-1.3 C
New York
Saturday, February 14, 2026
Home Blog Page 56

Marine veteran Winsome Earle-Sears outlines safety, education and energy plans for Virginia

0

NEWYou can now listen to Fox News articles!

When my father came to America from Jamaica, he had just $1.75 in his pocket. What he carried with him was not wealth or influence, but faith, discipline and common sense. He believed that through education and hard work, anything is possible in America.

His story is my story, and it is the story of Virginia. It is about hope, opportunity and the belief that government should serve the people, not the other way around.

Virginians want to know: Do you see me? Do you know me? Do you care about me? That is the Virginia I fight for every day. A Virginia where people can raise their families safely, send their children to good schools and afford to keep the lights on. 

Lt. Gov. Winsome Earle-Sears is the Republican candidate for governor of Virginia. (Win McNamee/Getty)

I returned to politics – after being gone for 20 years – because too many politicians in Richmond and Washington have forgotten that leadership is about service. They are more interested in power than progress. That is why my closing message to Virginians is simple: it is time for common sense, not nonsense.

VIRGINIA DEMOCRATS HAVE A VIOLENCE PROBLEM

Safety that works for everyone

Every Virginian deserves to feel safe in their home, in their neighborhood, and on their way to work and school. As a U.S. Marine, I have stood shoulder to shoulder with law enforcement officers and corrections personnel because they are the ones who respond when danger calls. I believe in accountability, but I also believe in respect for the rule of law and those who protect us. 

Jay Jones and others in his party have turned safety into a political issue instead of a public priority. His murderous fantasies have no place in Virginia. We deserve leaders who speak responsibly and act with integrity. And when Democratic Party leaders like Abigail Spanberger cannot call on Jay Jones to resign, it’s disqualifying at best. 

Education rooted in truth and opportunity

Education changed my life. My father used it to lift himself out of poverty, and I have seen firsthand how it opens doors that seemed closed. That is why as a former vice president of the Virginia State Board of Education, I believe parents must be partners in their children’s education. Parents deserve to know what their kids are learning and to make the best education choices for their families. 

HOW THE LEFT’S EMBRACE OF MAMDANI COULD DOOM DEMOCRATS NATIONWIDE

Abigail Spanberger calls that extreme. I call it common sense. Our schools should be teaching reading, writing, math and history, not political agendas. Every child deserves a classroom focused on learning and character, not division. 

Energy and affordability for working families

Energy prices are not just numbers on a bill. They determine whether families can afford groceries, heat and gas. I believe in an all-of-the-above approach because the cost of energy is added to everything that is produced. We can keep costs low, protect our environment responsibly and make Virginia energy independent. By focusing on innovation instead of ideology, we can have cleaner air and lower costs at the same time.

Abigail Spanberger and her allies have accepted millions of dollars from green activist groups that want to dictate how Virginians live and work. Their plans would raise energy prices and hurt small businesses. That is not leadership. That is nonsense. I am fighting for energy policies that make sense for working families and strengthen Virginia’s economy.

VIRGINIA’S OBSCENE SPECTACLE OF A DEMOCRAT ‘MOM’ CANDIDATE WHO ISN’T FAMILY FRIENDLY

Leadership that listens

Throughout this campaign I have met parents, small business owners, veterans and young people who are all asking for the same thing. They want leaders who listen, who lead with principle and who remember that common sense still matters. They do not want mealy-mouthed politicians.

This election is not about me. It is about you, Virginians! It is about whether we allow the nonsense raging in Richmond to divide us or whether we stand together to build a commonwealth that works for everyone.

CLICK HERE FOR MORE FOX NEWS OPINION

It is time to put faith back in leadership. It is time to return transparency and accountability to government. It is time for unity grounded in hard work, respect and love for Virginia. It is time to let the wounds of Virginia’s past heal.

It is time for common sense, not nonsense.

CLICK HERE TO GET THE FOX NEWS APP

NYC mayoral candidate Zohran Mamdani backed by UK’s Jeremy Corbyn

0

NEWYou can now listen to Fox News articles!

Jeremy Corbyn, the former UK Labour Party leader expelled from his party over antisemitism allegations, was working to help Zohran Mamdani tighten his grip on New York City on Sunday.

Mamdani’s alliance with Corbyn comes within days of the polls opening in the New York City mayoral race, where he is the progressive challenger to the Democrats.

Known for his criticism of Israel’s military actions in Gaza and alignment with the Democratic Socialists of America (DSA), like Corbyn, Mamdani has faced accusations of antisemitism.

Corbyn, now an independent MP, announced his support for Mamdani on Sunday via Facebook, posting a photo of himself holding up a “North London 4 Zohran” shirt.

NEW JERSEY DEMS SNUB ENDORSING SOCIALIST CANDIDATE MAMDANI AS GUBERNATORIAL ELECTION LOOMS

Mamdani gets UK politician Jeremy Corbyn’s endorsement days before NYC mayor election. (JeremyCorbynMP Facebook )

“Let’s get Zohran over the finish line for a New York that’s affordable for all!” the post read.

“Corbyn supporting Mamdani. What a surprise.” commented one social user. “Why are you interfering with influencing politics in New York?” asked another.

Corbyn also shared a phone-banking link which leads a website organized by the DSA’s NYC chapter which is urging volunteers to mobilize voters for Mamdani.

“Join NYC-DSA and Jeremy Corbyn, former leader of the UK’s Labour Party, as we call New Yorkers to get out the vote for Zohran Mamdani for mayor. We’re just two days from election day, and every conversation pushes us closer to winning a better New York,” the website reads.

DNC EMBRACES SOCIALIST MAMDANI AS RESURFACED ANTI-ISRAEL REMARKS RAISE ALARM: ‘BIG TENT PARTY’

Zohran Mamdani smiling on a poster.

