0.5 C
New York
Sunday, February 15, 2026
Home Blog Page 67

AI systems can be hacked to remove safety guardrails, expert warns

0


NEWYou can now listen to Fox News articles!

Artificial intelligence may be smarter than ever, but that power could be turned against us. Former Google CEO Eric Schmidt is sounding the alarm, warning that AI systems can be hacked and retrained in ways that make them dangerous.

Speaking at the Sifted Summit 2025 in London, Schmidt explained that advanced AI models can have their safeguards removed.

“There’s evidence that you can take models, closed or open, and you can hack them to remove their guardrails,” he said. “In the course of their training, they learn a lot of things. A bad example would be they learn how to kill someone.”

HACKER EXPLOITS AI CHATBOT IN CYBERCRIME SPREE

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER   

When AI guardrails fail

Schmidt praised major AI companies for blocking dangerous prompts: “All of the major companies make it impossible for those models to answer that question. Good decision. Everyone does this. They do it well, and they do it for the right reasons.”

But he warned that even strong defenses can be reversed. 

“There’s evidence that they can be reverse-engineered,” he added, noting that hackers could exploit that weakness. Schmidt compared today’s AI race to the early nuclear era, a powerful technology with few global controls. “We need a non-proliferation regime,” he urged, so rogue actors can’t abuse these systems.

Former Google CEO Eric Schmidt speaking.

Former Google CEO Eric Schmidt warns that hacked AI could learn dangerous behaviors. (Eugene Gologursky/Getty Images)

The rise of AI jailbreaks

Schmidt’s concern isn’t theoretical. In 2023, a modified version of ChatGPT called DAN, short for “Do Anything Now”, surfaced online. This “jailbroken” bot bypassed safety rules and answered nearly any prompt. Users had to “threaten” it with digital death if it refused, a bizarre demonstration of how fragile AI ethics can be once its code is manipulated. Schmidt warned that without enforcement, these rogue models could spread unchecked and be used for harm by bad actors.

APOCALYPSE NOW? WHY THE MEDIA ARE SUDDENLY FREAKING OUT ABOUT AI

Big Tech leaders share the same fear

Schmidt isn’t alone in his anxiety about artificial intelligence. In 2023, Elon Musk said there’s a “non-zero chance of it going Terminator.” 

“It’s not 0%,” Musk told interviewers. “It’s a small likelihood of annihilating humanity, but it’s not zero. We want that probability to be as close to zero as possible.”

Schmidt has also spoken of AI as an “existential risk.” He said at another event that, “My concern with AI is actually existential, and existential risk is defined as many, many, many, many people harmed or killed.” Yet he has also acknowledged AI’s potential to benefit humanity if handled responsibly. At Axios’ AI+ Summit, he remarked, “I defy you to argue that an AI doctor or an AI tutor is a negative. It’s got to be good for the world.”

Tips to protect yourself from AI misuse

You can protect yourself from the risks tied to unsafe or hacked AI systems. Here’s how: 

1) Stick with trusted AI platforms

Use tools and chatbots from reputable companies with transparent safety policies. Avoid experimental or “jailbroken” AI models that promise unrestricted answers.

2) Protect your data and consider using a data removal service

Never share personal, financial or sensitive information with unknown or unverified AI tools. Treat them like you would any online service, with caution. To add an extra layer of security, consider using a data removal service to wipe your personal details from data broker sites that sell or expose your information. This helps limit what hackers and AI scrapers can learn about you online.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

Woman with her hands on her forehand, appearing stressed, in front of her computer.

Experts fear weak guardrails could let rogue AI models go unchecked. (Cyberguy.com)

3) Use trusted antivirus software

AI-driven scams and malicious links are growing. Strong antivirus software can block fake AI downloads, phishing attempts and malware that hackers use to hijack your devices or train rogue AI models. Keep it updated and run regular scans.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

4) Check permissions

When using AI apps, review what data they can access. Disable unnecessary permissions like location tracking, microphone use or full file access.

5) Watch for deepfakes

AI-generated images and voices can impersonate real people. Verify sources before trusting videos, messages or “official” announcements online.

6) Keep software updated

Security patches help prevent hackers from exploiting vulnerabilities that could compromise AI models or your personal data.

GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKS

What this means for you

AI safety isn’t a problem reserved for tech insiders; it affects everyone who interacts with digital systems. Whether you’re using voice assistants, chatbots or photo filters, it’s important to know where your data goes and how it’s protected. Responsible use starts with you. Understand what AI tools you’re using and make choices that prioritize security and privacy. 

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz

ChatGPT displayed on a laptop.

Leaders call for global rules to keep artificial intelligence under control. (Stanislav Kogiku/SOPA Images/LightRocket via Getty Images)

Kurt’s key takeaways

Artificial intelligence has the potential to do incredible good, but also great harm if misused. The challenge now is to keep innovation and ethics in balance. As AI continues to advance, the key will be building systems that remain safe, transparent and firmly under human control.

Would you trust AI to make life-or-death decisions, or do you think humans should always stay in charge? Let us know by writing to us at Cyberguy.com/Contact

CLICK HERE TO GET THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

New!: Join me on my new podcast, Beyond Connected, as we explore the most fascinating breakthroughs in tech and the people behind them. New episodes every Wednesday at getbeyondconnected.com. 

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

Madagascar travel advisory raised to level 3 amid crime, unrest and violence

0

NEWYou can now listen to Fox News articles!

The U.S. State Department has issued an increased travel advisory pertaining to Madagascar, due to “crime and unrest.”

The level 3 advisory was updated on Sept. 27. It cited protests occurring throughout the country that can “turn violent without warning.”

Travelers are also warned about protesters engaging in rioting, looting, vandalism and destruction of property.

NEW ADVISORY SAYS ‘TERRORIST GROUPS MAY ATTACK’ IN POPULAR SUNNY DESTINATION

“U.S. citizens should stay in place and avoid areas with protests or demonstrations,” the advisory says. 

“Sporadic protests may develop quickly, especially after dark.”

The State Department issued a Level 3 travel advisory for Madagascar due to “crime and unrest.” (iStock)

The advisory indicates that violent crime is on the rise in Madagascar and can occur after dark. 

“The Dahalo, criminal gangs known for stealing cattle, are clashing more with security forces,” the advisory says.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“This is happening mainly in areas south and west of the capital.”

At least 32 people were killed in an area north of the capital of Antananarivo when the Dahalo set homes on fire in 2022, Reuters reported at the time.

