finding is significant, NASA noted, because iron and nickel are typically found together only in meteorites formed deep within ancient asteroids – not in native Martian rocks.

If confirmed, Phippsaksla would join a long list of meteorites identified by earlier missions, including Curiosity’s “Lebanon” and “Cacao” finds, as well as metallic fragments spotted by Opportunity and Spirit. NASA said each discovery has helped scientists better understand how meteorites interact with the Martian surface over time.

Because Phippsaksla sits atop impact-formed bedrock outside Jezero crater, NASA scientists said its location could offer clues about how the rock formed and how it ended up there.

MASSIVE COMET ZOOMING THROUGH SOLAR SYSTEM COULD BE ALIEN TECHNOLOGY, HARVARD ASTROPHYSICIST SAYS

NASA Perseverance discovers possible meteorite on Mars

NASA scientists say the metallic rock spotted by Perseverance may be a meteorite formed deep within an ancient asteroid before crashing onto Mars. (NASA)

For now, the agency said its team is continuing to study Phippsaksla’s unusual makeup to confirm whether it truly came from beyond Mars.

If proven to be a meteorite, the find would mark a long-awaited milestone for Perseverance – and another reminder that even on a planet 140 million miles away, there are still surprises waiting in the dust.

Perseverance, NASA’s most advanced robot to date, traveled 293 million miles to reach Mars after launching on a United Launch Alliance Atlas V rocket from Cape Canaveral Space Station in Florida on July 30, 2020. It touched down in Jezero crater on Feb. 18, 2021, where it has spent nearly four years searching for signs of ancient microbial life and exploring the planet’s surface.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Built at NASA’s Jet Propulsion Laboratory in Pasadena, California, the $2.7 billion rover is about 10 feet long, 9 feet wide, and 7 feet tall – roughly 278 pounds heavier than its predecessor, Curiosity. 

Powered by a plutonium generator, Perseverance carries seven scientific instruments, a seven-foot robotic arm, and a rock drill that allows it to collect samples that could one day return to Earth.

 The mission will also help NASA prepare for future human exploration of Mars in the 2030s.



Source link

Holiday scams spike during Black Friday as scammers target shoppers

0


NEWYou can now listen to Fox News articles!

The holiday season is the happiest and riskiest time of year to be online. As millions of us gear up for Black Friday and Cyber Monday deals, scammers do the same.

Every year, they target holiday shoppers with fake websites, “too-good-to-be-true” deals and scam emails that look identical to legitimate retailers. But here’s the part most people miss: scammers don’t just rely on luck. They already have your personal data before you even click “add to cart.”

From leaked email addresses to exposed phone numbers and home addresses, your personal information is being bought and sold by data brokers, companies that collect and resell detailed profiles about you. Those profiles are exactly what scammers use to send realistic “order confirmations,” fake delivery alerts and “urgent payment” texts during this holiday period and beyond.

Let’s unpack how this works and what you can do now to stay safe before the holiday chaos begins.

RETIREES LOSE MILLIONS TO FAKE HOLIDAY CHARITIES AS SCAMMERS EXPLOIT SEASONAL GENEROSITY

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Christmas Decoration Shopping

Scammers ramp up fake websites and emails during the holiday shopping rush. (iStock)

Why scammers love the holiday season

November through December is a goldmine for cybercriminals. According to the CISA, reports of online shopping scams spike during this time of year and vary in their approaches. The reason? We let our guard down when we’re rushed, distracted or excited by a deal. Staying alert during the holiday season can help you avoid data exposure and financial losses. Here are some of the most common scams you should be aware of. 

Phantom stores

The surge of promotions during the holiday season is the perfect time for “phantom stores” to thrive. It’s a fraudulent store that mimics the interface and products of a well-known brand. Once you purchase from such a website, you’ll never receive your order as the store doesn’t actually exist.

Real-world example: Fake IKEA websites appeared with URLs spelled “ikeaa-sale.com” and “ikea-blackfriday.shop,” mimicking the official ikea.com interface with copied product images, logos and discount banners.

They lured shoppers with huge discounts and clearance offers to steal credit card data. Eventually, they were reported and taken down, but the damage has been done.

What to do? Always check the URL of the store you shop at and only click links from the store’s official website or social media.

Delivery scams

According to recent research, some of the most popular shopping apps like Temu are selling your location data to third parties. It’s no surprise that you might receive fake delivery texts.

man rating his experience on the app after ordering food to his house

Your leaked data fuels realistic “order” and “delivery” scams online. (iStock)

MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH

Real-world example: Temu is a popular app for scammers to mimic. They can easily find your contact information and order details to text “Your order couldn’t be delivered.” Each text contains a phishing link that can install malware on your device or steal your personal information. That’s why Temu warns its users about the couriers they partner with.

