1.2 C
New York
Thursday, February 26, 2026
Home Blog Page 684

Ask an expert: ‘Is poor balance a sign of a serious health issue?’

0

While some people tend to be a little clumsier than others, constantly bumping into things could be a sign of a serious health issue.

For some, poor balance can lead to a decreased quality of life, loss of independence and even severe health complications, according to Ninoska Alvarez, a physical therapist and balance specialist with Brooks Rehabilitation in Florida.

“As we age, the three sensory systems that impact balance — the visual system, somatosensory system and vestibular system — can deteriorate, which results in balance issues,” Alvarez said in a statement to Fox News Digital.

BE WELL: PREVENT DANGEROUS FALLS AMONG OLDER ADULTS BY TAKING KEY STEPS

“Whenever one or more of these systems no longer functions as well as it once did, balance deficits can arise.” 

For issues that come on suddenly, stroke is typically the most common issue, Alvarez said.

Three sensory systems impact our balance: the visual system, somatosensory system and vestibular system, said a physical therapist. (iStock)

“For some slower progressive diseases that can cause issues, it may be multiple sclerosis (though initial symptoms can come on suddenly), degenerative diseases in the brain (such as cerebellar degeneration), Parkinson’s disease or Guillain-Barre syndrome,” she said. 

SPENDING THE NIGHT IN AN EMERGENCY ROOM PUTS OLDER ADULTS AT HIGHER RISK OF DYING IN THE HOSPITAL: STUDY

Not all cases of poor balance are linked to serious health issues.

Issues with the inner ear can suddenly change one’s stability, Alvarez noted. 

“Gradual worsening of balance can also occur for people who develop peripheral neuropathy (issues affecting the ability of the nerves, usually in the lower leg, to send or receive information),” she said.

Man headache

Some warning signs of more serious issues include sudden significant changes in stability, sudden changes in vision, an inability to speak — and the onset of what feels like the “worst headache ever,” an expert said. (iStock)

Changes after periods of immobilization or lessened mobility — often seen if someone is hospitalized for a while or suffers an injury that affects the ability to stand or walk for a period of time — can also affect balance, Alvarez added.

4 warning signs to know

If you notice any of these red flags, it’s a good idea to reach out to a medical professional for an evaluation, Alvarez advised.

Sign No. 1: Relying on external support

Using railings, furniture, people or other items to help you move around more than usual could indicate that you have trouble maintaining your balance independently, said Alvarez.

“An increase in tripping or stumbling may be a sign of poor balance.”

Sign No. 2: Feeling disoriented in the dark

“If you struggle to navigate your environment in the dark — for example, when using the bathroom in the middle of the night — your body might be trying to tell you that your balance systems aren’t working as they should,” the therapist noted.

Woman on floor

Unintentional falls are the leading cause of non-fatal injuries across every age group, according to the Centers for Disease Control and Prevention. (iStock)

Sign No. 3: Feeling unsteady with eyes closed

If you feel unsteady while standing or completing a task with your eyes closed — such as when washing your hair in the shower — that could be a sign that your balance is too reliant on visual input and that one or more of your balance systems are not functioning correctly, according to Alvarez.

Sign No. 4: Vertigo or an increase in tripping

“Vertigo and dizziness can be symptoms of an underlying issue affecting balance, such as problems with the inner ear or vestibular system,” Alvarez told Fox News Digital. 

10 HEALTHY HABITS TO PRACTICE EVERY DAY THAT TAKE LESS THAN 10 MINUTES EACH

“An increase in tripping or stumbling may be a sign of poor balance, potentially due to muscle weakness, neurological issues or other factors affecting balance,” she added.

These conditions also increase the risk of falls. 

Man exercising

Multi-modal exercise is one of the most effective means of improving balance and reducing fall risk, a physical therapist said. (iStock)

Additional warning signs of more serious issues include sudden significant changes in stability, sudden changes in vision, an inability to speak, the onset of what feels like the “worst headache ever” and sudden weakness in the body, the doctor said.

For non-emergency symptoms, Alvarez recommends seeing a primary care physician, who will likely provide a referral to a neurologist. If there is any concern about an emergency, he said to visit the emergency department of a hospital.

Preventing balance issues

Alvarez shared two of the most effective ways to prevent future balance issues.

Multi-modal exercise

“While exercising is fantastic, multi-modal exercise training is even better,” Alvarez said.

“Seek out help if you notice your balance is deteriorating before it results in a fall and potential injury.”

“By engaging in diverse physical activities and targeting cardio, flexibility, mobility and strength as opposed to just one form of exercise, you can ensure that your body, balance and sensory systems are more resilient as you age.”

CLICK HERE TO SIGN UP FOR OUR HEALTH NEWSLETTER

Fall-proofing strategies

Unintentional falls are the leading cause of non-fatal injuries across every age group, according to data from the Centers for Disease Control and Prevention (CDC). 

Couple with doctor

For those experiencing balance issues, a primary care physician will likely provide a referral for a neurological exam. (iStock)

To help prevent dangerous spills, Alvarez recommends fall-proofing your home by using nightlights and removing environmental hazards such as throw rugs or electrical cords. 

“In addition, always try to keep an eye on pets when moving around, as tripping on dogs or cats can result in a fall,” she warned.

CLICK HERE TO GET THE FOX NEWS APP

“It’s essential to understand that balance can always improve,” Alvarez added. 

“Please seek out help if you notice your balance is deteriorating before it results in a fall and potential injury.” 

For more Health articles, visit www.foxnews.com/health.

How to protect yourself from streaming hacks

0


You thought the only struggle with your streaming service might be fighting with family members over bandwidth and access, but unfortunately, hackers can also be a part of the equation if you’re not careful.

UNLOCK EXCLUSIVE INSIGHTS: JOIN KURT’S CYBERGUY NEWSLETTER FOR FREE

It’s not account access that is the worst offense that a hacker can inflict. If they do hack, it is usually through your network, and that means they can get access to most of your devices, which can spell big trouble for your privacy and security. That’s why we are grateful to Art from Florida for asking this question that we can address:

“Can a hacker get into my computer through a streaming box? I don’t care if they get into the box, but I don’t want them in my network.” — Art, Bradenton, Florida

Art, your concerns are valid. It isn’t the streaming box itself being hacked that should be your biggest concern. Yes, hackers can “get into” your streaming box, but worse, your network.

CLICK HERE FOR FREE ACCESS TO KURT’S CYBERGUY NEWSLETTER: YOUR SOURCE FOR TECH TRENDS, SECURITY, PRIVACY AND QUICK TIPS

How to protect yourself from streaming hacks

Roku Express 4K+ (Roku) (Kurt “CyberGuy” Knutsson)

How do hackers exploit your streaming devices and more?

The bad news is that your streaming box can be hacked like most devices that are linked up to the internet. There are limits to the damage they can do with that access. Their damage would be limited by the mechanics of the streaming box: for instance, if your Roku has no camera but a microphone, they can listen to your conversation, but they won’t be able to watch you. They may have access to what you’ve been watching or some account information.

How to protect yourself from streaming hacks

Chromecast with Google TV (Google) (Kurt “CyberGuy” Knutsson)

The even scarier part, however, is that hackers usually have to infiltrate your network in order to have access to your streaming box, which means they’ll have access to most devices that are part of that network. Those other devices are usually fully equipped with the ability to spy on you and hold valuable data. The best approach is to protect and secure your network to prevent hacking of your network in the first place. First, as an example, let’s check your Roku to make sure no one uninvited is connecting to it.

MORE: BEST STREAMING DEVICES OF 2024

Someone else is controlling my Roku 

We often hear of people wondering how someone else nearby can get access to their Roku device. Channels may change unexpectedly, content can be cast onto the Roku, or the previously viewed shows may not be recognizable. If this happens, in addition to locking down your wireless home network and following the advice in the next section, check your Roku settings for anything unusual. Here’s how.