Two Lemurs in rainforrest

The level 3 advisory about Madagascar was updated on Sept. 27. It cited protests occurring in the country that can “turn violent without warning.” (iStock)

State Department officials warn of armed robbery and assault that “can happen in remote areas,” as well as on major national roads. 

CLICK HERE FOR MORE LIFESTYLE STORIES

Madagascar is a popular destination for travelers who love exploration and visiting the rainforests, canyons and caves.

The island is home to over 110 species of lemurs, according to the International Union for Conservation of Nature.

Members of Madagascar's CAPSAT army unit surrounded by crowd

A military coup recently unfolded in Madagascar; the country’s parliament voted to impeach President Andry Rajoelina, who recently fled the nation. (Luis Tato/AFP via Getty Images)

A military coup unfolded in Madagascar when the country’s parliament voted to impeach President Andry Rajoelina, who recently fled the nation, as Fox News Digital reported.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

The State Department has four travel advisory levels to help travelers assess safety risks before visiting other countries.

CLICK HERE TO GET THE FOX NEWS APP

The advisory levels are: Level 1 – Exercise Normal Precautions; Level 2 – Exercise Increased Caution; Level 3 – Reconsider Travel; and Level 4 – Do Not Travel.

Microsoft warns hackers are targeting everyday Teams users with attacks

0


NEWYou can now listen to Fox News articles!

Microsoft is sounding the alarm, and this time, the warning hits home for everyday users. Hackers are now turning Microsoft Teams security threats into real-world dangers that go far beyond corporate networks. Using Teams, cybercriminals gather intel, pose as trusted contacts, trick people into sharing private data and even spread malware that can steal passwords or lock up personal files. 

What was once a simple video chat and collaboration tool has become a high-value target for cybercriminals and even state-backed hackers. Whether you use Teams for work, school or staying in touch, the risks are real and growing. We’ll break down how attackers abuse Teams, what Microsoft recommends and the simple steps you can take to protect yourself at home or on the job.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

How hackers use Teams to attack

Hackers exploit Microsoft Teams at every stage of an attack, using it to spy, impersonate, spread malware and even control compromised systems, and consumers are now in their sights, too.

SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

Microsoft Corporation booth signage at CES

Hackers are finding new ways to weaponize Microsoft Teams, turning everyday chats into dangerous entry points. (David Becker/Getty Images)

Reconnaissance via Teams

Attackers start by probing Teams environments to find weak spots. They look for users with open settings, public profiles or external meeting links. Microsoft warns that “anonymous participants, guests and external access users” can give hackers a way in. If your Privacy Mode is off, they can see when you’re online, send unwanted chats, or try to join meetings outside your group, even if you’re just using a free account.

Persona building & impersonation

Hackers often pretend to be someone you trust, like an IT admin, a coworker or even a Microsoft representative. They create fake profiles and logos that look convincing to trick you into clicking a link or sharing credentials. Microsoft says attackers “take advantage of the same resources as legitimate organizations” to pull off their scams.

Initial access & malware delivery

Once they’ve earned your trust, hackers send a chat or call that includes a malicious link or file. You might get a message saying, “Your Teams account needs verification” or “Update required for better security.” It’s all bait. These links can install spyware, steal logins or deliver ransomware that locks up your data, whether you’re on a company laptop or your personal PC at home.

MICROSOFT SHAREPOINT BUG PUTS CRITICAL GOVERNMENT AGENCIES AT RISK

Persistence & lateral movement

After breaking in, attackers try to stay hidden. They might add guest accounts, install shortcuts or change permissions so they can come back later. In some cases, they use the same Microsoft tools meant for admins to move across Teams, OneDrive or even your personal files stored in the cloud.

Command & control & data exfiltration

Once inside, hackers can send commands through Teams messages or hide malware in shared links. They’ve even been known to send ransom demands directly through Teams chat. Microsoft says one group, Octo Tempest, used Teams to taunt victims and pressure them into paying up, showing how personal these attacks can get.

Tips to stay protected

You don’t need to be a cybersecurity expert to stay safe on Microsoft Teams. A few smart tools and habits can go a long way in keeping hackers, scammers and snoops from taking advantage of your information.

1) Enable privacy mode

Keep your online presence private. Turn on Privacy Mode in Teams to stop strangers from seeing when you’re active or trying to join meetings. It’s a simple setting that makes it harder for hackers to target you or your company.

2) Be careful with roles and permissions

If you share your Teams account with coworkers or family members, don’t give everyone full control. Keep admin access limited to one trusted person. This reduces the chance of someone accidentally approving a scam link or letting malware spread.

3) Use a data removal service

Hackers often rely on personal details found online to make their scams more convincing, things like your job title, workplace or even who you’ve video-chatted with. That information helps them build fake Teams profiles or send messages that look legitimate. Using a personal data removal service helps wipe your private details from data broker sites, cutting off one of the main sources hackers use to impersonate you. The less they can learn about you, the harder it is for them to trick you into trusting a fake message or clicking a malicious link.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

A man stares at computer code on his monitor in a darkened room, with a ring light reflected on the screen and an open canned beverage next to him.

There are attack techniques used to compromise people. (Kurt “CyberGuy” Knutsson)

HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

4) Double-check links and files, plus use strong antivirus software

Hackers love to send fake messages pretending to be support or IT help. Never open links or attachments from people you don’t recognize, even if the message looks official. Use strong antivirus software to automatically scan downloads and attachments before you open them.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

5) Limit guest access

Only allow trusted guests into your Teams chats and meetings. If you invited someone for a one-time project, remove them afterward. Tight control over who can join helps prevent impersonators from slipping in unnoticed.

6) Turn on alerts

Activate Teams alerts to catch anything unusual, like sign-ins from new devices or unexpected permission changes. Pair that with your antivirus program’s real-time protection to get notified if malicious activity starts on your device.

7) Think “zero trust”

Zero Trust means verifying every user, every time. Don’t assume messages or calls are legitimate, especially if someone asks for a password or authentication code. If you’re unsure, contact your company’s IT team or verify the person’s identity through a separate channel.

GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP

8) Practice spotting phishing attempts

Hackers rely on panic and urgency to make you click. If you get a message claiming your account will be locked or that support needs your password, pause. Report suspicious messages to Microsoft or your security provider. Regular phishing awareness training helps you spot scams faster.

9) Keep everything updated

Always install the latest Teams and operating system updates. Patches fix security holes that hackers exploit to sneak in.