What to do? Make sure the texts you receive come from a legit courier service and double-check it on the store’s website.

Fake order emails

Some scammers use sophisticated phishing tactics to lure victims. They engineer emails from well-known brands, use an urgent tone, place malicious links and urge you to click on your order status. In reality, there is no order status – they’re stealing your data.

Real-world example: Amazon is one of the biggest online retailers worldwide, and that makes the brand easy to mimic. Scammers send emails on behalf of Amazon to try to steal customers’ personal data because it’s highly likely that their victims have used Amazon, making it less suspicious. However, phishing emails have some telltale signs you can look out for.

What to do? Never click on any suspicious links and always check the sender’s contact information.

Unwanted data exposure

When you shop online, you should be aware of the data you share, including your contact information, shopping habits, credit card details and more. All stores collect some type of data about you. However, some companies collect more than you think.

Real-world example: The infamous Target controversy in 2012 revealed how big retailers use data analysis to predict your shopping behavior. The company collected shopping data and managed to produce a predictive model for soon-to-be mothers.

They sent out brochures with baby clothes, vouchers for baby formula and more before the customers even knew they were pregnant. Thankfully, modern shopping looks a bit different. You can opt out of certain data collection and exercise your right to remove personal information from websites that collect it.

What to do? Check what data the stores collect about you and request the removal of any private information you don’t want them to have.

THE TRUTH BEHIND THOSE MYSTERIOUS SHIPMENT EMAILS IN YOUR INBOX

How scammers find you

Imagine you’re browsing for gifts online. Within minutes, your activity generates data points – device info, IP address, browsing habits that feed into online databases. At the same time, data brokers already have your full profile: age, income, address history, family members and even shopping behavior. These profiles are sold to marketers and often leak into criminal databases.

That’s why scam calls, texts and emails often feel so “real.” They use your name, the right retailer, even your city. They’re not guessing. They’ve bought your digital footprint.

The “holiday cleanup” your data needs

Most people clear their browser cookies or delete old emails to “stay private.” But that’s like locking your front door while leaving all your personal documents on the lawn.

If you want to stop scammers from targeting you this holiday season, you need to remove your personal data from the source, the data broker databases that feed these scams.

That’s where a data removal service comes in. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Practical steps before you shop

To make sure your online shopping season stays stress-free and scam-free, here’s what CyberGuy recommends doing this week:

INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU

1) Run a privacy scan with a data removal service

Before the holiday rush, remove your exposed data from data brokers. You’ll reduce the number of scam calls, emails and texts you get this season and protect your financial info before it’s too late.

man holding credit card and on laptop

Take control by removing personal data from broker databases before you shop. (iStock)

2) Secure your email

Use strong, unique passwords for each online store or service. Consider a password manager to simplify this.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

3) Check for fake stores

Before clicking a social media ad or email, hover over the link. Legit retailers use secure “https://” URLs and their exact brand name – no extra words or letters.

4) Avoid public Wi-Fi

Don’t shop or enter payment info over public Wi-Fi in an airport, café or mall, for example. Scammers can easily intercept unencrypted traffic.

5) Use credit cards or PayPal – not debit cards

HACKERS TARGET ONLINE STORES WITH NEW ATTACK

Credit cards have stronger fraud protection and make it easier to dispute unauthorized charges.

6) Enable two-factor authentication (2FA)

Turn on 2FA for your email, bank and shopping accounts. Even if scammers get your password, they can’t log in without your second verification step.

7) Keep your software and apps updated

Cybercriminals often exploit outdated browsers or apps. Update your phone, computer and shopping apps before the holiday rush to close those security holes.

8) Monitor your bank and credit statements

Check your accounts daily during the shopping season. The faster you spot a suspicious charge, the easier it is to reverse and protect your funds.

Kurt’s key takeaways

Black Friday through Cyber Monday is the peak time for data harvesting. Every purchase, coupon code and sign-up adds to the profile that marketers and data brokers hold on you. That information can linger online for years, long after the sales end. The good news? It’s easier than ever to reclaim your privacy. By taking just a few minutes today, you can enjoy the holidays knowing your personal data is no longer on the open market.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

How confident are you that your personal data isn’t already fueling a scam this holiday season? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved.  



Source link

The Louvre museum is adding 100 cameras following the theft of $102 million in jewels

0

NEWYou can now listen to Fox News articles!

Following the recent heist at the Louvre in Paris, officials have announced stricter security measures, along with new insights into how the thieves successfully robbed the world’s most visited museum.

Louvre director Laurence des Cars shared the changes and new details with the Committee of Cultural Affairs of the National Assembly on Wednesday, according to The Associated Press.

Des Cars said the power tools used by robbers to cut through the display cases were disc cutters made to cut concrete.

