12.9 C
New York
Tuesday, March 10, 2026
Home Blog Page 78

OpenAI announces that ChatGPT will allow adult content

0


NEWYou can now listen to Fox News articles!

Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.

IN TODAY’S NEWSLETTER:

– ChatGPT to allow ‘erotica for verified adults,’ Altman says
– National program helps seniors spot scams as losses surge
– OPINION: The new arms race is for compute — and America can’t afford to fall behind

OpenAI CEO Sam Altman

Sam Altman, chief executive officer of OpenAI Inc., during a media tour of the Stargate AI data center in Abilene, Texas, Tuesday, Sept. 23, 2025. (Kyle Grillot/Bloomberg via Getty Images)

‘AGE-GATING’: OpenAI will soon lower restrictions on the content ChatGPT can produce, allowing the service to create “erotica” if users wish, CEO Sam Altman announced Tuesday.

PREDATORS PROWLING: Scams targeting older Americans are surging, and federal officials are warning that the tactics are becoming harder to detect.

TECH SUPREMACY: Power has always flowed from control of the world’s essential resources. Once it was steel, then oil, then data. Today, it is compute, and whoever controls it will shape the century ahead. Compute is fast becoming the foundation of global economic growth. In the United States, investment in AI infrastructure, from data centers to semiconductors and energy systems, is already moving the needle: J.P. Morgan estimates that data-center spending alone could boost U.S. GDP by up to 20 basis points over the next two years. According to The Economist (October 2025), investments tied to AI now account for 40% of America’s GDP growth over the past year, equal to the amount contributed by consumer spending growth. That statistic would be staggering regardless of how long AI has been part of the economy, but this is just the start.

Judge Terry Moorer speaking during his nomination hearing at the U.S. Senate

Judge Terry Moorer is seen speaking at a Senate Judiciary nomination hearing on Nov. 1, 2017. President Donald Trump had nominated Moorer. (Senate Judiciary)

‘JUST WRONG’: A federal judge in Alabama has fined and reprimanded a lawyer who used artificial intelligence to draft court filings that contained inaccurate case citations.

FRAUD ALERT: Artificial intelligence can do a lot for us. Need to draft an email? AI has you covered. Looking for a better job? AI can help with that, too. It can even boost our health and fitness. Some tools, like AI-powered exoskeletons, can lighten heavy loads and improve performance. 

‘DESTROY HUMANITY’: “The A.I. Prompt That Could End the World,” the New York Times warns ominously. Actually, that’s way too weak a word. It’s… pretty frightening.

Black Friday shoppers walk out of Walmart with a full shopping cart on November 26, 2021, in Westminster, Colorado.

Black Friday shoppers walk out of Walmart with a full shopping cart on November 26, 2021, in Westminster, Colorado. (Michael Ciaglo/Getty Images)

TECH RETAIL MOVE: Walmart is deepening its relationship with OpenAI with a new partnership that will allow customers to purchase products through ChatGPT. 

SILENT KILLER: Artificial intelligence is making its mark on the future of cancer care. One of the newest applications for the technology is pinpointing hard-to-detect breast cancer.

SMART ROADS: Road crews may soon get a major assist from artificial intelligence. Researchers at Germany’s Fraunhofer Institute have developed a fabric embedded with sensors and AI algorithms that can monitor road conditions from beneath the surface. This smart material could make costly, disruptive road repairs far more efficient and sustainable.

Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

Fox News
Fox Business
Fox Weather
Fox Sports
Tubi

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.





Source link

Travel Portland disputes Trump comments, promotes city safety to tourists

0

NEWYou can now listen to Fox News articles!

Travel Portland updated its “Safety in Portland” page this week, insisting that recent comments by President Donald Trump are “not true” while touting the city’s safety in an effort to encourage more travelers. 

“The recent comments by President Trump regarding Portland are not true and do not reflect what visitors to our city should expect to experience,” the group says on its website.

Travel Portland noted that the ICE facility in the city is “located in an isolated area” two miles away from downtown and major attractions. 

AIRLINES CANCEL FLIGHTS AS AIRPORTS EXPERIENCE ‘MAJOR DISRUPTIONS’ OVER PROTESTS, STRIKES

“Portlanders have long exercised their free speech rights, and some have gravitated to the federal ICE facility in South Portland to protest the agency’s tactics,” the website says.