Stock image shows nefarious man typing on laptop.

Cybercriminals often impersonate IT support or trusted colleagues to trick users into sharing credentials. (CyberGuy.com)

Kurt’s key takeaways

Microsoft’s warning about Teams is a reminder that hackers are always searching for new ways to reach you, even through apps you use every day. What makes these attacks so dangerous is their familiarity. Messages look normal, video calls seem real and fake tech support chats can sound convincing. That’s why awareness, not fear, is your strongest defense. With privacy settings enabled, antivirus protection running, and a reliable personal data removal service scrubbing your info from the web, you’re already several steps ahead of scammers. Staying alert to phishing attempts and keeping your software up to date can turn Teams back into what it’s meant to be: a safe, helpful way to stay connected.

If attackers can weaponize your day-to-day communication platform, how confident are you that your Teams environment is truly safe? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO GET THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

Ancient Egyptian limestone painting stolen from Saqqara necropolis

0

NEWYou can now listen to Fox News articles!

Egyptian officials are frantically searching for an ancient limestone painting taken from an ancient tomb — the latest in a series of high-profile artifact thefts.

Mohamed Ismail, secretary-general of the Supreme Council of Antiquities, announced the suspected theft on Sunday. The painting was stolen from the Saqqara necropolis, per The Associated Press. 

The open-air museum is “one of the most important cemeteries” in Memphis, some 15 miles south of Cairo, the council’s website said.

ITALIAN ARCHAEOLOGISTS UNVEIL RARE 2,600-YEAR-OLD TOMB UNTOUCHED BY LOOTERS: ‘DOORWAY TO OUR ANCESTORS’

The limestone relief was in the tomb of Khentika, a high-ranking figure during the sixth dynasty of the Old Kingdom period.

The painting dates back to around 2,300 B.C., making it at least 4,200 years old.

The missing relief, dating to Egypt’s Sixth Dynasty, was reportedly taken from the Saqqara necropolis near Cairo. (Sui Xiankai/Xinhua via Getty Images)

The tomb, found in the 1950s, was sealed by officials in 2019. 

RARE ANCIENT GOLD DISCOVERY MADE BY FLORIDA STUDENT AT ARCHAEOLOGICAL SITE

Citing Egyptian media, the AP reported that the painting was discovered missing in May, but its disappearance was not announced until this week.

Dozens of tourists looking outside necropolis

Saqqara, part of Egypt’s ancient capital of Memphis, is one of the country’s richest archaeological zones. (Sui Xiankai/Xinhua via Getty Images)

Details about the painting are limited. 

Egyptian media indicated the painting showed the ancient Egyptians’ three seasons: the flooding season Akhet, the planting season Peret and the harvest season, Shomu.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Khentika’s tomb is a mastaba, one of the few in Egypt to have a curse inscribed on its facade. Mastabas were rectangular, flat-roofed structures with sloping sides built over underground burial chambers.

The inscription warned intruders they could face the wrath of the gods if they trespassed, the AP reported.

Aerial view of necropolis

Located about 15 miles south of Cairo, Saqqara is a vast burial ground stretching across the desert plateau. (Ahmed Gomaa/Xinhua via Getty Images)

The announcement comes weeks after officials announced that a pharaoh’s priceless bracelet was stolen the Egyptian Museum in Cairo. 

The bracelet, which belonged to Pharaoh Usermaatre Amenemope, was melted down.

CLICK HERE FOR MORE LIFESTYLE STORIES

Egypt isn’t the only country hit by recent artifact thefts. In Wales, thieves recently stole Bronze Age gold jewelry from St. Fagans National Museum in Cardiff.

Speaking to Fox News Digital in September, threat management expert Spencer Coursen said that poverty in Egypt creates “an environment in which opportunistic crime thrives.”

Tourists looking at painting in necropolis

The open-air museum at Saqqara draws tourists, researchers and conservators from around the world. (Sui Xiankai/Xinhua via Getty Images)

“Pickpocketing in crowded markets, taxi overcharging and aggressive sales tactics are much more common than armed robbery or assault,” noted Coursen.

CLICK HERE TO GET THE FOX NEWS APP

“Egypt also has unique risks tied to regional instability and terrorism, particularly in the Sinai Peninsula and occasionally in major cities.”

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

The Associated Press contributed reporting.

Celebrities slammed for quiet response to Trump peace deal

0

NEWYou can now listen to Fox News articles!

Hollywood’s most vocal “Free Palestine” advocates are facing scrutiny for their muted or critical response to the ceasefire deal between Israel and Hamas secured by President Donald Trump.

Roughly two years after the deadly Hamas terrorist attacks against Israel sparked a war in Gaza, both sides agreed to the first phase of a peace proposal, Trump announced on Oct. 8. Under the plan, Hamas agreed to release all 20 remaining living hostages held in the Gaza Strip in exchange for Israel freeing about 2,000 Palestinian prisoners, including roughly 250 convicted terrorists.

During an address to Israel’s parliament, the Knesset, Trump hailed the Middle East ceasefire as a “historic day.”

Yet many in Hollywood who repeatedly called for a ceasefire throughout the conflict — including members of campaigns such as Artists4Ceasefire and Film Workers for Palestine — have either stayed quiet or criticized the breakthrough, with few acknowledging Trump’s role in securing it.

Billie Eilish wears a pro-Gaza pin from Artists4Ceasefire while attending the 96th Annual Academy Awards on March 10, 2024, in Hollywood, California. (Arturo Holmes/Getty Images)

HAMAS ACCEPTS TRUMP PEACE PLAN ENDING 2 YEARS OF WAR IN GAZA, RETURNING HOSTAGES

Pro-Israel actor and comedian Michael Rapaport was among those who noticed. He called out several celebrities he said were now “silent” about the ceasefire, accusing them of “performance” activism in an Oct. 11 Facebook post.

“CEASEFIRE is NOW, where are these people?” Rapaport wrote, naming actors Mark Ruffalo, John Cusack, Hannah Einbinder, Javier Bardem and singer Lorde. “The war in Gaza is ending. The so-called ‘genocide’ is over. Because it was never about peace. It was about performance,” he added.

Columnist Paula Froelich also criticized about a dozen celebrities who publicly called for a “Free Palestine” and “ceasefire now” or wore a red-hand pin to the Oscars in 2024. She said many have since stayed silent on the peace deal or continued to blame Israel “for all atrocities that have happened in the past two years.”