  • On the Roku remote, press the home button to go to the main screen. Select “Settings,” then System, find Screen Mirroring, and make sure “none” is selected for others having permission to stream content to your Roku.
  • Next, do the same for Remotes by selecting Remotes & devices from the Settings menu. Unless you have permitted others, you should not see any other remote control devices connected except yours.
  • Now check the Guest Mode by clicking Guest Mode from the Settings menu. Make sure no other people are shown – who may have access to your Roku in Guest Mode.
  • Finally, from the Settings menu, select System, then Advanced System Settings. Click Control by mobile apps and make sure you see either “default” or “disabled” selected so that no one else is using a mobile app to control your Roku.
How to protect yourself from streaming hacks

Woman with remote control watching streaming content (Kurt “CyberGuy” Knutsson)

MORE: HOW TO LOWER MONTHLY VIDEO STREAMING COSTS

10 ways to protect and secure your network

Since prevention is the best approach to keeping hackers out of your network in the first place, below are several actions you can take to ramp up security.

1) Create a strong password: Make sure your Wi-Fi network is password-protected and that you are using a strong password with upper and lower case letters, numbers, as well as symbols. It should be unique for the network and not easy to guess. Hackers often exploit the weak or default passwords that come with the devices. So, again, use strong and unique passwords for each device and change them regularly. Consider using a password manager to generate and store complex passwords.

2) Turn on encryption: Most modern routers offer WPA2 and WPA3 encryption or better to prevent unauthorized access to your network. Check out our list of top routers for best security 2024 by clicking here.

3) Update your firmware and software: Wi-Fi and cable routers, like most smart devices, need to have their firmware occasionally updated in response to known attacks by the manufacturer. It’s important to keep your device firmware & software updated to prevent any exploitation from known vulnerabilities. This includes your streaming boxes, browsers, and operating systems such as Windows and Apple’s iOS. Both Apple and Android issue updates regularly, so check for and install them often. Also, check the manufacturer’s website or app for the latest firmware versions and how to install them, but you should also enable automatic updates whenever possible.

4) Use a Firewall: A firewall protects the devices you have connected to your network from intruders on the internet. Just like a security fence protects your house from intruders, a firewall keeps cybercriminals and hackers from breaching your computer. It can take the form of software, such as a security program, or hardware, such as a router. Both perform the same function. They effectively act as a one-way digital barrier by blocking access to your network from devices on the internet while simultaneously allowing devices on your network to connect to devices on the internet.

Most routers come with network firewalls enabled. To check if your router has a firewall enabled, you can follow these steps:

  • Connect your computer to your router using an Ethernet cable or Wi-Fi.
  • Open a web browser and type the IP address of your router in the address bar. You can find the IP address on the label of your router or in the user manual. It is usually something like 192.168.0.1 or 192.168.1.1.
  • Enter the username and password to log in to your router’s web interface. The default username and password are often admin and admin, but you should change those if you haven’t done so yet.
  • Look for a section called Firewall, Security, or Advanced in the web interface. There you can see if your router has a firewall enabled or disabled. You can also change the firewall settings according to your preferences.

If your router doesn’t have a firewall, you can install a good home firewall solution on your system to prevent router attacks.

5) Be careful of downloading apps: Because malicious codes can be gained through apps from third-party sources, it is important to only download apps through authorized places such as the Apple Store or Google Play. Even when downloading from those authorized sources, check the ratings and read the reviews to make sure that apps are reputable.

6) Install good antivirus software: Having good antivirus running on your devices will alert you of any malware in your system and alert you against clicking on any malicious links that may install malware on your devices, allowing hackers to gain access to your personal information. The best way to protect yourself from these kinds of cyberthreats or having your data breached is to have antivirus protection installed on all your devices. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.

7) Use a VPN: (virtual private network) to encrypt your internet traffic and hide your online activity from hackers. A VPN creates a secure tunnel between your device and the internet, preventing hackers from intercepting or modifying your data. You can use a VPN on your streaming devices, your router, your smartphone, or your computer. See my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices.

8) Segment your network: By creating a separate network or a guest network for your streaming devices. This way, even if your streaming devices are compromised, hackers won’t be able to access your other devices that contain sensitive or personal information. You can segment your network using your router’s settings or a third-party app.

9) Disable remote access: Turn off remote access to your streaming devices and your router. Remote access allows you to control your devices from anywhere, but it also exposes them to hackers who can exploit the open ports and protocols. Unless you need remote access, turn it off in the settings of your devices and your router.

10) Turn it off: While it is easier to keep all your devices on, you can limit their time connected to the network or access to hacking by turning off and unplugging your streaming device when it is not in use.

MORE: HACKERS LATEST TRICK LOOKS LIKE FREE STREAMING MOVIES

Kurt’s key takeaways

Streaming devices pose some security risks but are unlikely to be the source of a hack into your life. Hackers can use any unprotected device connected to your network to infiltrate and compromise your security. This sort of trouble can lead to identity theft, data loss, or privacy invasion. To protect yourself and your network, you need to take some preventive measures, such as changing your passwords, updating your firmware, using a VPN, disabling remote access, and segmenting your network. By following these tips, you can enjoy your streaming services without worrying about hackers.

Have you ever experienced a security issue with your streaming devices? When was the last time you checked your privacy and security settings on your streaming device? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.



Source link

Beware of this McAfee Google Chrome pop-up scam

0


We want to warn you about a scam that you may encounter while browsing the web. A McAfee antivirus pop-up suddenly appears on your computer, claiming your device is infected and your McAfee subscription has expired. 

While it might seem legitimate, it’s really a scam. Suzy from Loudon, Tennessee, wrote to us saying she is experiencing the same thing:

“I am attempting to rid my new computer of a pesky McAfee Google Chrome Ad that keeps telling me I am infected with trojan viruses and I have an expired McAfee account with my new computer. I do not have their coverage. Per all my virus coverage, I show no infection; however, this menace keeps popping up even stating in full screen I shall lose my Windows 10 license and wipe my computer clean, etc. I shut my computer down completely… This pest has to go, and I am ready to send this pest to its graveyard – ashes baby!”

Luckily, Suzy, we have a solution to make sure you don’t put your information, finances and security at risk.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

Breaking down the McAfee pop-up scam

The McAfee scam utilizes fear and panic to make you a victim. The goal is to make you act fast. Once you see the pop-up, you see that this pop-up is telling you your computer is infected with viruses and that your McAfee subscription has expired. 

First, ask yourself if you even had McAfee software to begin with. This should be the first red flag. The scammers are preying on your fears and counting on you to fall into their trap and click anywhere on the screen. You’re tempted to click the button to proceed and subscribe to what seems like real antivirus software. After all, it uses the McAfee logo — which is synonymous with internet security.

McAfee pop-up 1

Fake McAfee pop-up   (Kurt “CyberGuy” Knutsson)

This scam can take your information using two methods. Sometimes, when you click on a pop-up like the fake one above, it will direct you to a website, asking you to re-subscribe. You enter in your data, thinking you’re getting a real antivirus software. However, in reality, you have just given a scammer your credit or debit card information, address and more.

The scam could also download malicious software once you click an option like, “Proceed,” “Get Protection” or “Scan.” That software is automatically downloaded onto your computer, and hackers can gain access.

There are several ways it can get onto your new computer. You might have downloaded a malicious file or browser extension. It can even get onto your computer if you visit a suspicious website and allow notifications.  

MORE: THIS FACEBOOK MESSENGER PHISHING SCAM IS STEALING MILLIONS OF PASSWORDS

Is that a real pop-up on my computer?

No, you might think that these are real alerts from your system or from legitimate websites like McAfee, but they are actually fake pop-ups that are trying to trick you into clicking on them. These pop-ups are not coming from your computer but from a malicious file that has integrated itself into your browser and is displaying images that look like pop-ups. If you click on them, you might end up downloading more malware, giving away your personal information, or paying money for a fake service.

How to protect yourself from the McAfee pop-up scam

If you see these pop-ups appear in your browser, don’t be alarmed. Here’s what to do. 