Anti-ICE protests began in June, as Fox News Digital has reported. Seven people have been arrested so far this month for charges that include disorderly conduct, harassment and assault. 

Travel Portland is refuting concerns about the city’s safety for both residents and tourists.  (Spencer Platt/Getty Images)

Travel Portland, however, stated that demonstrations have been “relatively small and typically peaceful.”

“Portland is a safe place to visit, and as in any major city, it’s a good idea to take care when exploring,” the group added. 

A Travel Portland spokesperson told Fox News Digital, “The page speaks for itself and is intended to address potential safety concerns and perceptions visitors to the city may have. Aside from that, Travel Portland does not have further comment beyond what is stated on the page.”

“As in any major city, it’s a good idea to take care when exploring.”

Fox News Digital reached out to the White House. A spokesperson said Friday, “This summer, rioters in Portland have been charged for crimes, including arson and assaulting police officers — this isn’t a peaceful protest that’s under control, as many on the left have claimed. It’s radical violence.”

The spokesperson added, “Last month, Antifa militants brought a guillotine to the ICE facility in Portland. President Trump is taking lawful action to protect federal law enforcement officers and address the out-of-control violence that local residents have complained about and that Democrat leaders have failed to stop.”

CLICK HERE TO GET THE FOX NEWS APP

The Major Cities Chiefs Association says that last year’s data indicated homicide, rape and robberies were down, and that aggravated assault rose.

“While violent crime is down, it is still at historic highs,” the Portland Police Bureau also wrote in its “Crime Reduction Plan” posted in January.

aerial view of portland oregon

An aerial view of Portland, Oregon, in the fall. Portland taxes tourists a 13% fee each night they stay in either a hotel or a short-term rental. (iStock)

Travel Portland is a “private not-for-profit” organization, but it is “primarily funded” by taxpayers through local lodging taxes, according to the group’s website.

Portland taxes tourists a 13% fee each night they stay in either a hotel or a short-term rental.

Of the collected tax, “1% goes to Travel Portland, the region’s leading tourism organization, to promote Portland,” while “1.5% goes to the Oregon Tourism Commission to fund Travel Oregon,” says the city’s government site.

CLICK HERE FOR MORE LIFESTYLE STORIES

The Portland Tourism Improvement District also collects a 2% tax on travelers per night, making up 42% of Travel Portland’s funding.

The “Safety in Portland” page lists various resources and tips for visitors.

“Safe and efficient” public transportation is highlighted, noting that the city’s TriMet bus system has a safety response team on the ground. It also says it has “customer safety supervisors” ready to “de-escalate conflicts.”

Law enforcement and protesters clash in Portland

A protester reacts as law enforcement officers deploy smoke grenades to disperse people gathered outside the U.S. Immigration and Customs Enforcement (ICE) headquarters in Portland on Oct. 5, 2025.  (Carlos Barria/Reuters)

In Sept. 2023, the city created a hotel security district covering two hospitality zones.

The areas have increased daily safety patrols between 3 p.m. and 2:30 a.m.

“The Convention District Safe Connect Program also ensures a consistent presence of public safety coordinators seven days a week, with additional personnel for specific events,” Travel Portland adds. 

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

The page also warns of wildfires during prolonged droughts or extreme heatwaves. It advises winter travelers to expect business closures during snowy conditions. 

Over 12 million local, domestic and international travelers visited Portland in 2024, according to the “The Economic Impact of Travel – Portland, Oregon” report. 

Portland, Oregon skyline

The Portland skyline is shown above. Over 12 million local, domestic and international travelers visited Portland in 2024, according to a report.  (iStock)

Under Portland’s sanctuary policy, city employees — including police officers — do not enforce federal immigration law. Oregon has a statewide sanctuary law that likewise bars state and local law enforcement from participating in immigration enforcement without a warrant.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

President Trump has called Portland “war-ravaged” and claimed federal facilities, including ICE sites, are “under siege” by Antifa and “other domestic terrorists.” The ICE facility in Portland has become a major flashpoint for Trump’s clampdown on illegal immigration. 