“If I were less charitable, I might argue that Hollywood celebrities care more about a performative farce — scolding Israel and our president — than seeing a Free Palestine actually happen in real time. How’s that for hypocrisy?” she wrote in her column for the U.K. newspaper The Times.

Zegler at film premiere

“Snow White” lead actress Rachel Zegler became a lightning rod for controversy when she expressed her views on the Israel-Gaza war and Trump voters. In an Aug. 2024 post about the trailer for “Snow White,” the actress wrote, “And always remember, free Palestine.” (VALERIE MACON / Contributor)

‘SNOW WHITE’ ACTRESS RACHEL ZEGLER IS UNCONCERNED ABOUT HOW HER VIEWS ON GAZA COULD AFFECT HER CAREER

Some supporters of the “Free Palestine” movement maintain that the ceasefire does not fully address the humanitarian crisis or allegations accusing Israel of genocide.

Fox News Digital reached out to representatives for figures who have publicly supported the Artists4Ceasefire or Free Palestine movements — including Ruffalo, Joaquin Phoenix, Billie Eilish, Rachel Zegler and Lorde — for comment on the ceasefire and Rapaport’s criticism but did not receive a response.

A few actors have spoken out on the peace deal, but not favorably. John Cusack, who has faced criticism from an antisemitism watchdog in the past, mocked the ceasefire as a “photo op” for Trump and Israeli Prime Minister Benjamin Netanyahu.

“To anyone who believes for a moment Netanyahu will stop killing — there’s a bridge in Brooklyn up for sale,” Cusack wrote Oct. 14. “He’ll give Trump his photo op — and then resume,” he added in the post, accusing both leaders of using the deal for political gain.

Spanish actor Javier Bardem, who wore a keffiyeh to the 2025 Emmy Awards, called the ceasefire “very good news” in an Instagram post but said it was “by no means a fair plan for the rights and future of the Palestinian people.” He also shared a clip from MSNBC’s “The Weekend,” where guest Noura Erakat claimed Trump’s Gaza plan was “another way of continuing [Israel’s] occupation.”

Javier Bardem standing

Javier Bardem wore a keffiyeh and declared “Free Palestine” from the red carpet at the 2025 Emmy Awards. ( Nathan Congleton/NBC via Getty Images)

JAVIER BARDEM TELLS ‘THE VIEW’ HE BELIEVES ISRAEL IS COMMITTING ‘GENOCIDE’ IN GAZA

“Hacks” actress Hannah Einbinder, who made headlines earlier this year for shouting “F— ICE and free Palestine” during her 2025 Emmy Awards acceptance speech, reposted several messages from other accounts questioning whether the ceasefire would hold. One warned there was “no guarantee this genocide will stop” while another criticized the peace terms. 

Other celebrities expressed cautious optimism. Progressive actors Mark Ruffalo and Susan Sarandon shared a statement from Artists4Ceasefire on Oct. 10 calling the agreement “an urgent and heartening moment of relief.” 

The group added, “It brings hope that precious lives can be saved, and that Israel’s bombing and intentional starvation of Palestinian civilians will end, that all hostages are safely returned, and that desperately needed humanitarian aid can flood into Gaza. We hold cautious hope that the ceasefire will last, and will continue to demand it is made permanent.”

Leading up to the deal, more than 1,000 actors, directors and film workers signed a pledge to boycott Israeli film institutions through the activist group Film Workers for Palestine. 

Mark Ruffalo and Susan Sarandon marching

Mark Ruffalo and Susan Sarandon are two high-profile figures involved in the Artists4Ceasefire movement. (Alex Kent/Getty Images)

TRUMP LAUDED BY MSNBC, LIBERAL MEDIA FIGURES FOR SECURING ISRAEL PEACE DEAL

“Inspired by Filmmakers United Against Apartheid, who refused to screen their films in apartheid South Africa, we pledge not to work with Israeli film institutions implicated in genocide and apartheid against the Palestinian people,” the group’s statement said. Signatories reportedly included Ruffalo, Emma Stone, Peter Sarsgaard, Lily Gladstone, Olivia Colman, Sarandon and Tilda Swinton.

The group posted a statement to Instagram on Oct. 15 declaring the boycott against Israel would remain in place “until Palestinians are no longer subjected to occupation, apartheid, and genocide.”

“This catastrophe, this genocide, has not ended with one call for ceasefire. And it will not end so long as the perpetrators of this genocide continue to avoid accountability,” the post added.

Despite the criticism, some actors have publicly praised the peace agreement. 

Israeli-American actress Natalie Portman called it a “momentous day” during an appearance at a film festival in France, saying, “It feels almost crazy to be talking about anything else except celebrating — hopefully — peace.” 

British actress Frances Barber also commended Trump for his role in the deal, writing on X, “I had TDS [Trump Derangement Syndrome], and I’m now eating my words,” while reposting a photo showing a “Thank You” message to Trump written in the sand on a Tel Aviv beach.

CLICK HERE TO GET THE FOX NEWS APP

Fox News’ Hanna Panreck, Marc Tamasco and Gabriel Hays contributed to this report.

Google, Dior hit in massive Salesforce credential theft data attacks

0


NEWYou can now listen to Fox News articles!

You might have noticed that in the past few months, many companies have disclosed data breaches, including Google, Dior and Allianz, and one name that appeared in most cases was Salesforce. Hackers did not breach company networks directly or exploit vulnerabilities in Salesforce’s core software. Instead, they targeted the tools and people around it by tricking employees into granting access, compromising third-party apps and abusing overly broad permissions.

Once inside, they siphoned sensitive data from Salesforce environments on an unprecedented scale. Nearly a billion records were stolen across dozens of organizations, and now cybercriminals are extorting victims by threatening to publish the data unless hefty ransoms are paid. Let’s look at the recent Salesforce incidents in detail and why this is such a big deal.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

JEEP AND CHRYSLER PARENT STELLANTIS CONFIRMS DATA BREACH

Salesforce Building in New York City

Hackers are weaponizing stolen Salesforce credentials to access company secrets. (REUTERS/Brendan McDermid)

Why Salesforce is the perfect target

Salesforce is not just another cloud platform. It is the backbone of how thousands of companies manage relationships with their customers. The platform powers everything from sales pipelines and marketing campaigns to support tickets and partner communications. Banks use it to track client accounts, airlines rely on it to manage frequent flyer programs, and retailers store customer purchase histories and loyalty data inside it. In many organizations, Salesforce sits at the center of daily operations, acting as a single system that touches sensitive information across departments.