1. Don’t click on suspicious links or pop-ups.

First, whatever you do, don’t click on links or pop-ups that look like they are from legitimate sources like McAfee unless you are absolutely sure it’s legit. As mentioned, these links or pop-ups can lead you to malicious websites or to downloading harmful software onto your computer. To avoid this, you should always check the URL of the link or pop-up before you click on it. If it looks suspicious, do not click on it. You can also hover your mouse over the link or pop-up to see the actual URL. If it does not match the source, do not click on it.

2. Close down your browser

Second, the best way to avoid these pop-ups is to close your browser. You should also avoid reopening the same website or tab that triggered the pop-up, as it may still be compromised or malicious. Sometimes closing your browser is all you need to do. Other times you may see that this pop-up page may come back, so let’s clear out any files that may be in your browser’s cache.

3. Clear Cache 

If you see these fake pop-screens appear in your browser again over the course of the day or week, try clearing your cache. Here’s how to do it on your computer:

  • On your computer, open Chrome
  • At the top right, click the three dots icon
  • Tap Clear browsing data
  • In the Clear browsing data window, select a time range. To delete everything, select All time
  • Next to “Cached images and Files,” check the box
  • Click Clear data.

HARVARD DROPOUT BUILDS WEARABLE AI COMPANION THAT HANGS AROUND NECK

mcafee pop-up 3

Clear browsing data (Kurt “CyberGuy” Knutsson)

You can also clear the cache on your iPhone or Android.

mcAfee popup 2

Clear Browsing Data  (Kurt “CyberGuy” Knutsson)

4. Remove extensions

If you are seeing these fake pop-ups after you already cleared your cache, let’s try disabling your browser extensions to see if it will solve the problem. Here’s how to do this:

  • Open your Chrome browser and click on the three dots icon at the top right corner of the screen. This will open a menu with various options
  • From the menu, select Extensions
  • Then click Manage Extensions. This will take you to a page where you can see all the extensions that are installed on your browser

GOOGLE FINALLY ADMITS DATA COLLECTION IN CHROME’S ‘INCOGNITO’ MODE

McAfee pop-up 4

Step to remove extensions in Google Chrome  (Kurt “CyberGuy” Knutsson)

  • On the extensions page, you will see a toggle switch next to each extension. If the switch is blue, it means the extension is enabled. If the switch is gray, it means the extension is disabled.
  • To disable an extension, simply click on the toggle switch and make it gray. You can also click on the Remove button below the extension to uninstall it completely from your browser. For now, let’s just try disabling the extension.
  • Repeat this process for all the extensions that you want to disable or remove. You may need to restart your browser for the changes to take effect.

5. Use legitimate antivirus software

Keeping hackers out of your devices can be prevented if you have good antivirus software installed. Having antivirus software on your devices will make sure you are stopped from clicking on any potential malicious links that may install malware on your devices, allowing hackers to gain access to your personal information.

See my expert review of the best antivirus protection for your Windows, Mac, Android & iOS devices

6. Report the scam

If you encounter this scam or any other scam, you should report it to the authorities so they can take action against the scammers and warn other people. You can report the scam to the Federal Trade Commission (FTC). You can also report it to your local police department or consumer protection agency. By reporting the scam, you can help prevent others from falling victim to it.

MORE: HOW HACKERS CAN SENT TEXT MESSAGES FROM YOUR PHONE WITHOUT YOU KNOWING

What should you do if you’ve clicked a link and installed malware on your device? 

If you’ve been hacked, it’s not too late. There are several ways you can protect yourself from hackers, even when they have access to your information.

Scan your device for malware

First, you’ll want to scan your computer with a reputable and legitimate antivirus program. See my expert review of the best antivirus protection for your Windows, Mac, Android & iOS devices

Change your passwords immediately

If you’ve inadvertently given your information to hackers or malicious actors, they could have access to your social media or banking accounts. To prevent this, you should change your passwords for all your important accounts as soon as possible. However, you should not do this on your infected device, because the hacker might see your new passwords. Instead, you should use ANOTHER DEVICE, such as your laptop or desktop, to change your passwords. Make sure you use strong and unique passwords that are difficult to guess or break. You can also use a password manager to generate and store your passwords securely.

Monitor your accounts and transactions

You should check your online accounts and transactions regularly for suspicious or unauthorized activity. If you notice anything unusual, report it to the service provider or the authorities as soon as possible. You should also review your credit reports and scores to see signs of identity theft or fraud.

Use identity theft protection

The McAfee pop-up scam targets your personal information. Hackers can use this information to create fake accounts in your name, access your existing accounts and pretend to be you online. This can cause serious damage to your identity and credit score.

To avoid this, you should use identity theft protection services. These services can track your personal information, such as your home title, Social Security Number, phone number and email address and notify you if they detect any suspicious activity. They can also help you freeze your bank and credit card accounts to stop hackers from using them. Read more of my review of best identity theft protection services here.

Contact your bank and credit card companies

If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should contact your bank and credit card companies and inform them of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges, and issue new cards for you 

Alert your contacts

If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.

Restore your device to factory settings

If you want to make sure that your device is completely free of any malware or spyware, you can restore it to factory settings. This will erase all your data and settings and reinstall the original version. You should back up your important data before doing this and only restore it from a trusted source.

MORE: HOW HACKERS ARE TARGETING X VERIFICATION ACCOUNTS TO TRICK YOU

Kurt’s key takeaways

The McAfee pop-up scam looks to prey on your fears and hopes you panic. It’s important to stay calm when facing hackers and make sure you’re taking the proper precautions. Whenever you download software, make sure it’s from an actual software developer you trust. 

CLICK HERE TO GET THE FOX NEWS APP

Don’t download any software or browser extensions from suspicious sources, or you could be putting yourself at risk. While that’s easier said than done, you should always be vigilant when downloading anything or visiting dubious websites. 

Phishing scams like the McAfee pop-up scam are everywhere, but you can easily make sure you’re not a victim. All you have to do is be careful.

Have you seen this scam? If not, how do you protect yourself when you’re using the web?  Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com.  All rights reserved.



Source link

It may look like an eagle, but it’s actually a stealthy bird drone for covert missions

0


Imagine you are walking down the street, and looking up only to see a majestic eagle soaring in the sky. You admire its beauty and grace, although what if you are actually looking at a spy in disguise? That’s right, the eagle you see may not actually be a real bird after all, but a stealthy bird drone that can perform covert missions for the military.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER

It may look like an eagle, but it's actually a stealthy bird-drone for covert missions

Evolution Eagle (Guard From Above) (Kurt “CyberGuy” Knutsson)

What is this bird drone?

This is the Evolution Eagle, a cutting-edge drone technology that mimics the appearance and behavior of an eagle but has advanced features such as a high-resolution camera, a GPS tracker, and a silent propulsion system.

The Evolution Eagle is designed to blend in with the natural environment and avoid detection by enemy radar. It can fly for hours and transmit real-time data to a remote operator. The Evolution Eagle is the ultimate spy in the sky.

It may look like an eagle, but it's actually a stealthy bird-drone for covert missions

Evolution Eagle (Guard From Above) (Kurt “CyberGuy” Knutsson)

MORE: HOW SMUGGLING GANGS USE DRONES TO DELIVER DRUGS ACROSS THE BORDER

How is the eagle drone inspired by nature?

The Evolution Eagle mimics the shape, silhouette, and flight patterns of live birds of prey. This gives it a more covert footprint than other current UAS platforms. By using thermal winds to loiter and circle, the Evolution Eagle can extend its flight duration and save energy.

The Evolution Eagle can also fly in silent mode, by turning off its engines and gliding on thermal winds. This makes it even more stealthy and undetectable for specialized drone radars and acoustic drone detection units. The Evolution Eagle has a low risk of being spotted by the enemy and can provide overwatch and situational awareness for the friendly forces.

It may look like an eagle, but it's actually a stealthy bird-drone for covert missions

Evolution Eagle in the sky (Guard From Above) (Kurt “CyberGuy” Knutsson)

MORE: 5 DRONES EXPERT REVIEWED

The eagle drone by the numbers

The Evolution Eagle is produced in the Netherlands. It has a takeoff weight of 5.84 pounds, a wingspan of 6.56 feet, and a length of 2.95 feet. It can fly at a cruise speed of 37.28 mph and has a comms range of 6.21 miles for digital and 12.43 miles for analog. It can fly for 60-plus minutes, and longer with thermal winds. It can carry different payload options, such as C-UAS and ISR cameras.