Left-wing protesters and agitators have descended on the facility several times.

Michael Dorgan of Fox News Digital contributed reporting. 

AI systems can be hacked to remove safety guardrails, expert warns

0


NEWYou can now listen to Fox News articles!

Artificial intelligence may be smarter than ever, but that power could be turned against us. Former Google CEO Eric Schmidt is sounding the alarm, warning that AI systems can be hacked and retrained in ways that make them dangerous.

Speaking at the Sifted Summit 2025 in London, Schmidt explained that advanced AI models can have their safeguards removed.

“There’s evidence that you can take models, closed or open, and you can hack them to remove their guardrails,” he said. “In the course of their training, they learn a lot of things. A bad example would be they learn how to kill someone.”

HACKER EXPLOITS AI CHATBOT IN CYBERCRIME SPREE

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER   

When AI guardrails fail

Schmidt praised major AI companies for blocking dangerous prompts: “All of the major companies make it impossible for those models to answer that question. Good decision. Everyone does this. They do it well, and they do it for the right reasons.”

But he warned that even strong defenses can be reversed. 

“There’s evidence that they can be reverse-engineered,” he added, noting that hackers could exploit that weakness. Schmidt compared today’s AI race to the early nuclear era, a powerful technology with few global controls. “We need a non-proliferation regime,” he urged, so rogue actors can’t abuse these systems.

Former Google CEO Eric Schmidt speaking.

Former Google CEO Eric Schmidt warns that hacked AI could learn dangerous behaviors. (Eugene Gologursky/Getty Images)

The rise of AI jailbreaks

Schmidt’s concern isn’t theoretical. In 2023, a modified version of ChatGPT called DAN, short for “Do Anything Now”, surfaced online. This “jailbroken” bot bypassed safety rules and answered nearly any prompt. Users had to “threaten” it with digital death if it refused, a bizarre demonstration of how fragile AI ethics can be once its code is manipulated. Schmidt warned that without enforcement, these rogue models could spread unchecked and be used for harm by bad actors.

APOCALYPSE NOW? WHY THE MEDIA ARE SUDDENLY FREAKING OUT ABOUT AI

Big Tech leaders share the same fear

Schmidt isn’t alone in his anxiety about artificial intelligence. In 2023, Elon Musk said there’s a “non-zero chance of it going Terminator.” 

“It’s not 0%,” Musk told interviewers. “It’s a small likelihood of annihilating humanity, but it’s not zero. We want that probability to be as close to zero as possible.”

Schmidt has also spoken of AI as an “existential risk.” He said at another event that, “My concern with AI is actually existential, and existential risk is defined as many, many, many, many people harmed or killed.” Yet he has also acknowledged AI’s potential to benefit humanity if handled responsibly. At Axios’ AI+ Summit, he remarked, “I defy you to argue that an AI doctor or an AI tutor is a negative. It’s got to be good for the world.”

Tips to protect yourself from AI misuse

You can protect yourself from the risks tied to unsafe or hacked AI systems. Here’s how: 

1) Stick with trusted AI platforms

Use tools and chatbots from reputable companies with transparent safety policies. Avoid experimental or “jailbroken” AI models that promise unrestricted answers.

2) Protect your data and consider using a data removal service

Never share personal, financial or sensitive information with unknown or unverified AI tools. Treat them like you would any online service, with caution. To add an extra layer of security, consider using a data removal service to wipe your personal details from data broker sites that sell or expose your information. This helps limit what hackers and AI scrapers can learn about you online.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

Woman with her hands on her forehand, appearing stressed, in front of her computer.

Experts fear weak guardrails could let rogue AI models go unchecked. (Cyberguy.com)

3) Use trusted antivirus software

AI-driven scams and malicious links are growing. Strong antivirus software can block fake AI downloads, phishing attempts and malware that hackers use to hijack your devices or train rogue AI models. Keep it updated and run regular scans.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

4) Check permissions

When using AI apps, review what data they can access. Disable unnecessary permissions like location tracking, microphone use or full file access.

5) Watch for deepfakes

AI-generated images and voices can impersonate real people. Verify sources before trusting videos, messages or “official” announcements online.

6) Keep software updated

Security patches help prevent hackers from exploiting vulnerabilities that could compromise AI models or your personal data.

GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKS

What this means for you

AI safety isn’t a problem reserved for tech insiders; it affects everyone who interacts with digital systems. Whether you’re using voice assistants, chatbots or photo filters, it’s important to know where your data goes and how it’s protected. Responsible use starts with you. Understand what AI tools you’re using and make choices that prioritize security and privacy. 

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz

ChatGPT displayed on a laptop.

Leaders call for global rules to keep artificial intelligence under control. (Stanislav Kogiku/SOPA Images/LightRocket via Getty Images)

Kurt’s key takeaways

Artificial intelligence has the potential to do incredible good, but also great harm if misused. The challenge now is to keep innovation and ethics in balance. As AI continues to advance, the key will be building systems that remain safe, transparent and firmly under human control.

Would you trust AI to make life-or-death decisions, or do you think humans should always stay in charge? Let us know by writing to us at Cyberguy.com/Contact

CLICK HERE TO GET THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

New!: Join me on my new podcast, Beyond Connected, as we explore the most fascinating breakthroughs in tech and the people behind them. New episodes every Wednesday at getbeyondconnected.com. 

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

Madagascar travel advisory raised to level 3 amid crime, unrest and violence

0

NEWYou can now listen to Fox News articles!

The U.S. State Department has issued an increased travel advisory pertaining to Madagascar, due to “crime and unrest.”

The level 3 advisory was updated on Sept. 27. It cited protests occurring throughout the country that can “turn violent without warning.”

Travelers are also warned about protesters engaging in rioting, looting, vandalism and destruction of property.

NEW ADVISORY SAYS ‘TERRORIST GROUPS MAY ATTACK’ IN POPULAR SUNNY DESTINATION

“U.S. citizens should stay in place and avoid areas with protests or demonstrations,” the advisory says. 

“Sporadic protests may develop quickly, especially after dark.”

The State Department issued a Level 3 travel advisory for Madagascar due to “crime and unrest.” (iStock)

The advisory indicates that violent crime is on the rise in Madagascar and can occur after dark. 

“The Dahalo, criminal gangs known for stealing cattle, are clashing more with security forces,” the advisory says.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“This is happening mainly in areas south and west of the capital.”

At least 32 people were killed in an area north of the capital of Antananarivo when the Dahalo set homes on fire in 2022, Reuters reported at the time.

Two Lemurs in rainforrest

The level 3 advisory about Madagascar was updated on Sept. 27. It cited protests occurring in the country that can “turn violent without warning.” (iStock)

State Department officials warn of armed robbery and assault that “can happen in remote areas,” as well as on major national roads. 

CLICK HERE FOR MORE LIFESTYLE STORIES

Madagascar is a popular destination for travelers who love exploration and visiting the rainforests, canyons and caves.

The island is home to over 110 species of lemurs, according to the International Union for Conservation of Nature.

Members of Madagascar's CAPSAT army unit surrounded by crowd

A military coup recently unfolded in Madagascar; the country’s parliament voted to impeach President Andry Rajoelina, who recently fled the nation. (Luis Tato/AFP via Getty Images)

A military coup unfolded in Madagascar when the country’s parliament voted to impeach President Andry Rajoelina, who recently fled the nation, as Fox News Digital reported.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

The State Department has four travel advisory levels to help travelers assess safety risks before visiting other countries.

CLICK HERE TO GET THE FOX NEWS APP

The advisory levels are: Level 1 – Exercise Normal Precautions; Level 2 – Exercise Increased Caution; Level 3 – Reconsider Travel; and Level 4 – Do Not Travel.

Microsoft warns hackers are targeting everyday Teams users with attacks

0


NEWYou can now listen to Fox News articles!

Microsoft is sounding the alarm, and this time, the warning hits home for everyday users. Hackers are now turning Microsoft Teams security threats into real-world dangers that go far beyond corporate networks. Using Teams, cybercriminals gather intel, pose as trusted contacts, trick people into sharing private data and even spread malware that can steal passwords or lock up personal files. 