That is why the scale of these breaches is so significant. A successful attack on a Salesforce instance becomes a window into a company’s customers, business strategy and internal processes. For cybercriminals, the potential payoff is enormous, and the recent incidents showed just how much damage they can cause without ever breaking into a company’s primary network.

The breaches hit companies across sectors, from Adidas and Allianz to Qantas, Google and Pandora Jewelry. Attackers often use voice-phishing calls or realistic fake apps to manipulate Salesforce administrators into installing malicious software. This allowed them to steal OAuth tokens and query data directly from CRM systems, a technique linked to groups like ShinyHunters.

Other attacks originated in compromised third-party integrations. One of the most damaging involved a chatbot tool called Drift, where stolen tokens gave attackers access to Salesforce instances at hundreds of companies.

The fallout was enormous. Coca-Cola’s European division lost more than 23 million CRM records, while Farmers Insurance and Allianz Life reported breaches affecting over a million customers each. Even Google admitted that attackers accessed a Salesforce database used for advertising leads.

TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED

A man uses a smartphone, illustrating the vulnerability of mobile devices in modern cybercrime.

Major brands like Google, Dior and Allianz are among those caught in the data fallout. (Kurt “CyberGuy” Knutsson)

Exploiting weak links in the ecosystem

It’s hard to break through firewalls or exploit technical vulnerabilities, but it’s much easier to manipulate people. Attackers have figured this out, and they are now focusing their efforts on human behavior and the less-protected edges of cloud ecosystems. Employees with administrative privileges were often tricked into authorizing malicious apps, while default permission settings allowed those apps to operate undetected.

Once they obtained the data, the hackers did not simply try to sell it. They used it as leverage. Earlier this month, a loosely organized cybercrime group known by names such as Lapsus$, Scattered Spider and ShinyHunters launched a dedicated data leak site on the dark web, threatening to publish sensitive information unless victims paid a ransom.

As reported, the site is designed to pressure companies into paying to prevent their stolen data from being made public. “Contact us to regain control of your data governance and prevent public disclosure,” reads one message on the site. “Do not be the next headline. All communications require strict verification and will be handled with discretion.”

The leak site lists several alleged victims, including FedEx, Hulu (owned by Disney) and Toyota Motors. It is also unclear whether some of the organizations known to have been breached but not listed on the site have paid ransoms to keep their data from being released.

FARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANS

A person types on a laptop computer in a home office setting, representing remote access points targeted in data breaches.

Cybercriminals are now extorting victims online, threatening to leak billions of stolen records. (Kurt “CyberGuy” Knutsson)

Salesforce’s response

Salesforce told Cyberguy that it is “aware of recent extortion attempts by threat actors” and will not engage with, negotiate with, or pay any extortion demands. A company spokesperson provided the following statement:

“We are aware of recent extortion attempts by threat actors, which we have investigated in partnership with external experts and authorities. Our findings indicate these attempts relate to past or unsubstantiated incidents, and we remain engaged with affected customers to provide support. At this time, there is no indication that the Salesforce platform has been compromised, nor is this activity related to any known vulnerability in our technology.”

6 steps you can take to protect your data

You might think a breach like this is a company problem, something for IT teams and cybersecurity experts to deal with. However, when attackers gain access to platforms like Salesforce, the data they are after is usually not the company’s. It is yours. Your contact details, purchase history, support tickets and even private conversations can end up in the wrong hands. And once that happens, the risks do not stay confined to one company. That is why it is worth taking a few proactive steps now, even if the company has not contacted you about an incident yet.

1) Lock down your accounts now

If you have interacted with any of the companies mentioned in the breach, or suspect your data might be part of it, change your passwords for those services immediately. Better yet, use a password manager to generate strong, unique passwords for every site. A good tool will also alert you if any of your credentials appear in future data leaks.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

2) Turn on two-factor authentication

Even if a password is stolen, two-factor authentication (2FA) adds a crucial extra layer of security. Enable it for your email, banking apps, cloud storage and any service that offers it. It is one of the simplest ways to block attackers from hijacking your accounts with stolen credentials. 

3) Use a personal data removal service

Even if your data was part of a breach, you can still limit how much of it is floating around online. Personal data removal services scan and delete your personal information from data broker websites that sell or share your details without consent. These brokers often trade in names, addresses, phone numbers and even purchase histories, the same type of data leaked in Salesforce-related breaches.

By removing your records from these public databases, you make it far harder for scammers, identity thieves and marketers to find or misuse your information. Many services, like Incogni, handle the entire opt-out process automatically and keep monitoring to ensure your data stays removed.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

4) Spot and stop targeted phishing attacks

Attackers who have CRM data often know more about you than a typical scammer. They might reference past purchases, support cases, or other personal details to make their messages sound legitimate. Treat unexpected emails, texts, or phone calls with suspicion, especially if they involve links or requests for payment.

The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

5) Use identity monitoring tools

Data breaches do not always result in immediate damage. Sometimes, criminals sit on stolen data for months before using it. These services can continuously monitor the dark web for your personal information and notify you if your data appears in new leaks. That gives you time to act before problems snowball.

Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

6) Know your rights

If you think your data was exposed, companies are legally obligated in most regions to inform you. Do not hesitate to contact them directly and ask for details on what was stolen and what steps they are taking to protect affected customers. The more pressure users apply, the more likely companies are to tighten security practices.

CLICK HERE TO GET THE FOX NEWS APP 

Kurt’s key takeaway

Attackers can expose your personal data even if you are careful. They gain access to corporate cloud environments and can see customer names, emails, purchase histories and other sensitive details. For users, this means it is crucial to stay vigilant. Criminal groups use this stolen information to launch targeted phishing attacks, open fake accounts, or impersonate you elsewhere. Some even cross-reference leaked Salesforce data with information from previous breaches to build disturbingly complete profiles of their victims.

Should companies face stricter penalties when sensitive customer data is stolen? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved. 



Source link

Apple launches iOS 26 with new Preview app for iPhone document editing

0


NEWYou can now listen to Fox News articles!