It may look like an eagle, but it's actually a stealthy bird-drone for covert missions

Evolution Eagle being assembled (Guard From Above) (Kurt “CyberGuy” Knutsson)

MORE: COULD THESE CREEPY, DEAD, STUFFED BIRDS BE USED AS DRONES FOR THE MILITARY?

What can the eagle drone do?

The Evolution Eagle is a payload-agnostic platform. This means that it can serve as a base for additional end-user payloads, depending on the mission and the needs. The Evolution Eagle can carry different payloads, such as a daytime camera, thermal camera, C-UAS kinetic interception, and 3D mapping.

These payloads can provide different capabilities, such as ISR, border protection, public safety, wildlife control, and poacher protection. The Evolution Eagle can also perform C-UAS interception, by using a kinetic device to disable or destroy hostile drones.

It may look like an eagle, but it's actually a stealthy bird-drone for covert missions

Evolution Eagle being launched (Guard From Above) (Kurt “CyberGuy” Knutsson)

The eagle drone is portable and easy to use

The Evolution Eagle is a portable platform. It comes in a TSA-approved carry case and can be assembled in three minutes. This makes it easy to travel with the Eagle and deploy it within minutes. The Evolution Eagle has a simple launch and recovery method. It can be hand-launched and belly-landed, without the need for a runway or a parachute.

It may look like an eagle, but it's actually a stealthy bird-drone for covert missions

Evolution Eagle being assembled (Guard From Above) (Kurt “CyberGuy” Knutsson)

Who is behind the bird drone?

The Evolution Eagle is developed by Guard From Above, the first company in the world to train live eagles to intercept hostile drones. Guard From Above has over 30 years of experience in training birds of prey and in-depth knowledge of drone threats.

Their mission is to secure the sky with the power of nature. To develop the Evolution Eagle, Guard From Above has joined forces and expanded its team. The team has 40 years of military experience, 40 years of RC model experience, 30 years of bird of prey experience, and 10 years of C-UAS experience. The team has used their expertise to create this new and innovative UAS platform that is inspired by nature and based on military needs.

It may look like an eagle, but it's actually a stealthy bird-drone for covert missions

Evolution Eagle team (Guard From Above) (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaways

The next time you see an eagle soaring in the sky, you might want to take a closer look. It could be a real bird, or it could be a spy in disguise. The Evolution Eagle is a revolutionary drone technology that combines the best of nature and engineering. It can perform covert missions for the military and provide valuable information for various purposes. The Evolution Eagle is not only an incredible innovation but also a tribute to the majestic creatures that inspired it.

How do you feel about the use of the Evolution Eagle being used for various purposes including by the military? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.



Source link

Plastic surgery deaths have spiked among US patients who traveled to Dominican Republic: CDC report

0

For a growing number of people, “medical tourism” can be dangerous — even fatal.

Twenty-nine U.S. citizens have died after they had cosmetic surgery in the Dominican Republic between 2009 and 2018, according to a Jan. 25 report from the Centers for Disease Control and Prevention (CDC).

More alarming is that the deaths have spiked in recent years. Between 2009 and 2018, there were an average of 4.1 deaths per year. Between 2019 and 2022, that average rose to 13 per year — peaking at 17 deaths in 2020.

ASK A DOC: ‘WHAT SHOULD I DO, OR NOT DO, PRIOR TO SURGERY?’

The deaths were linked to “fat or venous thromboembolism,” which is when a blood clot forms in a vein, the CDC reported.

Most of the patients had risk factors for the condition, such as obesity, diabetes, tobacco use and multiple surgical procedures being performed at once.

To ensure a safe procedure, the surgeon — as well as the entire surgical team, including the anesthesiologists, nurses and surgical techs — should be adequately trained in the specific procedures, a doctor noted. (iStock)

The Consular Section of the U.S. Embassy in the Dominican Republic has recorded cosmetic surgery-associated deaths among U.S. citizens since 2009. 

The embassy contacted the CDC upon noticing the uptick in deaths — which sparked an investigation.

All but one of the deaths involved women, the report stated. The average age of the patients at the time of death was 40.

TOP PLASTIC SURGERIES: THESE WERE THE MOST IN-DEMAND PROCEDURES IN 2022

For the 24 deaths that occurred between 2019 and 2020, liposuction was performed on all of the patients, usually along with other procedures, including gluteal fat transfer, abdominoplasty and breast augmentation.

Fat embolism was the cause of death in 55% of the cases and pulmonary venous thromboembolism was the determining cause in 35% of the cases, the report said.

Plastic surgeons’ reactions

Josef Hadeed, M.D., chair of the Patient Safety Committee for the American Society of Plastic Surgeons (ASPS), who was not involved in the CDC investigation, noted that the CDC’s report highlights the dangers associated with destination procedures.

plastic surgery

For the 24 deaths that occurred between 2019 and 2020, liposuction was performed in all of the patients, usually along with other procedures. (Fox News Digital)

“Too often, patients will travel to other countries as the procedures are cheaper there,” Hadeed, who is also a plastic surgeon with practices in Beverly Hills, California, and Miami, Florida, told Fox News Digital in an interview. 

“However, there are a lot of risks associated with traveling to other countries for cosmetic procedures.”

He added, “All surgery carries risk, but there are excessive deaths outlined in the report, most of which were presumably avoidable.”

“Just because something is cheaper doesn’t mean it is better for you.”

When it comes to the price of surgery, Hadeed advised patients that “you get what you pay for. Just because something is cheaper doesn’t mean it is better for you.”

He also said, “The most important issue in plastic surgery is patient safety.”

Plastic surgery consult

It is critical to find a plastic surgeon who is board-certified by the American Board of Plastic Surgery and is a member of the American Society of Plastic Surgeons, experts agreed. (iStock)

Jonathan Kaplan, M.D., a board-certified plastic surgeon who practices at Pacific Heights Plastic Surgery in San Francisco, who was also not involved in the report, said the CDC’s latest findings are “sad but true.”

“There are risks with any surgery, but in the U.S., you have a better sense of whether doctors are board-certified in the specialty they’re practicing in,” he told Fox News Digital in an email.

“There is also the added risk of going to a facility in a foreign country that has no quality assurance or safety protocols as required by law in the U.S.,” Kaplan added.

Heightened risks

International travel automatically puts patients at a higher risk for thromboembolic events, where they can develop potentially fatal blood clots, Hadeed said.

Another consideration is that those having surgery outside the U.S. won’t be able to get any assistance from the doctor if any complications arise, Kaplan warned.

BBL NOT ALWAYS A-OK: WHY THE BRAZILIAN BUTT LIFT IS ONE OF THE DEADLIEST PLASTIC SURGERIES EVER

“Then you’ll have to find a doctor locally who will charge you an exorbitant amount to fix the problem and you’ll end up spending more than what you saved initially,” he said.

While all surgeries carry some element of risk, the “Brazilian Butt Lift” (BBL) has been associated with the highest risk of death in plastic surgery, which is corroborated by the report, noted Hadeed. 

CDC logo

Twenty-nine U.S. citizens have died after having cosmetic surgery in the Dominican Republic between 2009 and 2018, according to a Jan. 25 report from the Centers for Disease Control and Prevention (CDC). (REUTERS/Tami Chappell/File Photo)

“While I cannot specifically comment on what led to the deaths in the Dominican Republic, I can say that using an ultrasound is essential while performing a Brazilian Butt Lift,” he told Fox News Digital. 

When the fat is injected into one of the blood vessels within the gluteal muscle, it can enter the bloodstream and make its way to the blood vessels of the lungs, blocking off circulation and leading to immediate death — which constitutes a fat embolism, the doctor said.

ASK A DOC: ‘WHAT SHOULD I KNOW BEFORE GETTING A BREAST LIFT?’