LOUVRE HEIST IN BROAD DAYLIGHT AMID APPARENT SECURITY LAPSES PUTS GLOBAL MUSEUMS ON ALERT

In 2019, display cases had been replaced to protect against weapon attacks within the museum, but the disc-cutting method “had not been imagined at all,” said des Cars.

“Videos show how difficult it was for the thieves,” she said. She added that the display cases “held up remarkably well and did not break apart.”

Thieves connected to the October Louvre heist used disc cutters to steal $102 million in jewels. (AP Photo/Thibault Camus)

On Oct. 19, a four-person team broke into the Apollo Gallery in broad daylight and stole eight jewels valued collectively at 88 million euros ($102 million).

About 100 hundred cameras will be installed by the end of 2026, while anti-intrusion systems will be running within the next two weeks, the museum said.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

“After the shock, after the emotion, after the assessment, it’s time for action,” said des Cars.

She said the new surveillance cameras will guarantee “complete protection of the museum’s surroundings.”

Police car parked outside Louvre Museum

On Oct. 19, a four-person team broke into the Apollo Gallery in broad daylight and stole eight jewels valued collectively at $102 million. (AP Photo/Thomas Padilla)

The new measures are a part of over 20 new emergency measures, including the establishment of the new role of “security coordinator.”

CLICK HERE FOR MORE LIFESTYLE STORIES

Fox News Digital previously contacted the Louvre to ask whether the heist will affect its security measures, but the museum said it does not “discuss security matters.”

louvre museum building

About 100 hundred cameras will be installed by the end of 2026, while anti-intrusion systems will be running within the next two weeks. (Thibault Camus : AP)

“The extensive modernization that the Louvre underwent in the 1980s is now technically obsolete, with equipment that has been overperforming for 40 years,” des Cars said.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

The “Louvre New Renaissance,” launched this year, will narrow in on easing crowding by modernizing infrastructure.

CLICK HERE TO GET THE FOX NEWS APP

The Associated Press contributed to this report. 

Strategies For Combating Shopping Cart Abandonment

0

Latest Blog from RPR Comando: “Strategies For Combating Shopping Cart Abandonment”. Picture this: you’ve carefully crafted the perfect online store, filled it with amazing products, and set everything up for a seamless shopping experience. But just as customers are ready to check out… they disappear! Shopping cart abandonment is a common hurdle faced by e-commerce businesses. #BookMarketing #VideoShorts #PressReleaseMarketing #RPRComando  
This article originally appeared on https://rprcomando.com/strategies-for-combating-shopping-cart-abandonment/

Is This The Head of Your PR Department 1
Strategies For Combating Shopping Cart Abandonment 40

Commerce Department proposes TP-Link ban over China security risks

0


NEWYou can now listen to Fox News articles!

A major national security debate is unfolding, and it affects more than government networks. It touches your home, your devices, and the Wi-Fi your family uses every day. The Commerce Department has proposed blocking new sales of TP-Link products after a months-long review into the company’s ties to China, citing a growing TP-Link security risk.

Multiple agencies, including Homeland Security and Defense, supported that proposal. They believe the company’s connections could expose American networks to foreign influence.

Security experts warn that foreign-backed hackers have targeted home and office routers for years. These devices often act as silent stepping stones that help attackers move deeper into sensitive systems. When compromised, they can expose everything connected to them, including computers, smart home gear, military devices used on base and more.

This potential ban would be one of the biggest consumer tech actions in U.S. history. It comes as lawmakers raise fresh alarms about Chinese-made cameras, routers and connected home products sold on military exchanges and in homes across the country.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

CHINESE HACKERS BREACH US NUCLEAR SECURITY AGENCY IN CYBERATTACK OPERATION, OFFICIALS SAY

Close-up of a Wi-Fi router showing Ethernet ports and connected network cables.

The proposed TP-Link ban stems from growing concerns that foreign-linked routers and cameras could expose American homes and networks to outside influence. (Kurt “CyberGuy” Knutsson)

Why military families are even more vulnerable

Lawmakers from both parties say military households face extra risk. Sen. Joni Ernst (R-Iowa), who leads a bipartisan group of 23 lawmakers, warns that TP-Link cameras and networking devices sold on Army, Navy and Air Force exchange sites could expose sensitive footage from base housing and dorms. Rep. Ashley Hinson (R-Iowa) echoed that concern, saying these devices could act as a backdoor for Chinese intelligence to collect information on service members and their families. Even when products appear out of stock, officials worry they remain popular in military communities.

These lawmakers say Chinese laws could force companies to share data or push hidden software changes that weaken U.S. networks. They argue that this creates a real risk for households on or near military installations. While TP-Link disputes every allegation and states that it stores U.S. data inside America, lawmakers want a deeper investigation.