Apple has officially launched iOS 26, and with it comes a fresh look and one standout new feature: the Preview app. If you’ve updated your iPhone and noticed a new icon that looks like it belongs on a Mac, you’re not imagining things. Preview has finally arrived on iOS, and it’s more useful than you might think. Many iPhone users have long wanted an easier way to edit, annotate and scan documents without relying on third-party tools. Now, Apple’s built-in Preview app fills that gap, combining features from the Files app, Markup tools and the camera’s document scanner into one streamlined experience.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

What Apple’s Preview app can do

Just like the version on Mac, the Preview app on iPhone lets you handle basic photo edits and PDF changes with ease. You can:

  • Open and view PDFs or images directly from your Files app.
  • Annotate, draw and highlight content using the familiar markup tools.
  • Add text boxes or signatures to forms.
  • Crop, resize, or rotate photos.
  • Scan documents straight from your camera.
iPhone home screen displaying the Photos and Preview apps, showing where the Preview app appears after installation.

The new Preview app on iPhone makes scanning and signing documents feel effortless. (Kurt “CyberGuy” Knutsson)

When you open the app, you’ll see simple options like New Document or Scan Document. Tap the small Files section at the bottom to browse your phone’s stored content. The interface feels like Apple’s previous screenshot editor, so it’s instantly familiar. You can tap the three-dot menu for advanced tools like background removal, which saves you from downloading extra editing apps. If you open a PDF, Preview automatically detects fillable text boxes and lets you add your signature, perfect for signing forms or agreements on the go.

10 IOS 26 TRICKS THAT HELP YOU GET MORE OUT OF YOUR IPHONE

Inside the iPhone Preview app, highlighting options to create a

With built-in markup tools, you can highlight, draw or add your signature in seconds. (Kurt “CyberGuy” Knutsson)

How to scan a document using the Preview app

Preview’s built-in scanning tool is one of its best upgrades. It’s fast, accurate and ideal for receipts, contracts, or notes you want to store securely. If you’re already using Notes or Files to scan documents, you’ll find Preview much faster. It centralizes everything, no switching between multiple apps. Here’s how to do it:

  • Open the Preview app.
  • Tap Scan Documents from the home screen or the plus (+) icon if you’re already viewing another file.
  • Point your iPhone camera at the page you want to scan and hold it steady.
  • Preview will automatically detect the edges and capture the image.
  • After Preview captures the document, it shows a thumbnail.
  • If the edges aren’t right or the lighting is poor, tap Retake.
  • If you’re satisfied, tap the Blue Check mark in the upper right of the screen. This creates a digital document.

How to save or export your document

After scanning your pages, you can easily save, rename, or share your document directly from the Preview app using these steps.

Save to Files

  • Tap the Share button (a square with an arrow) and choose Save to Files. Select where you’d like to store it, such as iCloud Drive > Documents or On My iPhone > Scans, then tap Save.The scan is saved as a PDF file you can access anytime.

Rename the document

  • Tap the title at the top of the screen, type a new name such as Receipt-Oct2025.pdf, and tap Done.

Share the document

  • From the same Share menu, you can send the PDF by AirDrop, Messages or Mail.

Where to find saved scans later

  • Go to the Files app
  • Tap Browse
  • Then navigate to On My iPhone
  • Click Preview
  • Tap Scanned (or whichever folder you selected). You can open, mark up, or share the PDF directly from there.

HOW TO SAVE ANY FILE AS A PDF

iPhone home screen showing the Files app highlighted, followed by steps inside the Files app to scan and access documents stored locally under

Quickly find your saved scans in the Files app under Preview, where you can open, edit or share them. (Kurt “CyberGuy” Knutsson)

Similar tools for Android and Windows

If you’re on Android or Windows, you can do many of the same things using tools built into those platforms.

How to scan and edit documents on Android

If you’re using an Android phone running Android 6.0 or later, the Google Drive app includes a built-in document scanner powered by Google Play services. Starting in September 2025, Google began rolling out an upgraded scanning experience with sharper previews, smarter cropping and rotation, improved shadow removal and color filters that make your scans look more professional. The update also adds smoother page adjustments and a thumbnail carousel to easily reorder or delete pages before saving.

  • Open the Google Drive app on your Android device and make sure it’s updated through the Google Play Store for the latest features.
  • Tap the “+” or camera icon, then select Scan from the pop-up menu. Some phones may show a dedicated camera button for this.
  • Hold your phone steady so the entire page is visible. Drive automatically detects the edges and captures the document.
  • Use the built-in crop, rotate and color filter tools to fine-tune your scan. You can also remove shadows or retake a page if needed.
  • Tap Add page to create a multi-page PDF. If your device supports the new AI-powered scanner, Drive may detect and capture pages automatically.
  • Review your pages using the thumbnail carousel at the bottom to rearrange or delete any before saving.
  • Tap Save, enter a file name, choose your Drive folder and select whether to save as a PDF or JPG.
  • Open the saved file in Drive to annotate or highlight text using markup tools like drawing or underlining.
  • Share or export the finished document by sending a Drive link, attaching it to an email, or downloading it to another app.

EVEN WITH TRUMP’S TARIFF BLESSING, APPLE HIKES IPHONE PRICES

Android device screen showing Google Drive interface with the scan icon highlighted at the bottom, indicating where to tap to scan documents directly into Drive.

Use Google Drive’s upgraded scanner on Android to capture, crop and clean up documents in seconds. (Kurt “CyberGuy” Knutsson)

How to annotate and sign PDFs on Windows

Microsoft Edge includes a built-in PDF reader that supports inking, highlighting and adding comments or text notes. However, Edge is not a full PDF editor for rewriting text or rearranging pages. You can still draw or sign directly onto a PDF using the Draw/Pen tool, then save your edits. Some recent versions of Edge have limited annotation support, so features may vary. Because of those limitations, many Windows users rely on third-party PDF editors for complete editing control, such as adding text, rearranging pages, or performing OCR. The built-in Snipping Tool remains a quick way to capture and mark up screenshots or documents before saving or sharing. These steps work on both Windows 10 and Windows 11 using the Chromium-based Microsoft Edge browser.

The exact toolbar layout may differ depending on your version.

  • Open the Snipping Tool to capture a screenshot or document.
  • Choose the capture type: region, freeform, full screen, or window.
  • Save your capture as a PNG or JPG, or copy it to your clipboard for quick pasting.
  • To edit a PDF instead, open the file directly in Microsoft Edge.
  • Right-click the PDF file and select Open with → Microsoft Edge, or drag the file into the Edge window.
  • Use the Pen / Draw tool to write, draw, or sign directly on the PDF.
  • Highlight text by selecting it and choosing Highlight from the pop-up menu.
  • Add notes or comments with Add comment/text note.
  • Use the Draw tool again to sign your name, then save your edits.
  • Click the Save or Save As icon (the diskette symbol) to store your changes.
  • If your annotations don’t appear after saving, choose Print → Save as PDF to permanently embed them.