Zohran Mamdani enlisted Jeremy Corbyn’s help in the New York City mayoral campaign just days before polling begins. (New York City DSA)

Corbyn’s well-documented history with antisemitism allegations runs back to 2020 when the UK’s Equality and Human Rights Commission (EHRC) found that the Labour Party under his leadership had committed unlawful acts of discrimination against Jewish members.

Corbyn was suspended and formally expelled from the Labour Party in 2024 because of his response to the report. He has since launched a new left-wing political party called “Your Party,” and continues to deny all allegations of antisemitism.

NY STATE DEM BOSS REFUSES TO ENDORSE MAMDANI, CAUSING HUGE RIFT IN PARTY

Reacting to the collaboration, former New York Governor and mayoral candidate Andrew Cuomo quickly condemned Mamdani’s decision, writing on X.

“Having Jeremy Corbyn — someone whose party was found to have committed unlawful acts of discrimination against Jewish people under his leadership – phone-banking for @ZohranKMamdani says everything you need to know.

NY doesn’t need politics of moral compromise. We need leadership that rejects antisemitism, extremism, and division in every form and in every corner,” he wrote.

MEET MAMDANI’S RADICAL ADVISORY CIRCLE THAT INCLUDES COMMUNIST ACTIVIST, ANTI-ISRAEL ADVOCATES

Zohran Mamdani wearing a black coat.

New York City Democratic mayoral nominee Zohran Mamdani accepts an endorsement from the United Bodegas of America in the Bronx, New York City, on Wednesday, Oct. 29, 2025.  (Fox News Digital/Deirdre Heavey)

Meanwhile, a week before the election, a campaign finance watchdog group, the Coolidge Reagan Foundation, filed two criminal referrals against Mamdani, claiming he received illegal contributions from foreign donors.

The Mamdani campaign maintains that any issue regarding financial contributions has been resolved.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Fox News Digital has reached out to Zohran Mamdani for comment.

Town in Italy considers hitting tourists with $2 daily dog tax as critics push back

0

NEWYou can now listen to Fox News articles!

An Italian town is taking tourist taxes to the next level by looking closely at creatures with four legs — and not everyone’s happy about the move. 

The Province of Bolzano is looking to implement a “fido” tax. Dogs visiting the area will be taxed about $2 (1.50 euros) per day while residents pay over $100 a year, The Independent and other outlets reported. 

The tax would cover the costs of cleaning up dog poop and other related public-space maintenance.

FOREIGN TRAVELERS SOON TO PAY ‘VISA INTEGRITY FEE’ TO VISIT THE U.S. COSTING $250

The initiative stems from a previous policy that implemented a mandatory DNA dog tracking system.

Residents who participated in the DNA policy will receive a two-year exemption from the new tax, according to Newsroom Italia.

Italy’s Bolzano province proposes taxing tourist dogs about $2 per day to cover cleanup costs, but some are pushing back.  (Richard Baker / In Pictures via Getty Images)

The president of the International Animal Protection Organization Italy, Massimo Camparotto, said in a statement that the dog-tax decision is “disproportionate.”

“Urban decorum can and must be guaranteed through effective controls by the competent authorities and with the application of sanctions against those who do not respect the rules,” the statement said, “not with new taxes that end up penalizing and discriminating against responsible citizens and their animals.”

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Camparotto added, “Taxing dogs means treating them like a luxury good, rather than as actual family members.”

The draft still needs approval by the regional provincial council.

Passenger traveling with their pet dog. Pet carrier is stowed under the seat.

“Taxing dogs means treating them like a luxury good, rather than as actual family members,” said an animal group protection leader.  (iStock)

Other animal rights groups have also criticized the plan, with some calling it “pure madness,” as reported by Wanted in Milan. 

The bill would pay for the creation of new dog parks and fund the cleaning of streets where dog owners fail to clean up after their pets, the same source reported. 

CLICK HERE FOR MORE LIFESTYLE STORIES

Some in the province have described the cleaning of pavements, parks and public spaces in the region as a “serious problem,” said the same source, and called the new tax a “fair” measure, as it would only “affect dog owners instead of charging the entire community.”

The proposed tax is just the latest move in some areas to curb an overflow of visitors and tourists. 

The proposed tax would cover the costs of cleaning up dog poop and related public-space maintenance.

The proposed tax would cover the costs of cleaning up dog poop and related public-space maintenance. (iStock)

Locals have installed their own turnstiles across the Dolomites region as influencers continue to flock to the mountain range in northeastern Italy.

Carlo Zanella, president of the Alto Adige Alpine Club, previously told Fox News Digital the turnstiles are “working.”

CLICK HERE TO GET THE FOX NEWS APP

“The turnstiles were installed at the beginning of July by a farmer who owns the land where the path passes,” said Zenella.

Located in Val Gardena on the Seceda, the turnstiles charge visitors about $5 for access.

DOLOMITES ITALY FARMER TURNSTILES OVERTOURISM

Italian farmers have installed turnstiles charging $5 in the Dolomites mountain range to control tourist overcrowding. (Carlo Zanella)

Zenella said it’s about visitors “who go to the meadows to pass or have a picnic and ruin the grass that the farmer has to cut to make hay.”

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

He said he believes the best way to reduce the flow of tourists is to highlight that “there are other even more beautiful places to visit.”

5 essential tech terms parents should know for kids’ digital safety

0


NEWYou can now listen to Fox News articles!

Kids today are growing up in a world where screens, apps, and social platforms are part of everyday life. From homework to gaming to group chats, their digital lives can move faster than parents can keep up. But behind every app and device are settings and systems that can impact their privacy, safety, and focus.

Whether you’re trying to set healthy limits, track screen time, or just understand what your child’s phone can do, knowing a few key tech terms can make parenting in the digital age a lot less stressful. Here’s a quick guide to help you stay informed, confident, and in control.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Child using a device on a couch.