“China will use any way to infiltrate us, and we must ensure they cannot access our homeland or military bases,” said Ernst.”High-tech security cameras sending video and audio directly back to Beijing must be treated like the grave threat that they are. We have seen this playbook from China before, with Huawei Technologies, and need the Trump administration to investigate and determine if TP-Link is a trojan horse compromising our national security.”

10M AMERICANS HIT IN GOVERNMENT CONTRACTOR DATA BREACH

How Congress is responding to TP-Link security risks

Sen. Ernst is pressing the Commerce Department to finish its investigation by November 30. Sen. Tom Cotton (R-Arkansas), who chairs the Senate Intelligence Committee, says TP-Link could give the Chinese government access to American networks and wants faster action. Their concerns reflect past decisions involving Huawei and Kaspersky, which lost access to the U.S. market due to national security risks.

Congressional leaders say foreign-made smart home devices sold on military bases should face strict scrutiny. They see routers, cameras and other connected home gear as critical targets in a time when cyberthreats continue to grow.

We reached out to TP-Link Systems Inc., and a spokesperson provided CyberGuy with the following statement:

“TP-Link Systems Inc. (TP-Link), an American company based in California, refutes the claims in this letter. This letter repeats false and misleading media reports and attacks that have been thoroughly debunked.

TP-Link emphatically objects to any allegation it is tied to the Communist Party of China, dependent on the Chinese government, or otherwise subject to interference under Chinese national security laws. The company is not controlled by any government, foreign or domestic. TP-Link has split from and has no affiliation with the China-based TP-LINK Technologies Co. Ltd., which is separately owned and operated.

A child walks next to a soldier.

Lawmakers warn that TP-Link devices sold on military bases may put service members and their families at greater risk, especially inside base housing. (John Moore/Getty Images)

This letter has nothing to do with security and everything to do with a competitor trying to remove TP-Link Systems’ products from the marketplace. The “open source information” the members reference is actually a manufactured echo chamber of false and misleading attacks that the media has parroted over the past year. Instead of directly engaging with TP-Link Systems, these members essentially pressed “copy and paste” on unsubstantiated claims about our American company.

TP-Link has not been contacted by policymakers to discuss the alleged concerns, but if we were to meet with them, they would learn that TP-Link has located its core security functions and data infrastructure in the United States. U.S. user data is securely stored on Amazon Web Services infrastructure in Virginia, under the full control of the company’s U.S. operations.

TP-Link Systems currently holds a very small share of the U.S. security camera market, representing approximately 3% of the consumer market segment according to Circana checkout data. The company has virtually no business presence in the enterprise segment. Additionally, TP-Link Systems’ router market share in the U.S. has been inaccurately reported as being much higher than it actually is. Recent market research from Dell’Oro Group, Inc., found that TP-Link Systems’ market share of residential Wi-Fi router sales in North America is under 10%.

TP-Link does not enable foreign surveillance of U.S. networks or users. The company’s operations are built to prevent potential attempts to subvert its business by outside influence. TP-Link’s substantial security investments cover its entire product portfolio, including security cameras and routers.

TP-Link continually monitors its products and services and takes timely and appropriate action to address vulnerabilities it becomes aware of. TP-Link has not identified any reliable information regarding new vulnerabilities in its products in connection with this letter.”

FBI WARNS OF HACKERS EXPLOITING OUTDATED ROUTERS. CHECK YOURS NOW

Steps to protect yourself from this growing threat

Even as the debate continues, you can take simple steps to secure your home. These easy moves help defend against threats tied to any router brand.

1) Check your router and update it

Look at the brand on your router. Then update the firmware through the official app or web dashboard. If your device is several years old or no longer supported, replace it. Check out our article on the top routers for the best security at Cyberguy.com.

2) Change your Wi-Fi and admin passwords

Default passwords are dangerous. Create strong, unique passwords for both your Wi-Fi and the router’s admin panel. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2025 atCyberguy.com

Wifi router

Congress is pressing for a fast investigation amid fears that foreign-made smart home gear could become a gateway for cyberthreats across the country. (Cyberguy.com)

3) Use strong antivirus protection on every device

Threats like this continue to grow. Install strong, real-time antivirus protection on every computer, phone, and tablet in your home. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

4) Turn off any of these features you do not need

Disable remote access, WPS and extra features you never use. These settings can open doors for attackers.

5) Put smart home devices on a guest network

Keep laptops and phones on your main network. Put cameras, plugs, TVs and IoT devices on a separate guest network so they cannot reach your sensitive devices.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

The debate around TP-Link shows how something as routine as a home router can become part of a broader security conversation. Whether or not the government issues a ban, this moment is a clear reminder that cybersecurity starts at home. Small steps make a meaningful difference in how well your devices stand up against foreign-backed hacking groups.

Should the government ban router brands linked to foreign influence or should consumers decide for themselves? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved.



Source link