This can be prevented by using an ultrasound, he noted, which allows the plastic surgeon to visualize the gluteal muscle and ensure that the fat is placed above, and not within, the muscle. 

“This has already become state law in Florida as of 2023,” said Hadeed.

Safety tips

While Hadeed said it’s “better” to look for plastic surgeons within the U.S., if patients do decide to travel outside the country, they should carefully research a provider.

It is critical to find a plastic surgeon who is board-certified by the American Board of Plastic Surgery and is a member of the American Society of Plastic Surgeons, Hadeed emphasized. 

The surgeon — as well as the entire surgical team, including the anesthesiologists, nurses and surgical techs — should be adequately trained in the specific procedures, the doctor added.

Surgeon marking butt for surgery

The “Brazilian Butt Lift” (BBL) has been associated with the highest risk of death in plastic surgery, the report stated. (iStock)

“It is equally important to ensure that the facility in which the procedure is being performed is fully accredited to the same standards that are found in the United States and has the proper safety measures in place,” said Hadeed.

“The money you save is not worth it if you have a complication, which is a very real possibility.”

“Also remember that longer flights increase the risk of venous thromboembolism, and it is advised to wait several days after travel before undergoing a surgical procedure, which can add to the cost of the travel when you factor in additional days of staying in a hotel,” he pointed out.

When asked for his advice on international surgery, Kaplan said simply, “Don’t do it.”

Liposuction

Those having surgery outside the U.S. won’t be able to get any assistance from the doctor if any complications arise, an expert warned. (iStock)

“The money you save is not worth it if you have a complication, which is a very real possibility,” he said. 

“And remember, complications don’t have to be major — they can be minor, but still a nuisance if you don’t have a doctor locally to take care of it,” he went on. “And even the smallest complication will be much more expensive to take care of in the U.S. if your original surgery was outside the country.”

CLICK HERE TO SIGN UP FOR OUR HEALTH NEWSLETTER

For those who are considering having an elective surgical procedure outside the U.S., the CDC recommends discussing the risks with a doctor here first.

The agency also emphasized the importance of surgeons conducting proper preoperative exams and only performing one procedure for each operation.

Potential limitations

The study did have some limitations, the CDC acknowledged.

Woman recovering

All but one of the deaths involved women, the report stated. The average age of the patients at the time of death was 40. (iStock)

“No reliable statistics on the number of U.S. citizens who receive cosmetic surgery in the Dominican Republic each year are available, precluding calculation of the risk for perioperative death,” the report stated.

Also, the data only included deaths that were reported to the U.S. Embassy — which means the actual number could be higher.

CLICK HERE TO GET THE FOX NEWS APP

The mortality count also does not include deaths resulting from post-surgical infections, the CDC noted.

Fox News Digital reached out to the CDC requesting comment on the report.

For more Health articles, visit www.foxnews.com/health.

How this new heavy-duty drone can carry up to 88 pounds of cargo like it’s a feather

0


​​Imagine if there was a super heavy-duty drone that could carry your hefty packages to any destination, no matter how far or how rough the terrain is. 

That’s what the new DJI FlyCart 30 promises to do for you. It’s a drone that combines speed, durability and intelligence.

HEAVy-duty drone 1

The heavy-duty drone by the numbers

The DJI FlyCart 30 can carry up to 66 pounds of payload with dual batteries or up to 88 pounds with a single battery. 

It can fly up to 17 miles without payload or up to 10 miles with full payload. It can also reach a maximum speed of 45 mph or a cruising speed of 34 mph.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER

Cargo can be loaded in either of two ways

If there is a nice and flat spot for the drone to land, then it can simply open its cargo case and place your package there. 

But what if there is no good landing spot? It can attach your package to a tether connected to a motorized winch on the belly of the drone and lower it down to the ground. The FC30 is able to hover in place as the remotely located pilot lowers the cargo into place.

HEAVY-duty drone 2

MORE: HOW SMUGGLING GANGS USE DRONES TO DELIVER DRUGS ACROSS THE BORDER  

All-weather durability

But that’s not all. The DJI FlyCart 30 is also built to withstand harsh weather conditions and high altitudes. It can operate in temperatures ranging from minus 4 to 113 degrees Fahrenheit and fly up to 19,685 feet above sea level. It has an IP55 protection rating, which means it is resistant to dust and water jets. It can also handle wind speeds up to 27 mph.

HEAVY duty drone 3

MORE: DIVE INTO THE SEA WITH THIS STATE-OF-THE-ART UNDERWATER DRONE 

Smart and safe features

The DJI FlyCart 30 also boasts a strong and stable signal, thanks to its DJI O3 video transmission system. It can transmit high-quality video over up to 12 miles with low latency and interference. It also supports 4G-enhanced video transmission, which can work with DJI O3 to maintain signal stability in complex environments.

Heavy-duty drone 4

Additionally, it supports dual-operator mode, which allows two operators to share control of the drone and the payload. It also has a high-resolution FPV gimbal camera, which provides a clear and immersive view of the flight.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

heavy-duty drone 5

MORE: 5 DRONES EXPERT REVIEWED  

A comprehensive safety package

The DJI FlyCart 30 is not only powerful. It’s also smart and safe. It has a multi-level redundancy system, which ensures flight safety even if a single battery fails. It also has an integrated parachute, which can deploy at low altitudes and land the drone safely in case of an emergency.

HEAVY-DUty drone 6

Flycart 30 deploying parachute  (DJI)

It also has intelligent obstacle sensing, which uses radars and binocular vision to detect and avoid obstacles in multiple directions. It also has an ADS-B signal receiver, which warns of nearby crewed aircraft.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

HEAVY-duty done 7

Easy to use and configure

The DJI FlyCart 30 is also easy to use and configure. It has a foldable design, which makes it easy to transport and store. It comes with a 70 L EPP case, which protects the drone and the payload. It also has a winch system that allows the drone to lower or raise the payload without landing.

HEAVY-DUTY drone 8

Flycart 30 winch system  (DJI)

It also supports fully automatic operations, which can be managed by the DJI Pilot 2 app, the DJI DeliveryHub platform and the Health Management System.

heavy-duty drone 9

CLICK HERE TO GET THE FOX NEWS APP

Kurt’s key takeaways

The DJI FlyCart 30 can carry heavy packages to any destination, no matter how far or how rough the terrain is. It can also withstand harsh weather conditions and high altitudes while maintaining a strong and stable signal. It has a multi-level redundancy system, an integrated parachute and intelligent obstacle sensing to ensure flight safety. It also supports dual-operator mode, fully automatic operations and a winch system to make the delivery process easier and more efficient.

How could you see using a drone like this in your life? Are you willing to trust a drone to deliver your heavy packages? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com.  All rights reserved.



Source link

Ohio nurse and mom beats cervical cancer as expert shares warning signs you should never ignore

0

Join Fox News for access to this content

Plus get unlimited access to thousands of articles, videos and more with your free account!

Please enter a valid email address.

Each year, about 4,000 women die of cervical cancer in the U.S. and around 11,500 new cases are diagnosed. The vast majority of them are caused by HPV (Human Papillomavirus).

Bridgette Rillo, a registered nurse and mother of two in Dayton, Ohio, was just 35 when she was diagnosed with cervical cancer in 2018.

Now 41, she is aiming to raise awareness of the link between HPV and cervical cancer.

CERVICAL CANCER DRUG RAISES SURVIVAL RATE BY 30% COMPARED TO CHEMOTHERAPY: ‘GAME-CHANGER’

Before Rillo’s diagnosis, she was running a few months late for her yearly screening.

“As busy moms, we tend to put our care to the side,” she told Fox News Digital. “I just kind of put it off because I was busy with my kids and patients.”

Bridgette Rillo, pictured with her husband, received her cervical cancer diagnosis five years ago at age 35. (Bridgette Rillo)

After the screening, her doctor called and said the results were “abnormal” and that Rillo was positive for HPV. It’s the most common sexually transmitted infection (STI) in the United States, according to the CDC.

After further tests, doctors confirmed that Rillo had cervical cancer. 

It was Stage 1A2, which means the cancer was between 3 and 5 millimeters deep.