Setting healthy screen time limits helps kids learn balance and keeps tech use from taking over family time. (Kurt “CyberGuy” Knutsson)

1) Screen time limits

The boundary that helps restore balance

Screen time limits let you manage how long your child spends on apps, games, or devices each day. It’s not about punishment, it’s about setting healthy boundaries that help kids disconnect and recharge.

Why it matters: Too much screen time has been linked to reduced focus, sleep disruption, and overstimulation. Setting limits helps your child create a better balance between online fun and real-world rest.

How to set screen time limits

On iPhone:

  • Go to Settings
  • Tap Screen Time
  • Click App Limits
  • Select Add Limit, choose categories or specific apps, and set daily time limit

On Android:

Settings may vary depending on your Android phone’s manufacturer

  • Go to Settings
  • Tap Digital Wellbeing & Parental Controls. If you don’t see it right away, try searching “Digital Wellbeing” in the Settings search bar
  • Open the Dashboard or App Timers section. On some phones (like Samsung), it may appear as “App Timers”. On others (like Google Pixel), tap Dashboard to view your app usage list
  • Tap the hourglass icon next to the app you want to limit
  • Set a daily time limit, then tap OK or Done
  • The timer resets every night at midnight

Pro tip: Make it a family routine. Review screen time reports together so kids feel involved in the process rather than restricted. 

TEENS HACK SCHOOL CELL PHONE BANS WITH CREATIVE WORKAROUNDS

2) Parental controls

Your built-in safety net

Parental controls are tools that let you manage what your child can see and do on their devices – from blocking explicit content to approving downloads and monitoring usage. Every major device, app, and streaming service has its own version.

Why it matters: Parental controls can help prevent exposure to inappropriate content, manage purchases, and set up age-appropriate experiences.

Woman using Iphone

Built-in parental controls make it easier to guide what kids can see and do on their devices.  (Kurt “CyberGuy” Knutsson)

How to turn parental controls on

On iPhone:

  • Go to Settings
  • Click Screen Time 
  • Tap Content & Privacy Restrictions
  • Turn it on so the toggle turns green.
  • Within Content & Privacy Restrictions you can go to sections like Allowed Apps, iTunes & App Store Purchases, etc, to set filters and restrict what apps the device can do.

On Android:

Settings may vary depending on your Android phone‘s manufacturer

  • Go to Settings
  • Tap Digital Wellbeing & Parental Controls
  • Select Parental Controls, then follow the steps to set up a supervised account through Google Family Link, which lets you manage screen time on a child’s device remotely

Pro tip: Most streaming apps, like YouTube, Netflix, and Disney+, also have parental settings, so make sure you adjust those separately.

3) Geolocation

The invisible map in your child’s pocket

5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE

Geolocation allows apps and devices to track physical location in real time. It powers navigation and “Find My” features but can also share more than you intend if left unchecked.

Why it matters: While location sharing helps families stay connected, it can pose privacy and safety concerns if apps broadcast your child’s whereabouts.

How to manage location access

On iPhone:

  • Go to Settings
  • Click Privacy & Security
  • Then, click Location Services
  • Tap each app and change “Always” to “While Using the App” or “Never”

On Android:

Settings may vary depending on your Android phone’s manufacturer

  • Go to Settings
  • Tap Location (or “Location & security” or “Privacy → Location” depending on device)
  • Tap App location permissions (or “Permission manager → Location”)
  • Select an app from the list
  • Change the app permission from, “Allow all the time” to “Allow only while using the app” or “Don’t Allow”

Pro tip: For younger kids, use “Share My Location” within Family Sharing (iPhone) or Google Family Link (Android) instead of third-party tracking apps to ensure safer monitoring.

4) Private browsing

The mode that hides – but doesn’t erase

Private browsing, also called Incognito Mode, lets users browse the internet without saving history, cookies, or logins. While it may sound harmless, it can make it harder for parents to see what kids are accessing online.

Why it matters: Private browsing prevents history tracking on the device, but your internet provider, school, or router may still record activity. It’s a reminder that no browsing mode is completely private.

TEENS FACE NEW PG-13 LIMITS ON INSTAGRAM

How to disable private browsing

On iPhone (Safari):

  • Open Settings
  • Tap Screen Time
  • Tap Content & Privacy Restrictions
  • If prompted, enter or set a Screen Time passcode
  • Turn on Content & Privacy Restrictions (toggle to green)
  • Tap App Store, Media & Purchases (or similarly named) and optionally set limits
  • Click Web Content 
  • Choose one of the options such as, Limit Adult Websites (this will disable Private Browsing in Safari) or Only Approved Websites 

On Android (Chrome):

Settings may vary depending on your Android phone’s manufacturer

  • Open the Family Link app on your Android phone (or download it if it isn’t installed)
  • Select your child’s profile
  • Tap Controls
  • Click Google Chrome & Web
  • Choose Try to block explicit sites (or select “Only allow approved sites” for stricter filtering)
  • This setting automatically disables Incognito Mode in Chrome for your child’s supervised account
  • (Optional) You can also review SafeSearch and YouTube restrictions under the same section for extra protection
Worried young mother watching teen girl using smartphone.

Conversations about online safety matter more than rules alone because openness builds digital trust. (iStock)

SCHOOLS’ SAFETY TOOLS ARE SPYING ON KIDS — EVEN AT HOME

Pro tip: Talk to your child about why transparency matters. Turning off private browsing is most effective when paired with open, ongoing conversations about online safety.

5) Digital footprint

The trail your child leaves behind

Every post, comment, or photo shared online becomes part of your child’s digital footprint, a permanent record of their online presence. Even deleted posts can live on through screenshots, data archives, or algorithms.

Why it matters: Colleges, employers, and even peers can access public digital traces. Teaching kids to think before posting helps them build a positive and professional online reputation.