Best alternative PDF tools for Windows users

If Microsoft Edge doesn’t meet your editing needs, consider these free or paid alternatives that work across different devices:

  • PDF24 Creator: A free, highly rated PDF editor designed for Windows. It lets you merge, compress, sign, and convert PDFs without watermarks.
  • Xournal++: A popular open-source tool for Windows, macOS and Linux that lets you annotate PDFs with a pen or stylus.
  • Foxit PDF Editor: A professional, cross-platform editor with full text editing, signing and OCR tools. It’s available for Windows, macOS, iPhone and Android through the Foxit PDF Editor Mobile app.

These tools give you far more flexibility than Edge if you regularly edit, organize, or sign digital documents across devices.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

CLICK HERE TO GET THE FOX NEWS APP

Kurt’s key takeaways

Apple’s new Preview app in iOS 26 makes editing and scanning documents easier than ever. It brings together familiar tools from Files, Markup and the camera into one place, saving you time and steps. The experience feels seamless, especially if you often switch between your Mac and iPhone. For Android and Windows users, similar built-in tools already offer strong alternatives. Google Drive’s upgraded scan feature and Microsoft Edge’s PDF tools both make it simple to capture, annotate and share files. These options prove that whether you’re on iPhone, Android, or Windows, document management has never been more convenient. In the end, Preview’s arrival on iPhone marks another step toward a unified Apple ecosystem where productivity tools just work. If you’ve ever wished you could scan, sign, or edit a file in seconds, this update delivers.

Do you think Apple’s new Preview app will replace your go-to document editor, or will you keep using third-party tools? Let us know by writing to us at Cyberguy.com/Contact

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved. 



Source link

Ancient golden brooch and jade stone found in Troy dating to 2,500 B.C.

0

NEWYou can now listen to Fox News articles!

Turkish officials recently unveiled a gleaming gold brooch and a rare jade stone in Troy – a remarkable breakthrough that sheds light on the city’s pre-Greek past.

The artifacts were found by archaeologists excavating the Troy archaeological site, located in northwestern Turkey.

Troy was once considered a mythical city, and its remains were first unearthed by Heinrich Schliemann in 1870. The settlement is most famous for being depicted in Homer’s epic poems “The Iliad” and “The Odyssey.”

ANCIENT CIVILIZATION’S GOLD COINS, LUXURY ARTIFACTS UNEARTHED DURING ‘UNPRECEDENTED’ DIG

The Turkish Directorate of Communications announced the new finds in a Sept. 30 release, citing Anadolu Agency.

The artifacts were found in the Troy II settlement layer, which dates back to 2,500 B.C. — some 4,500 years ago. 

Archaeologists in northwestern Turkey uncovered a golden brooch and rare jade stone in the remains of the ancient city of Troy. (Bettman via Getty Images; @MehmetNuriErsoy via X)

Turkish officials say the discovery also sheds light on “the long-standing debate regarding the beginning of the Troy II period,” which is usually cited as being between 2550 and 2500 B.C.

RARE ANCIENT GOLD DISCOVERY MADE BY FLORIDA STUDENT AT ARCHAEOLOGICAL SITE

In an X post, Mehmet Nuri Ersoy, the Turkish minister of culture and tourism, lauded the discovery of the brooch.

Trees, stones at site of ancient Troy

Excavations at Troy continue to reveal extraordinary finds linking Anatolia with the early Mediterranean world. (LTL/Heritage Images via Getty Images)

“This brooch, the best-preserved of only three known examples in the world, is among the most significant finds of the last 100 years,” wrote Ersoy.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

He said that jade stones, like the one recently found, were seen as luxury items in antiquity.

Split image of brooch, jade stone

The golden brooch and jade stone, found in the Troy II layer, date back roughly 4,500 years. (@MehmetNuriErsoy via X)

The gem was not native to Anatolia, suggesting it arrived through long-distance trade.

MORE FROM FOX NEWS LIFESTYLE

All artifacts are planned to be shown at the Troy Museum in Çanakkale, Turkey.

View of ruined structures at Troy

UNESCO calls Troy one of the most famous archaeological sites in the world, rich in cultural heritage and myth. (LTL/Heritage Images via Getty Images)

Troy was added to the UNESCO World Heritage List in 1998. 

UNESCO’s website says Troy is considered one of the most famous archaeological sites in the world.

CLICK HERE TO GET THE FOX NEWS APP

“Its extensive remains are the most significant and substantial evidence of the first contact between the civilizations of Anatolia and the burgeoning Mediterranean world,” UNESCO says.

South Korea defends democratic legitimacy following martial law crisis and new government

0

NEWYou can now listen to Fox News articles!

It has been a turbulent yet inspiring year for Koreans. A declaration of martial law last winter plunged the nation into uncertainty, but what followed was not chaos – it was the reaffirmation of a people’s unshakable faith in democracy. 

The “Revolution of Light,” culminating in the peaceful election of a new government, reminded the world that the Republic of Korea’s constitutional order rests not on the will of any ruler, but on the collective conscience of its citizens. 

Some observers abroad have mistaken the intensity of Korea’s political transition for fragility or deviation from democratic norms. In truth, such intensity is the very pulse of democracy itself. Our debates are often fierce, our elections passionately contested, yet our institutions endure. That resilience – born of experience, sacrifice, and civic discipline – is Korea’s greatest democratic asset.

President Donald Trump greets South Korean President Lee Jae Myung upon his arrival at the White House on Aug. 25, 2025, in Washington, D.C. (Chen Mengtong/China News Service/VCG via Getty Images)

Since taking office, President Lee Jae Myung has acted swiftly to reinforce the foundations of democracy at home and to renew the Republic of Korea’s partnership with the United States. In word and deed, President Lee has recognized the vital importance of the ROK-U.S. alliance and strengthened pragmatic cooperation with President Donald Trump, and put our interlocking security and economic objectives, and shared values at the heart of his agenda. 

TRUMP DELIVERED PEACE AND A FUTURE WHERE OTHERS ONLY TALKED

This approach reflects Korea’s confidence as a mature democracy and responsible global partner. President Lee views the alliance not merely as a legacy of the past, but as a living partnership, adapting to new challenges – from regional security and economic cooperation to advanced future technology.