CANCER IS NOW LEADING CAUSE OF DEATH AMONG HIV-POSITIVE PEOPLE, REPORT SAYS: ‘OF GREAT CONCERN’

“I did not have any symptoms, so it was definitely not expected when I got the call,” she told Fox News Digital.

“All of my screenings prior to that were fine.”

As the doctors explained to Rillo, HPV can lay dormant in the body for years until something triggers it to activate and become positive.

Bridgette Rillo

Bridgette Rillo, a NICU nurse and mother of two, is pictured with her husband at the Boonshoft Museum in Dayton during a fundraising event. (Bridgette Rillo)

After receiving various treatments, Rillo was declared cancer-free. 

Now that she has reached her five-year milestone, she will only need to get regular yearly screenings.

As a NICU nurse and busy mom, Rillo said her HPV and cervical cancer experience has changed how she prioritizes her own health and wellness.

“If I had not gone back to the doctor, my story could have been much different.”

“In order to take care of other people, you have to take care of yourself,” she said. “It’s important that women go for their yearly screenings and get any other screenings their doctors recommend.”

“My last screening just a year and four months prior was negative,” Rillo added. “If I hadn’t gone back to the doctor, my story could have been much different.”

Connection between HPV and cervical cancer

For 90% of women with HPV, the virus clears on its own within two years without any symptoms or treatment — but for the remainder, it can cause health problems that include genital warts and various types of cancer, per the CDC.

In most cases, HPV does not cause any symptoms.

CANCER SCREENINGS: HERE ARE 5 TYPES AND CRITICAL INFORMATION TO KNOW ABOUT EACH

In addition to cervical cancer, the virus can also cause anal, vulvar, vaginal, mouth/throat and penile cancers, according to Dr. Pari Ghodsi, a board-certified OB/GYN and Merck spokesperson who practices in Los Angeles.

“Anyone who is sexually active can be at risk of becoming infected with HPV,” Ghodsi told Fox News Digital. “There’s no way of knowing who will clear the virus and who won’t.”

HPV vaccine

This image provided by Merck in October 2018 shows a vial and packaging for the Gardasil 9 vaccine, which is designed to protect against HPV. (AP Images)

“That’s why it’s really important to practice prevention and speak to your doctor about ways to prevent HPV-related cancers and to undergo HPV screening.”

The average age of cervical cancer diagnosis is 50, but patients can range from age 20 to 80, the doctor noted.

“There’s no way of knowing who will clear the virus and who won’t.”

“But it can take a long time for the HPV to progress into cervical cancer — it can take years or even decades,” Ghodsi said.

There is a vaccine available to help prevent HPV, which is administered in two or three doses depending on age.

The CDC recommends that all females start the vaccine series at age 11 or 12.

doctor with cervical cancer ribbon

Each year, about 4,000 women die of cervical cancer in the U.S. and around 11,500 new cases are diagnosed. (iStock)

“At any age, having a new sex partner is a risk factor for getting a new HPV infection,” the CDC states on its website. “People who are in a long-term, mutually monogamous relationship are not likely to get a new HPV infection.”

Ghodsi recommends that everyone speak to their physician about ways to prevent HPV from progressing to cancer.

Warning signs of cervical cancer

Although HPV typically has no symptoms, cervical cancer can come with some warning signs as it begins to progress.

Valentina Milanova, a women’s health expert and founder of gynecological health company Daye in the U.K., emphasized the need to be aware of these five often-overlooked red flags.

1. Abnormal bleeding

This is one of the most common symptoms of cervical cancer, Milanova noted. 

“It can manifest as bleeding after sexual intercourse, between menstrual periods or post-menopause,” she told Fox News Digital. 

ANNUAL BREAST CANCER SCREENINGS LINKED TO LOWER RISK OF DEATH, STUDY FINDS

“Any unusual bleeding should be reported to a health care professional immediately.”

2. Pelvic pain

Unexplained pain in the pelvic region — the lowest part of the abdomen and pelvis — is another warning sign of cervical cancer. 

Woman stomach pain

Unexplained pain in the pelvic region — the lowest part of the abdomen and pelvis — is a warning sign of cervical cancer.  (iStock)

“This pain can often be dismissed or attributed to other causes, but persistent pelvic discomfort with no apparent reason should be investigated,” Milanova said.

3. Pain during sexual activity

Discomfort or pain during intimacy can be a symptom of cervical cancer, the doctor warned.

“It’s important to communicate with your health care provider about any pain experienced during sexual activity,” said Milanova.

4. Unusual discharge

Changes in vaginal discharge, such as an increase in volume, changes in consistency or a foul odor, can be indicative of cervical cancer, the doctor said. 

CLICK HERE TO SIGN UP FOR OUR HEALTH NEWSLETTER

“Any significant changes in vaginal discharge should be discussed with a health care provider,” she told Fox News Digital.

5. Urinary problems

Advanced cervical cancer can cause urinary symptoms such as frequent urination, difficulty or pain during urination, or blood in the urine, according to Milanova.

Doctor with woman

Regular screenings and early detection are the best means of improving cervical cancer outcomes, experts say. (iStock)

“While these symptoms can be caused by conditions other than cervical cancer, they should not be ignored,” she said.

CLICK HERE TO GET THE FOX NEWS APP

It’s crucial to consult with a health care professional if you experience any of those symptoms, Milanova said. 

“Regular screenings and early detection are our best tools in the fight against cervical cancer,” she added.

For more Health articles, visit www.foxnews.com/health.

7 ways to stop paying so much on streaming every dang month

0


Join Fox News for access to this content

Plus get unlimited access to thousands of articles, videos and more with your free account!

Please enter a valid email address.

Five years ago, Netflix, Disney+ and Hulu with Live TV would cost you around $56 a month. Not bad! Today, the same services will run you over $106. How’s that for outrageous?

We’re giving away a $1,000 computer — Mac or Windows, your choice! Enter to win here. Good luck!

AI IS FOR EVERYONE: PROMPTS TO HELP YOU WITH WORK, LIFE, SCHOOL AND LOVE

New research shows we’re more cutthroat than ever about what we pay to stream. Let’s look at some clever ways people save so you can, too!

It’s all about the Benjamins

If it’s not clear by now, we’re all scaling back on streaming primarily because of how dang expensive these services are. Sure, some people hit their TV limit during the pandemic (raising my hand), but costs are still out of control.

The Netflix sign-in page displayed on a laptop screen and the Netflix logo on a phone screen

The Netflix sign-in page displayed on a laptop screen and Netflix logo displayed on a phone screen are seen in this illustration photo taken in Krakow, Poland, on January 2, 2023.  ((Photo by Jakub Porzycki/NurPhoto via Getty Images))

Here are a few recent increases in monthly prices:

  • Ad-free Netflix plan: From $13.99 to $15.49
  • Ad-free Disney+ premium: From $11 to $14
  • Ad-free Hulu with Live TV: From $70 to $77
  • Ad-free Amazon Prime Video: From $0 to $2.99, plus you need to pay $14.99 per month for Prime

CHARGING AND TRAVEL: 5 MALWARE MISTAKES MOST PEOPLE MAKE

Over the last two years, roughly 25% of American streaming subscribers have canceled at least three services. Yup, I’m in that category, too!

Baby TV

Senior adult with child using remote control indoors (iStock)

OK, I’m ready to save

I feel you. You don’t need to cut all your streaming to save significant cash, either.

TALK TECHY TO ME: GET YOUR WORK DONE FASTER WITH THIS PRO TIP

  • Get creative. What do you pay for that you don’t need all the time? Looking at you, sports add-ons. Cancel those once specific events or seasons are over.
  • Focus on what you watch most. If we’re not watching anything on Netflix, it goes away until our show returns. A couple of active services are usually more than enough for one family.
  • Watch ads. Streaming companies are desperate to keep you, and you can get free or cheaper options if you’re willing to put up with commercials.
  • Get a grip. Sometimes, you forget what you’re even paying for. I use Rocket Money (a sponsor of my podcast) to do it for me. You can also comb through your bank and credit card statements to find all your streaming charges.
  • Consider an antenna. This is a no-brainer if you’re a sports fan and your favorite games are on local channels. Here’s a solid option that includes a DVR, and this one gets the job done on a budget. Try this site to see what channels you can get at home.
  • Test the freebies. Pluto TV, Tubi and plenty of others still cost absolutely nothing. Ads? Yes. Free? Yes. Big list of freebies here!
  • Sharing is caring. Not everyone has banned this yet. Amazon lets up to six people share. Through Apple’s Family Sharing feature, six folks get Apple TV+. Disney+ started cracking down on password sharing for Canadian users, but it’s still OK here in the U.S. — for now.