How to check what’s out there

  • Search your child’s name on Google and image results
  • Review old accounts or unused apps that may still contain personal info
  • Help them make their social media profiles private and share selectively

Pro tip: You can also set up Google Alerts for your child’s name to get notified whenever new content appears online, a simple, free way to stay aware of their digital footprint as it evolves. 

Also, you may want to consider using a data removal service to help clean up your child’s personal information that may appear on people-search sites or data-broker platforms. These tools scan the web for outdated profiles, cached pages, and databases containing sensitive details like addresses, phone numbers, and photos. They can automatically submit takedown requests and continue monitoring for new exposures over time.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

Kurt’s key takeaways

Parenting in the digital age doesn’t mean knowing every app or trend. It means understanding the fundamentals that shape your child’s online experience. From screen time limits to digital footprints, these five terms give you the language to set boundaries, foster trust, and keep your family safer online.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Want more help building healthy digital habits at home? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

SessionReaper vulnerability hits Magento and Adobe Commerce stores

0


NEWYou can now listen to Fox News articles!

A security researcher found a serious weakness in the software that powers thousands of e-commerce sites. The platform, called Magento, and its paid version Adobe Commerce, has a bug that lets attackers break into active shopping sessions. Some attackers can even take control of the entire store.

The flaw is known as SessionReaper. It allows hackers to pretend they are real customers without needing a password. Once they are inside, they can steal data, make fake orders, or install tools that collect credit card details.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Why is this attack so serious?

The problem starts in the part of the system that handles how a store communicates with other online services. Because the software does not properly check the information it receives, it sometimes trusts data that it should not. Hackers take advantage of this by sending fake session files that the store accepts as real.

Researchers at SecPod warn that successful attacks can lead to stolen customer data, fake purchases, and even full control of the store’s server.

Once the attack method was shared publicly, cybercriminals began using it right away. Security experts at Sansec reported that more than 250 online stores were compromised within a single day. This shows how quickly attacks can spread once a vulnerability becomes public.

Man with winter outerwear looks down at his phone

Hackers are exploiting a new flaw called SessionReaper to hijack active shopping sessions on thousands of e-commerce sites running Adobe Commerce and Magento. (Kurt Knutsson)

Why are many stores still unprotected?

Adobe released a security update on September 9 to fix the issue. Weeks later, about 62 percent of affected stores still have not installed it. Some store owners are afraid an update might break features on their site. Others simply do not know how serious the risk is.

Every unpatched store remains an open door for attackers who want to steal information or install malicious code.

MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH

How can you stay safe when shopping online?

While store owners are responsible for fixing the problem, you can still take smart steps to protect yourself when shopping online. These actions can help you spot danger early and keep your personal information safe.

1) Look for warning signs

Always pay attention to how a website behaves. If a page looks odd, loads slowly, or shows error messages, it could mean something is wrong behind the scenes. Check for the small padlock symbol in the address bar that shows the site uses HTTPS encryption. If it is missing or the site redirects you to an unfamiliar page, stop and close the browser tab immediately. Trust your instincts if something feels off.

2) Be careful with email links and use a data removal service 

Cybercriminals often use fake promotional emails or ads that look like real store offers. Instead of clicking links in messages or banners, type the store’s web address directly into your browser to avoid phishing pages designed to steal your login details or card information. Since attacks like SessionReaper can expose your personal data to criminal marketplaces, consider using a reputable data removal service that continuously scans and deletes your private information, such as your address, phone number, and email, from data broker sites. This reduces your risk of identity theft if your information has been leaked through a compromised online store.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

A person types on a laptop computer in a home office setting, representing remote access points targeted in data breaches.

Cybersecurity teams at SecPod and Sansec tracked more than 250 stores breached within 24 hours of the exploit going public, showing how fast these attacks spread. (Kurt “CyberGuy” Knutsson)

3) Use strong antivirus software

Strong antivirus protection is your silent guard online. Choose reputable software that offers real-time protection, safe browsing alerts, and automatic updates. A strong antivirus program can detect malicious code that tries to run on your device, block unsafe sites, and alert you to potential threats. This adds another crucial layer of defense when visiting online stores that may not be fully secure.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com 

4) Use safe payment options

Whenever possible, choose payment services that add an extra layer of protection between your bank account and the online store. Platforms like PayPal, Apple Pay, or Google Pay do not share your card number with the retailer. This reduces the chance of your information being stolen if the store is compromised. These payment gateways also offer dispute protection if a purchase turns out to be fraudulent.

5) Shop with trusted retailers

Stick to stores with a solid reputation. Well-known brands usually have better security and faster response times when issues arise. Before buying from a new website, check its reviews on trusted consumer sites. Look for signs of credibility such as clear contact information, a professional design, and verified payment options. A few minutes of research can save you from weeks of frustration.

TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED

6) Keep your devices updated

Updates may seem annoying, but they are one of the most effective ways to protect your data. Make sure your computer, smartphone, and web browser all have the latest security patches installed. Updates often fix the exact kinds of flaws hackers use to spread attacks like SessionReaper. Enable automatic updates if you can, so your devices stay protected without extra effort.

7) Use unique, strong passwords

If you create accounts on shopping sites, make sure each one has its own strong password. Avoid using the same password across multiple platforms. Consider using a password manager to generate and store long, random passwords. That way, if one account is compromised, your other logins stay safe.

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

8) Turn on two-factor authentication

If a site or payment service offers two-factor authentication, enable it. This adds a second security step, such as a code sent to your phone or generated by an app. Even if hackers steal your password, they will not be able to access your account without that second verification.