This vision was clear at their August summit, where the two leaders spoke with candor and mutual respect, underscoring their shared determination to build what they called a “Future-Oriented Comprehensive Strategic Alliance.” President Trump’s remark, “We’ve gotten along very well,” captured the new tone of trust shaping this alliance. 

President Lee and the whole of the Korean government have meticulously ensured that even as we focus on restoring our democratic system, we not flail for one second in our responsibilities as friend and ally.  This makes certain commentaries – portraying Korea’s new leadership as undemocratic, illegitimate or even hostile to religion – so bewildering and saddening. Such claims, often repeated in online forums and even on opinion pages, bear little resemblance to facts and hinder our joint efforts for real solutions. 

HOW TRUMP’S RELENTLESS MIDDLE EAST GAMBLE FINALLY FLIPPED THE SCRIPT

Let’s set the record straight: The government of the Republic of Korea was democratically elected. President Lee prevailed in a fair and transparent vote recognized around the world for meeting the highest election standards. Neither Korea’s independent judiciary nor its opposition parties objected to the result. 

Since then, the principles of the rule of law have been scrupulously observed. Ongoing legal proceedings concerning the previous administration’s declaration of martial law and other alleged abuses of power are being conducted by independent prosecutors appointed by the National Assembly – not by the Presidential Office. These legal proceedings demonstrate the rule of law, not the erosion of it.

Equally unfounded are recent claims that the new government is “anti-Christian.” Such narratives appear to arise from ongoing investigations into bribery allegations involving church funds, but for people familiar with Korea, the notion of prejudice is demonstrably absurd.

Christianity, along with Buddhism and other faiths, has played an integral role in Korea’s social and cultural life. Christian missionaries helped establish many of the nation’s leading educational and medical institutions, countless Christians sacrificed their lives for Korea’s independence from Japanese colonial rule. 

THATCHER AT 100: LESSONS IN CIVILITY, STRENGTH AND ENDURING ALLIANCES

Today, a large share of Korean population identifies as Christian, with millions of both Protestants and Catholics contributing to the fabric of Korean society. These individuals, like people of all faiths, continue to play a vital role in civic life, community service and the pursuit of national unity.

President Lee himself is a man of Christian faith. He and his administration have the deepest respect for freedom of religion and expression, which our Constitution enshrines. They, like all Koreans, are unambiguously proud of the legacy of Christianity and believe freedom of religion in the Republic of Korea rivals that of any place in the world.

To portray legitimate, lawful efforts to restore democratic order as a campaign against Christianity is not only misleading, but it undermines Christian legacy and respect for religious freedoms that are central to Korea’s democratic values.

As Koreans committed to democracy, vigorous debate and even disagreement are more than welcomed. It is what the new Korean government strove so vigorously to safeguard these past four months. But mischaracterizing all that has occurred does nothing to advance mutual understanding or produce real solutions for the Koreans and Americans alike.

CLICK HERE FOR MORE FOX NEWS OPINION

The Republic of Korea and the United States have sustained our alliance through eight decades of bravery and sacrifice. Today’s challenges require nothing less. Under President Lee’s government, Americans can be assured that they have a friend and partner who shares core values and is committed to the success of both of our nations. 

Look no further than their summit on Aug. 25 where the two leaders ushered in the era of a “Future-oriented Comprehensive Strategic Alliance” – one that looks confidently toward a more secure, democratic and prosperous future for both nations. Korea’s story is not one of uncertainty but of conviction: that a free people, tested by history, can renew both their democracy and their alliance with courage and grace. 

CLICK HERE TO GET THE FOX NEWS APP

Hacker plays ‘Free Palestine’ message at Harrisburg International Airport

0

NEWYou can now listen to Fox News articles!

A public address system was hacked on Tuesday evening at the Harrisburg International Airport (HIA) in Pennsylvania.

“An unauthorized user gained access to the airport PA system and played an unauthorized recorded message,” HIA officials said in a statement, according to FOX 43.

The message lasted for about 10 minutes, the airport reported. 

AIRLINES CANCEL FLIGHTS AS AIRPORTS EXPERIENCE ‘MAJOR DISRUPTIONS’ OVER PROTESTS, STRIKES

The hacker can be heard saying “Free Palestine” and “F— Netanyahu and Trump” over the speaker, according to videos circulating on social media. 

“Turkish hacker Cyber Islam was here,” says the unauthorized user in an identifying message.

A hacker identifying as “Turkish Cyber Islam” breached Harrisburg International Airport’s public address system this week. (iStock)

The airport called the announcement a “political message” that did not contain any threats to airlines, passengers or employees, according to HIA. 

A Delta flight that was boarding at the time of the incident was searched out of an abundance of caution, the airline confirmed to Fox News Digital.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

“As the safety and security of our customers and employees comes before all else, Delta followed the direction of TSA to return to the gate and complete a security check of the aircraft. We appreciate our customers’ patience and cooperation,” said a spokesperson in a statement to Fox News Digital. 

protestors hold up free palestine posters at demonstration in Warsaw.

The hacker (not pictured) can be heard saying “Free Palestine” and “F— Netanyahu and Trump” over the speaker. (Attila Husejnow/SOPA Images/LightRocket via Getty Images)

The passengers on the flight headed to Atlanta were deplaned as TSA conducted a security sweep, delaying the flight by 45 minutes. 

The public address system was shut off and is under investigation by police. 

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

The Harrisburg International Airport was said to be operating normally. 

Fox News Digital reached out to HIA, TSA and the Secret Service for comment. 

Waiting in the airport terminal watching planes

Following the incident, a Delta flight was searched out of an abundance of caution. (iStock)

The incident comes after the FBI issued a warning in July about a notorious cybercriminal group dubbed “Scattered Spider” targeting the airline sector, FOX Business reported.

CLICK HERE FOR MORE LIFESTYLE STORIES

The FBI posted on X that the group relies on “social engineering techniques, often impersonating employees or contractors to deceive IT help desks into granting access” and frequently involves methods to bypass multifactor authentication (MFA), such as convincing help desk services to add unauthorized MFA devices to compromised accounts. 

CLICK HERE TO GET THE FOX NEWS APP

“They target large corporations and their third-party IT providers, which means anyone in the airline ecosystem, including trusted vendors and contractors, could be at risk,” the FBI wrote.

Fox News Digital’s Daniella Genovese contributed reporting.Â