My husband, Barry, is a serial subscriber

If there’s a paid app or service, he somehow finds it. I regularly go in and cancel stuff he’s not using, and then every few months, he’ll yell, “KIM! Did you cancel this?” I just laugh.

But seriously, do this with your spouse, your kids, whoever. If no one is watching, it’s time to cancel. I bet they won’t even notice.

Insignia F30 Series TV

Image of the Insignia F30 Series TV displaying videos and Hulu streaming service. (Insignia)

Keep your tech-know going

My popular podcast is called “Kim Komando Today.” Search for it wherever you get your podcasts. For your convenience, hit the link below for a recent episode.

PODCAST PICK: It’s confirmed — your notifications are tracking you

Plus, a GoFundMe scam, Ring’s new policy on police footage requests, the latest in AI cooking tools, plus tips on handling situations when kids stumble upon iffy content online.

Check out my podcast “Kim Komando Today” on Apple, Google Podcasts, Spotify, or your favorite podcast player.

Listen to the podcast here or wherever you get your podcasts. Just search for my last name, “Komando.”

CLICK HERE TO GET THE FOX NEWS APP

Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Listen on 425+ radio stations or get the podcast. And join over 400,000 people who get her free 5-minute daily email newsletter.

Copyright 2024, WestStar Multimedia Entertainment. All rights reserved.



Source link

A privacy win: Amazon limits police access to your Ring camera

0


In a bold move championing individual privacy, Amazon Ring has announced a significant policy shift. Starting February 2024, Ring will no longer facilitate police requests for home security footage through its Neighbors app. This decision marks a pivotal change in the balance between security and privacy.

Ring, a household name in home security, has faced criticism for its past practices of sharing security videos with police without user consent. The company’s latest software update, detailed in a recent blog post by Eric Kuhn, head of the Neighbors platform, highlights the removal of the “Request for Assistance” tool. This tool previously allowed law enforcement to request user footage directly via the app.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER

A privacy win: Amazon limits police access to your Ring camera

Neighbors by Ring app (Ring) (Kurt “CyberGuy” Knutsson)

While police and fire departments can still use the Neighbors app to share safety tips and updates, the direct request and receipt of video content is now off the table. According to Ring, this change aligns more closely with their vision of empowering customers and fostering community connections.

A privacy win: Amazon limits police access to your Ring camera

View from Ring doorbell camera (Ring) (Kurt “CyberGuy” Knutsson)

MORE: TOP VIDEO DOORBELLS

Police can get access in these extreme cases

Despite this shift, law enforcement isn’t completely cut off from accessing Ring footage. In extreme cases like life-threatening emergencies — think kidnappings or attempted murder — police can still directly request footage from companies like Ring. These instances, however, are rare and subject to Ring’s own discretion. In fact, Ring has responded to such emergency requests only a handful of times in recent months.

Additionally, the traditional legal pathways remain open. Law enforcement can still obtain a warrant or subpoena to access video footage, subject to judicial oversight and specific time constraints.

A privacy win: Amazon limits police access to your Ring camera

Ring doorbell camera (Ring) (Kurt “CyberGuy” Knutsson)

MORE: TOP PICKS TO AMP UP YOUR HOME SECURITY

What you need to do to limit police use of your Ring camera

For Ring users, this update requires little action. It’s advisable to keep your devices and apps updated to receive the latest firmware changes. Ring is not just taking away; they’re also adding new features like “Ring Moments” for sharing light-hearted videos and a “Best of Ring” video collection, enhancing the community aspect of the platform.

The takeaway here is clear: privacy matters. While security is paramount, it shouldn’t come at the cost of individual privacy. Ring’s decision reflects a growing awareness and respect for this balance after years of our reporting about this somewhat unknown secret.

A privacy win: Amazon limits police access to your Ring camera

Mom and daughter at the front door with Ring doorbell camera (Ring) (Kurt “CyberGuy” Knutsson)

Did you know that other Amazon devices, including Echo and Ring products, allow neighbors to connect to your network without your permission unless you opt out? It’s presumptuous on Amazon’s part to make this an automatic feature and I recommend you turn it off if you want better security. Here’s how.

How to Opt-Out of Sidewalk on your Ring Video Doorbell or Ring devices

Sidewalk is a feature from Amazon that allows your Ring devices to share a small portion of your internet bandwidth with your neighbors. If you are not comfortable with this, you can opt out of Sidewalk by following these simple steps.

  • Launch Ring app
  • Tap the 3-line menu in the top left
  • Go to “Control Center” (towards the bottom of the navigation)
  • Click “Amazon Sidewalk”
  • Slide the Sidewalk slider button to the left so it reads “Turned off”

MORE: HOW TO DETECT A HACKER SPYING ON YOUR DOORBELL CAMERA

Non-cloud-connected cameras offer more privacy

For those concerned about privacy, consider devices offering local storage options. Unlike cloud-stored footage, local storage gives you more control, making it harder for companies to share your videos without consent — though they’re still subject to legal demands.

A privacy win: Amazon limits police access to your Ring camera

Security camera with local storage option (Blink) (Kurt “CyberGuy” Knutsson)

MORE: IS YOUR DOORBELL CAMERA VULNERABLE TO JAMMING OR INTERFERENCE?

Kurt’s key takeaways

Ring’s policy update is a significant step toward protecting individual privacy. It’s a move that encourages users to stay informed and consider their options in the evolving landscape of home security and privacy rights. Now is a great time to take a fresh look at your video doorbell privacy settings to make sure it feels right. Check the names of those who have access, ensuring cameras are only being shared with those you know and trust.

How do you feel about Ring’s decision to stop facilitating police requests for home security footage? Do you agree or disagree with it? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.



Source link

Mistakes to avoid if you just have to use public Wi-Fi

0


Sometimes, we find ourselves in a situation where we urgently need an internet connection, but we are not at home or at work. We might want to do some online tasks, such as checking our email, browsing social media, or streaming our favorite show. However, what if the only available option is a public Wi-Fi network that we are not familiar with? How can we use it safely without exposing our privacy and security?

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER

Mistakes to avoid if you just have to use public Wi-Fi

Free Wi-Fi sign (Kurt “CyberGuy” Knutsson)

This is a dilemma that many people face, even those who are experts in cybersecurity. Case in point, Blackhat, the world’s largest hacker conference held annually in Las Vegas, brings together thousands of cybersecurity professionals from all over the world. They attend the conference to learn about the latest cyberthreats and solutions. But even these skilled professionals can fall victim to the hazards of public Wi-Fi.

Mistakes to avoid if you just have to use public Wi-Fi

Blackhat convention (Blackhat) (Kurt “CyberGuy” Knutsson)

The event organizers have a playful way of exposing this vulnerability. They monitor the network traffic and display the names of those who have been tricked by a fake or compromised Wi-Fi hotspot. This is the notorious “Wall of Sheep.”

The Wall of Sheep showcases the unfortunate consequences of network security negligence. The people on this wall are not willing participants, but careless attendees whose private data was captured and revealed to everyone.

These stories should serve as a stark warning to anyone who is concerned about the potential pitfalls of using public Wi-Fi. Even the most experienced cybersecurity professionals can be vulnerable to unsecured networks.