Wallet with multiple debit/credit cards

Even weeks after Adobe issued a critical patch for the SessionReaper vulnerability, nearly two-thirds of affected online stores remain unprotected, leaving customer data and payment information at high risk of theft. (CyberGuy.com)

9) Avoid public Wi-Fi for purchases

FARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANS

Public Wi-Fi networks in places like cafés, airports, and hotels are often unsecured. Avoid entering payment information or logging in to accounts while connected to public networks. If you must make a purchase while away from home, use a mobile data connection or a reliable VPN to encrypt your activity. 

10) Monitor your bank and credit statements

Check your financial statements regularly for any unusual activity. Small, unauthorized charges can be early signs of fraud. Report any suspicious transactions to your bank or credit card company right away so they can freeze your account or issue a new card.

11) Report suspicious activity

If you notice anything strange during or after an online purchase, act quickly. Contact the store’s customer service to report what you saw. You should also inform your payment provider or credit card company so they can block unauthorized transactions. Reporting early can help stop further damage and alert other shoppers to potential risks.

Kurt’s key takeaways

The SessionReaper attack shows how fast online threats can appear and how long they can linger when updates are ignored. Even well-known stores can become unsafe overnight. For retailers, installing patches quickly is critical. For shoppers, staying alert and choosing secure payment methods are the best ways to stay protected.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Would you still shop online if you knew hackers could be hiding behind a store’s checkout page? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

Archaeologists find Roman hospital-turned-Christian sanctuary in Turkey excavation

0

NEWYou can now listen to Fox News articles!

An archaeological excavation in Turkey recently yielded a Roman hospital-turned-Christian sanctuary, offering new insight into centuries of ancient history.

Anadolu Agency (AA), a state-run outlet in Ankara, reported the discovery on Oct. 8. 

The ruins were found in the ancient city of Kaunos, in southwestern Turkey’s MuÄŸla Province. They were inside a monastery area within the city’s walls.

ANCIENT ROMAN APARTMENT BUILDING FOUND BENEATH PUBLIC SQUARE AMID SUBWAY CONSTRUCTION

The site has attracted tourists for years due to its rock-cut Lycian tombs, ancient mosaics and 5,000-seat theater, earning it a spot on the UNESCO World Heritage Tentative List.

Now, however, archaeologists are adding a 3rd-century Roman hospital to the site’s many offers. The building was used as a military garrison hospital during the Roman era.

Archaeologists uncovered a Roman-era hospital in Turkey’s ancient city of Kaunos that later became a Christian sanctuary. (Durmus Genc/Anadolu via Getty Images)

It was only recently uncovered, though archaeologists have been digging at the Late Antiquity complex since 2022.

Excavation leader Ufuk Çörtük also told AA that previous excavations yielded “instruments used particularly in the field of medicine.”

“This year, we noticed an increase in the number of such medical tools,” the professor said.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

“Based on the materials recovered, we can say that the first phase of this complex — dating to the 2nd and 3rd centuries A.D. — functioned as a health center or hospital.”

Çörtük said the hospital also eventually served the public and not just soldiers. 

Man looking at ancient building in Kaunos

The site of Kaunos, famous for its Lycian tombs, now includes a Roman hospital-turned-church. (Durmus Genc/Anadolu via Getty Images)

During the Christianization period, the structure was turned into a church, which surprised excavators.

“There was a structure on the upper terrace of the complex — we fully uncovered it this year, and a beautifully preserved church emerged,” said Çörtük.

 CLICK HERE FOR MORE LIFESTYLE STORIES

Çörtük estimated the hospital was converted into a religious complex during the 6th century A.D.

“It’s intact in every respect,” the archaeologist said.

View of abandoned building structure in Kaunos

Turkish archaeologists revealed that the hospital served both the military and the public before becoming a sanctuary. (Durmus Genc/Anadolu via Getty Images)

“With this church, it’s now clear that the hospital of the 3rd century was converted into a religious center during the Christian era, dated to the 6th century A.D.”

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

It was also used during the Turkish period, as excavators found a coin from Aydinid Principality, which ruled between the 13th and 14th centuries.

The find marks one of many major archaeological discoveries in Asia Minor in recent months.

Aerial of ancient building in Kaunos near body of water

The Kaunos discovery, pictured here, adds to a string of recent archaeological finds across Asia Minor, including Troy and Olympus. (Durmus Genc/Anadolu via Getty Images)

In Troy, officials recently unveiled a gold brooch and a rare jade stone in Troy, offering a glimpse into the city’s pre-Greek past.

CLICK HERE TO GET THE FOX NEWS APP

In Olympus this summer, archaeologists found a fifth-century Christian church with a message reading, “Only those on the righteous path may enter here.”

Hegseth: US, China to open ‘military-to-military’ coms after Trump-Xi meeting

0

NEWYou can now listen to Fox News articles!

The United States and China plan to establish military-to-military communications channels “to deconflict and deescalate” potential problems, Secretary of War Pete Hegseth said Saturday after talking with his Chinese counterpart.

In a post on X, Hegseth said he had a “positive meeting” with Admiral Dong Jun, China’s Minister of National Defense, in the wake of President Donald Trump’s meeting with Chinese President Xi Jinping.

During their talk, the two defense leaders agreed that the best path forward for the U.S. and China involves “peace, stability, and good relations.”

“Admiral Dong and I also agreed that we should set up military-to-military channels to deconflict and deescalate any problems that arise. We have more meetings on that coming soon. God bless both China and the USA!” Hegseth wrote, in part.

TRUMP TOUTS ‘12 OUT OF 10’ MEETING WITH XI, DOWNPLAYS REPORTS OF VENEZUELA STRIKES

Secretary of War Pete Hegseth says the U.S. and China will open “military-to-military” channels to prevent conflicts following positive meeting with Chinese counterpart Admiral Dong Jun. (Both: HASNOOR HUSSAIN/POOL/AFP via Getty Images)

Earlier Saturday, Hegseth attended a separate meeting in Malaysia with defense leaders from the Association of Southeast Asian Nations (ASEAN), where he urged them to push back against Beijing’s aggressive actions in the South China Sea.

“China’s sweeping territorial and maritime claims in the South China Sea fly in the face of their commitments to resolve disputes peacefully,” Hegseth said at the meeting, according to The Associated Press. 

“We seek peace. We do not seek conflict. But we must ensure that China is not seeking to dominate you or anybody else,” he added.

OPINION: TRUMP SCORES FOUR BIG WINS WITH XI, BUT HAS ONE BIG MISS

The South China Sea remains volatile with Beijing, the Philippines, Vietnam, Malaysia and Brunei all claiming overlapping territories. 

Chinese coast guard and Philippines fishing boats

A Chinese Coast Guard ship is seen closely shadowing the convoy of Filipino fishing boats and a Philippine Coast Guard ship, on May 16, 2024. (Martin San Diego for The Washington Post via Getty Images)

China’s maritime fleet has frequently clashed with the Philippines in the disputed waters, with Chinese officials recently describing the country as a “troublemaker” for staging naval and air drills with the U.S., Australia and New Zealand.

Hegseth defended the U.S. ally during the Saturday meeting by saying Beijing’s designation of the Scarborough Shoal – a territory seized from the Philippines in 2012 – as a “nature reserve” “yet another attempt to coerce new and expanded territorial and maritime claims at your expense.”

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

The War Secretary then urged ASEAN to finalize the Code of Conduct with China and proposed creating a “shared maritime domain awareness” network and rapid-response systems to deter provocations – measures he said would ensure that any member facing “aggression and provocation is not alone.”

Philippines air patrol

Two Philippine Air Force FA-50 fighter jets fly with two U.S. Air Force B-1 bomber aircraft during a joint patrol and training over the South China Sea on Tuesday, Feb. 4, 2025. (Philippine Air Force via AP)

Hegseth also welcomed plans for an ASEAN-U.S. maritime exercise in December aimed at strengthening coordination and safeguarding freedom of navigation.

Reagan’s Boeing 707 Air Force One marks 20 years of being on permanent display

0

NEWYou can now listen to Fox News articles!

Before the gleaming 747s that now ferry U.S. presidents across oceans, there was a smaller, sleeker jet that carried the weight of the free world. 

The last Boeing 707 to serve as a primary Air Force One — the aircraft that once flew President Ronald Reagan, plus six other American presidents — now sits under a striking glass pavilion at the Ronald Reagan Presidential Library in Simi Valley, California.

“This was the last 707 that was used as a primary aircraft as Air Force One,” said David Trulio, president and CEO of the Ronald Reagan Presidential Foundation and Institute. “Subsequent to President Reagan, it was a 747.”

TOP TRAVEL DESTINATIONS GAINING BUZZ FOR 2026 TRIPS REVEALED IN NEW REPORT

Reagan flew the 707, tail number SAM 27000, more than any other president, and it remained in the presidential fleet until it was decommissioned in 2001, taking its last flight just three days before the Sept. 11 attacks. 

During his presidency, however, Reagan ordered the modernization of Air Force One to the larger, more advanced 747s as the primary aircraft. 

President Ronald Reagan traveled aboard SAM 27000 more than any other U.S. president. (Ronald Reagan Presidential Foundation & Institute)

The transition from the 707-based VC-137s to the 747 fleet took place in 1990, according to the U.S. Air Force, a year after Reagan’s term ended, and expanded the aircraft’s range, communications capabilities and comfort.

Ironically, Reagan himself never flew aboard the newer jets he had commissioned, Trulio said.

LARA TRUMP SHARES THE CONTROVERSIAL ‘NO-WAIT-AT-THE-GATE’ TRAVEL STRATEGY THAT HAS SPARKED DEBATE

Yet he traveled to 26 countries, covering 660,000 miles aboard SAM 27000 — a jet that held roughly half as many passengers as today’s Air Force One, which can accommodate about 102 people, according to Boeing.

The 707 also shuttled Presidents Richard Nixon, Gerald Ford, Jimmy Carter, George H.W. Bush, Bill Clinton and George W. Bush.

Ronald and Nancy Reagan waving from Air Force One.

President Reagan and first lady Nancy Reagan wave aboard Air Force One in 1986. (Ronald Reagan Presidential Foundation & Institute)

When the Reagan Library learned the plane was going to be decommissioned, it sought to honor the 40th president’s wish to have it placed permanently in the space where he would later be laid to rest.

Boeing, the plane’s manufacturer, collaborated with the Reagan Library to transport and reassemble the aircraft. The 707 was disassembled and towed to the library site. As the pavilion was constructed, each piece was brought inside and rebuilt within the building itself.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

This year, the Air Force One Pavilion celebrated its 20th anniversary. Since opening to the public in October 2005, nearly seven million visitors have stepped aboard Air Force One 27000. 

The three-story pavilion also features a Marine One helicopter, Reagan’s 1984 presidential limousine and an authentic Irish pub from his ancestral village of Ballyporeen, Ireland. A sweeping mural, “History of the Flying White House,” traces presidential air travel from its beginnings with FDR to the present day.

Nancy Reagan, George W. Bush and Barbara Bush and others cut ribbon for Reagan Library's Air Force One Pavilion in 2005.

The Air Force One Pavilion opened to the public in October 2005.

Over the past two decades, the pavilion has been used for everything from educational programs and international summits to presidential and even high school debates. 

The Reagan Library’s digital reach has grown tremendously, Trulio said, now topping 1.8 million followers across platforms as it expands access to its exhibits and events for audiences worldwide.

The plane is the top attraction for visitors to the Reagan Library. 

When visitors enter and see the massive aircraft, slightly tilted to give the illusion of takeoff and framed by floor-to-ceiling windows overlooking the Simi Valley hills, their first reaction is to gasp, Trulio said.