Mistakes to avoid if you just have to use public Wi-Fi

Illustration of data and a hacker (Kurt “CyberGuy” Knutsson)

MORE: 5 WAYS TO SECURELY ACCESS WI-FI ON YOUR PHONE WHILE TRAVELING

Real-life examples of hackers’ victims at Blackhat

You may wonder what the big deal is about ending up on the Wall of Sheep, but it can be far worse. Some of the horror stories include:

The hotel hotspot trap

One attendee checked into a nearby hotel during Blackhat week and decided to catch up on work using the hotel’s open Wi-Fi network. Unbeknownst to them, a hacker had set up a rogue hotspot, mirroring the hotel’s official network. The hacker intercepted the attendee’s login credentials and gained access to sensitive work emails and confidential documents.

The overconfident developer

A seasoned developer known for his coding skills headed to Blackhat thinking he was invincible. He ignored warnings and connected to a rogue network named “SecureConferenceWiFi.” Confident in his skills, he used the same weak password for all his accounts. Little did he know that his email and social media accounts were compromised. This turned out to be an embarrassing leak of sensitive project data and personal conversations.

The crypto investor’s nightmare

There was also a crypto investor who attended to participate in discussions about blockchain technology. During the conference, he went to access his online wallet and entered his passphrase on an unsecured network. Within minutes, a hacker intercepted his credentials and emptied his wallet, leaving him penniless and devastated.

Mistakes to avoid if you just have to use public Wi-Fi

Illustration of Wi-Fi being used (Kurt “CyberGuy” Knutsson)

MORE: HOW TO CHECK IF SOMEONE IS STEALING YOUR WI-FI

You become sitting prey the moment you connect to a typical public Wi-Fi hotspot

Unless you’re using a VPN service, even locked or secured public Wi-Fi networks are not completely safe. Public Wi-Fi hotspots are usually free or secured Wi-Fi networks available in public spaces like shopping malls, libraries, coffee shops, airports and hotels, to name a few.

Scam hotspots are historically easily identified by generic names like “Free Wifi” to lure people to connect to their networks. Cybercriminals have gotten savvier by using similar names of popular legitimate hotspots. If you aren’t paying close attention, you will be the next victim.

Preventative tactics for avoiding bad public Wi-Fi hotspots

  • Most public Wi-Fi hotspots in the US don’t require payment information, so that’s a red flag that a hacker might be trying to steal personal and financial information from you.
  • Regardless of how it is named, most closed networks have a lock symbol indicating a Wi-Fi network that is more secure with the password available for patrons or provided by the establishment.
  • Usually, legitimate public networks have a prompt that shows up in your browser that asks you to agree to terms and conditions of use while on their network too.
  • Pay attention to the website address you’re going to:
    Most websites, especially those with sensitive data, usually employ their own encryption techniques, so they will likely have HTTPS in the web address so you can always check your URL before logging in.For example: HTTPS://www.paypal.com not HTTP://www.paypal.com. Sometimes browsers autofill commonly visited sites, but you can then click on the web address bar at the top or bottom of your browser and read how the URL is actually showing up once you are directed there.

    Pay attention to the spelling of the website – there can be similar sites made to look like official sites. Could be ‘bannkofamerica’ instead of ‘bankofamerica.com’

  • Most websites, especially those with sensitive data, usually employ their own encryption techniques, so they will likely have HTTPS in the web address so you can always check your URL before logging in.For example: HTTPS://www.paypal.com not HTTP://www.paypal.com. Sometimes browsers autofill commonly visited sites, but you can then click on the web address bar at the top or bottom of your browser and read how the URL is actually showing up once you are directed there.
  • For example: HTTPS://www.paypal.com not HTTP://www.paypal.com. Sometimes browsers autofill commonly visited sites, but you can then click on the web address bar at the top or bottom of your browser and read how the URL is actually showing up once you are directed there.
  • Pay attention to the spelling of the website – there can be similar sites made to look like official sites. Could be ‘bannkofamerica’ instead of ‘bankofamerica.com’

Of course, you don’t have control over every scenario, and maybe using a public Wi-Fi hotspot is your last but necessary resort, especially while traveling. With a secure VPN service, you connect to a public Wi-Fi network without much worry. See my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices.

Mistakes to avoid if you just have to use public Wi-Fi

A person using Wi-Fi on their laptop (Kurt “CyberGuy” Knutsson)

MORE: CLEVER TRICK TO MAKE A CONNECTION FASTER ON YOUR WI-FI NETWORK

5 common attacks on people using public Wi-Fi

1) ‘Evil twin’ attacks

Imagine being at your favorite coffee shop and connecting to what appears to be their free Wi-Fi network. When you begin to browse the web, you are completely unaware that you’ve fallen victim to an “evil twin attack” as hackers have set up a malicious hotspot with the same name as a legitimate network. The attacker is now able to intercept data, steal your login credentials, and launch further attacks.

Solution

When you use a VPN service, it establishes a level of encryption between the end-user and a website regardless of what network you join, so any intercepted data cannot be read by the hacker without a correct decryption key.

2) ‘Man-in-the-middle’ attacks (MITM)

“Man-in-the-middle” attackers position themselves between your device and the intended server. Unbeknownst to you, this allows them to intercept all data traffic, including every email, chat message, or login attempt. Your sensitive data, private conversations, and financial transactions are now all available to them.

Solution

Because VPN services encrypt your data, even if hackers intercept your data, it isn’t accessible to them. VPN services work both for your personal computer and mobile devices, which means the protection of a VPN service can travel anywhere you go.

3) The ‘packet sniffing’ hack (Software reads your data)

Whenever you connect to any network, your devices send data packets that can be read by free software, such as Wireshark. When you’re on an unencrypted network, hackers can use free software, such as Wireshark, to read those data packets. Ironically, with such software, you can analyze web traffic to find security problems and vulnerabilities that need to be fixed or exploited.

Solution

Even though hackers can still see that there are data packets being sent, if you’re using a VPN, your data is traveling through a secure and encrypted tunnel, protecting against exposure and use by hackers. Because your data is encrypted, it renders your information virtually useless to hackers. And because they can see that you’re connecting via a VPN service, hackers can see that you would be harder to hack.

4) The ‘sidejacking’ hack

When a hacker employs the sidejacking technique, they essentially take the information gleaned from packet sniffing to be used in real-time, usually on-location, to exploit its victim. Once intercepted, the data is then used to gain access to the original destination website or app.

The hacker uses packet sniffing to read network traffic and ‘steal cookies.’ Cookies are files that a website stores on your mobile phone, tablet, or computer as you browse the web. Cookies store a variety of information, from language preferences to personal data such as name, physical address, or email address.

This allows websites to customize your experience. Once hackers find nonsecure socket layer cookies (just HTTP:// not HTTPS://), the information sent to the website or app by you is then captured. This allows the hacker to use what is captured to exploit private information and gain access to this and other sites.

Solution

Hackers scan web traffic to spot unencrypted or exploitable encrypted data, so having a secure VPN service most likely takes your data ‘out of the running’ for most hackers as they can see it is encrypted. And even if they do try, information going from and to your device is encrypted, so they will likely be unable to access the information itself.

5) Malware infection

Public Wi-Fi networks are often secured poorly or entirely unsecured. This allows cybercriminals the ability to infect your device with various forms of malicious software, including spyware and ransomware. Once infected, your data is at risk of theft or encryption. Your device can also be turned into a puppet for remote control.

Solution

If you forget to turn on your VPN service while out and about, you might panic at the thought of all the potential compromises outlined above. If, however, you’re running an antivirus program in the background of your device, you’d still be protected should a hacker infiltrate your device. Having antivirus software on your devices will make sure you are stopped from clicking on any potential malicious links, which may install malware on your devices and allow hackers to gain access to your personal information. Find my review of Best Antivirus Protection here.

Mistakes to avoid if you just have to use public Wi-Fi

A woman using a laptop (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaways

Understanding the risks and taking precautions while using public Wi-Fi can protect you and your data. Keep in mind that using your cell phone and its data network should be your preference if a login is required or if you will be sharing personal or financial data. Remember that unless you are in Las Vegas at Blackhat, you won’t find yourself on a “Wall of Sheep,” but it could be something much worse.

Have you ever encountered a risky situation while using public Wi-Fi? If so, how did you handle it? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.



Source link