“It’s a really remarkable, very living piece of history,” he told Fox News Digital. “Any one of our visitors can come and buy a ticket and actually go onto the plane and see exactly where the president, his staff, the press corps, the Secret Service and so on used it as a working, flying office.”

The plane is the top attraction for visitors to the Reagan Library, Trulio noted.

Reagan's Air Force One and presidential motorcade on display at Reagan library.

The Air Force One Pavilion includes Reagan’s limousine and a Marine One helicopter. (Ronald Reagan Presidential Foundation & Institute)

It looks the same as it did 20 years ago, he added. While it was once state of the art, its rotary phones and mid-century decor are a blast from the past for visitors today. 

“To us, they look a little ’80s,” Trulio said.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Unlike modern planes, Reagan’s was not the “cushiest,” he added. “There’s a conference room, there are perfectly comfortable chairs — but the current Air Force One has bedrooms. This one doesn’t.”

Still, it was a vehicle of face-to-face diplomacy, helping to shape global history and continuing to teach lessons that resonate today.

CLICK HERE FOR MORE LIFESTYLE STORIES

After his first meeting with Soviet leader Mikhail Gorbachev in Geneva during the Cold War, for example, Reagan remarked, “So, face-to-face talks can be helpful.”

Trulio said there are “tremendous parallels” between Reagan’s era and today. 

President Reagan putting a golf ball with Robert McFarlane Jim Kuhn Thomas Dawson Thomas Carter George Shultz Don Regan and Dennis Thomas looking on aboard Air Force One watching him play.

President Reagan putts a golf ball aboard Air Force One in 1985. (Ronald Reagan Presidential Foundation & Institute)

History, it’s been said, rhymes. And if you think of the ‘70s going into the ’80s, that was a period of economic challenge, high inflation, we were competing with a communist regime with global ambitions, and there was a sense that maybe America’s best days were behind us,” he said.

CLICK HERE TO GET THE FOX NEWS APP

“President Reagan was an unquestionably successful president,” he continued. “It’s inspiring but also deeply instructive to draw on those successes as we ponder the challenges and the opportunities that we face today.”

How to stay protected from dark web threats and cybercriminals online

0


NEWYou can now listen to Fox News articles!

The dark web often feels like a mystery, hidden beneath the surface of the internet that most people use every day. But to understand how scams and cybercrimes actually work, you need to know what happens in those hidden corners where criminals trade data, services and stolen access. Cybercriminals rely on a structured underground economy, complete with marketplaces, rules and even dispute systems, to operate safely away from law enforcement. By learning how these systems function, you can better understand the threats that could reach you and avoid becoming the next target.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE

Man typing on his laptop.

Learn how to protect your personal information from dark web threats with simple cybersecurity habits and tools. (Photo by Phil Barker/Future Publishing via Getty Images)

Inside the hidden layers of the internet

The Internet is often divided into three layers: the clear web, the deep web and the dark web. The clear web is the open part of the internet that search engines like Google or Bing can index, including news sites, blogs, stores and public pages. Beneath it lies the deep web, which includes pages not meant for public indexing, such as corporate intranets, private databases and webmail portals. Most of the content in the deep web is legal but simply restricted to specific users.

The dark web, however, is where anonymity and illegality intersect. It requires special software such as Tor to access, and much of its activity happens behind encryption and invitation-only walls. Tor, short for The Onion Router, was originally developed by the U.S. Navy for secure communication but has since become a haven for both privacy advocates and criminals.

It anonymizes users by routing traffic through multiple encrypted layers, making it almost impossible to trace where a request truly came from. This anonymity allows criminals to communicate, sell data and conduct illegal trade with reduced risk of exposure.

Over time, the dark web has become a hub for criminal commerce. Marketplaces once operated like eBay for illegal goods, offering everything from drugs and stolen credit card data to hacking tools and fake identities. Many of these platforms have been shut down, but the trade continues on smaller, more private channels, including encrypted messaging apps such as Telegram. Vendors use aliases, ratings and escrow systems to build credibility.

Ironically, even among criminals, trust is a critical part of business. Forums often have administrators, verified sellers and mediators to settle disputes. Members who cheat others or fail to deliver are quickly blacklisted, and reputation becomes the main currency that determines who can be trusted.

The criminal economy and how scams are born

Every major cyberattack or data leak often traces back to the dark web’s underground economy. A single attack typically involves several layers of specialists. It begins with information stealers, malware designed to capture credentials, cookies and device fingerprints from infected machines. The stolen data is then bundled and sold in dark web markets by data suppliers. Each bundle, known as a log, might contain login credentials, browser sessions and even authentication tokens, often selling for less than twenty dollars.

Another group of criminals, known as initial access brokers, purchases these logs to gain entry into corporate systems. With that access, they can impersonate legitimate users and bypass security measures such as multi-factor authentication by mimicking the victim’s usual device or browser. Once inside, these brokers sometimes auction their access to larger criminal gangs or ransomware operators who are capable of exploiting it further.

Some of these auctions are run as competitions, while others are flash sales where well-funded groups can buy access immediately without bidding. Eventually, this chain of transactions ends with a ransomware attack or an extortion demand, as attackers encrypt sensitive data or threaten to leak it publicly.

Interestingly, even within these illegal spaces, scams are common. New vendors often post fake listings for stolen data or hacking tools, collect payments and disappear. Others impersonate trusted members or set up counterfeit escrow services to lure buyers.

Despite all the encryption and reputation systems, no one is truly safe from fraud, not even the criminals themselves. This constant cycle of deception forces dark web communities to build internal rules, verification processes and penalties to keep their operations somewhat functional.

What you can do to stay ahead of dark web-driven threats

For ordinary people and businesses, understanding how these networks operate is key to preventing their effects. Many scams that appear in your inbox or on social media originate from credentials or data first stolen and sold on the dark web. That is why basic digital hygiene goes a long way. Below are some steps you can take to stay protected.

MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH

Hacker using a computer.

From password managers to antivirus software, experts share practical ways to keep hackers out of your data. (Annette Riedl/picture alliance via Getty Images)

1) Invest in personal data removal services

A growing number of companies specialize in removing your personal data from online databases and people-search sites. These platforms often collect and publish names, addresses, phone numbers and even family details without consent, creating easy targets for scammers and identity thieves.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

2) Use unique passwords and a password manager

One of the easiest ways to stay safe online is to use unique, complex passwords for every account you own. Many breaches happen because people reuse the same password across multiple services. When one site is hacked, cybercriminals take those leaked credentials and try them elsewhere, a technique known as credential stuffing. A password manager eliminates this problem by generating strong, random passwords and securely storing them for you.

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

3) Install strong antivirus protection

Antivirus software remains one of the most effective ways to detect and block malicious programs before they can steal your information. Modern antivirus solutions do far more than just scan for viruses. They monitor system behavior, detect phishing attempts and prevent infostealer malware from sending your credentials or personal data to attackers.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

4) Keep your software updated

Outdated software is one of the biggest entry points for attackers. Cybercriminals often exploit known vulnerabilities in operating systems, browsers and plugins to deliver malware or gain access to systems. Installing updates as soon as they are available is one of the simplest yet most effective forms of defense. Enable automatic updates for your operating system, browsers and critical applications.

5) Enable two-factor authentication

Even if your password gets leaked or stolen, two-factor authentication (2FA) adds an additional barrier for attackers. With 2FA, logging in requires both your password and a secondary verification method. This includes code from an authentication app or a hardware security key.

6) Consider identity theft protection services

Identity theft protection can provide early warnings if your personal information appears in data breaches or on dark web marketplaces. These services monitor your sensitive data, such as social security numbers, bank details, or email addresses. If anything suspicious is detected, they alert you. Many providers also offer recovery assistance, helping you restore stolen identities or close fraudulent accounts. While no service can prevent identity theft entirely, these tools can shorten your response time and limit potential damage if your data is compromised.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

Black keyboard with red lights.

Protecting your identity starts with strong passwords, two-factor authentication and regular software updates. (Jens Kalaene/picture alliance via Getty Images)

Kurt’s key takeaway

The dark web thrives on the idea that anonymity equals safety. But while criminals may feel protected, law enforcement and security researchers continue to monitor and infiltrate these spaces. Over the years, many large marketplaces have been dismantled, and hundreds of operators have been caught despite their layers of encryption. The takeaway for everyone else is that the more you understand about how these underground systems function, the better prepared you are to recognize warning signs and protect yourself.

Do you think law enforcement can ever truly catch up with dark web criminals? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved. 



Source link

Historic 12th-century Bellister Castle hits UK market for $3.34 million with a catch

0

NEWYou can now listen to Fox News articles!

A historic castle recently hit the real estate market in the United Kingdom — but it’s not your typical freehold sale.

Bellister Castle, a Grade I-listed property in Haltwhistle, Northumberland, was recently listed by real estate agency Sanderson Young.

Dating back to the 12th century, the castle has a peel tower, which is its oldest feature. The structure boasts 4,778 square feet in the main castle, with a 1,159-square-foot two-bedroom lodge repurposed from a historic gatehouse.

DIVERS REVEAL IMAGES OF 321-YEAR-OLD SHIPWRECK IN REMARKABLE CONDITION OFF COAST

The castle is said to have been constructed with stone from Hadrian’s Wall, a second-century Roman wall designed to protect the northern border of Britannia from the Picts. 

In addition to six bedrooms and three bathrooms, the property also features decorative ceilings, an ornate drawing room and a renovated 19th-century fountain tub.

Bellister Castle in Northumberland dates back to the 12th century and features a historic peel tower. (Sanderson Young)

The estate spans roughly 4.51 acres, including a walled garden, an orchard and pasture — with a magnificent tree-lined driveway leading up to the castle.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

The property “offers a rare combination of modernity and comfort against a backdrop of outstanding historical features,” according to the listing. 

“Attention to detail is in every aspect, combining all the luxuries of modern-day living set within a superb example of an historic, fortified mansion with rich provenance.”

Split image of castle, walled English garden

The estate features nearly five acres of land, including a walled garden, orchard and pasture. (Sanderson Young)

“The rarity of such an opportunity is self-evident and is presented to a superb standard throughout. It is an opportunity for a purchaser to buy into the fabric of England,” the listing also notes.

So what’s the catch? 

The property is being leased by the National Trust — meaning that its next owners won’t quite own the property. 

CLICK HERE FOR MORE LIFESTYLE STORIES

Its 120-year lease ends in 2145. The guide price is 2.5 million pounds, or roughly $3.34 million.

A spokesperson for Sanderson Young told Fox News Digital the listing presents a “very rare” opportunity to rent a castle leased from the National Trust.

Ancient castle with flag flying near open lawn

The Grade I-listed Bellister Castle was built partly with stone from Hadrian’s Wall, according to its real-estate listing. (Sanderson Young)

“Most long-term leases are for residential or farm properties, and the lease agreements state that the National Trust will need to be involved in the transfer of the lease,” the spokesperson said, adding that there may be an opportunity to extend the lease when it ends.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“Owning Bellister Castle provides the opportunity to live in an extraordinary historic building and look after it for future generations,” added the official.

Bedroom inside the castle with large bed, ornate windows

The listing presents a “very rare” opportunity to live in a National Trust property, said Sanderson Young. (Sanderson Young)

The listing came months after a similar property hit the British real estate market. 

CLICK HERE TO GET THE FOX NEWS APP

St. John’s Jerusalem, a medieval monastery in England once used by crusader monks, was listed for sale this summer. 

It was priced at about $4.4 million for a lease ending in 2122.