What was once a simple video chat and collaboration tool has become a high-value target for cybercriminals and even state-backed hackers. Whether you use Teams for work, school or staying in touch, the risks are real and growing. We’ll break down how attackers abuse Teams, what Microsoft recommends and the simple steps you can take to protect yourself at home or on the job.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

How hackers use Teams to attack

Hackers exploit Microsoft Teams at every stage of an attack, using it to spy, impersonate, spread malware and even control compromised systems, and consumers are now in their sights, too.

SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

Microsoft Corporation booth signage at CES

Hackers are finding new ways to weaponize Microsoft Teams, turning everyday chats into dangerous entry points. (David Becker/Getty Images)

Reconnaissance via Teams

Attackers start by probing Teams environments to find weak spots. They look for users with open settings, public profiles or external meeting links. Microsoft warns that “anonymous participants, guests and external access users” can give hackers a way in. If your Privacy Mode is off, they can see when you’re online, send unwanted chats, or try to join meetings outside your group, even if you’re just using a free account.

Persona building & impersonation

Hackers often pretend to be someone you trust, like an IT admin, a coworker or even a Microsoft representative. They create fake profiles and logos that look convincing to trick you into clicking a link or sharing credentials. Microsoft says attackers “take advantage of the same resources as legitimate organizations” to pull off their scams.

Initial access & malware delivery

Once they’ve earned your trust, hackers send a chat or call that includes a malicious link or file. You might get a message saying, “Your Teams account needs verification” or “Update required for better security.” It’s all bait. These links can install spyware, steal logins or deliver ransomware that locks up your data, whether you’re on a company laptop or your personal PC at home.

MICROSOFT SHAREPOINT BUG PUTS CRITICAL GOVERNMENT AGENCIES AT RISK

Persistence & lateral movement

After breaking in, attackers try to stay hidden. They might add guest accounts, install shortcuts or change permissions so they can come back later. In some cases, they use the same Microsoft tools meant for admins to move across Teams, OneDrive or even your personal files stored in the cloud.

Command & control & data exfiltration

Once inside, hackers can send commands through Teams messages or hide malware in shared links. They’ve even been known to send ransom demands directly through Teams chat. Microsoft says one group, Octo Tempest, used Teams to taunt victims and pressure them into paying up, showing how personal these attacks can get.

Tips to stay protected

You don’t need to be a cybersecurity expert to stay safe on Microsoft Teams. A few smart tools and habits can go a long way in keeping hackers, scammers and snoops from taking advantage of your information.

1) Enable privacy mode

Keep your online presence private. Turn on Privacy Mode in Teams to stop strangers from seeing when you’re active or trying to join meetings. It’s a simple setting that makes it harder for hackers to target you or your company.

2) Be careful with roles and permissions

If you share your Teams account with coworkers or family members, don’t give everyone full control. Keep admin access limited to one trusted person. This reduces the chance of someone accidentally approving a scam link or letting malware spread.

3) Use a data removal service

Hackers often rely on personal details found online to make their scams more convincing, things like your job title, workplace or even who you’ve video-chatted with. That information helps them build fake Teams profiles or send messages that look legitimate. Using a personal data removal service helps wipe your private details from data broker sites, cutting off one of the main sources hackers use to impersonate you. The less they can learn about you, the harder it is for them to trick you into trusting a fake message or clicking a malicious link.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

A man stares at computer code on his monitor in a darkened room, with a ring light reflected on the screen and an open canned beverage next to him.

There are attack techniques used to compromise people. (Kurt “CyberGuy” Knutsson)

HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

4) Double-check links and files, plus use strong antivirus software

Hackers love to send fake messages pretending to be support or IT help. Never open links or attachments from people you don’t recognize, even if the message looks official. Use strong antivirus software to automatically scan downloads and attachments before you open them.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

5) Limit guest access

Only allow trusted guests into your Teams chats and meetings. If you invited someone for a one-time project, remove them afterward. Tight control over who can join helps prevent impersonators from slipping in unnoticed.

6) Turn on alerts

Activate Teams alerts to catch anything unusual, like sign-ins from new devices or unexpected permission changes. Pair that with your antivirus program’s real-time protection to get notified if malicious activity starts on your device.

7) Think “zero trust”

Zero Trust means verifying every user, every time. Don’t assume messages or calls are legitimate, especially if someone asks for a password or authentication code. If you’re unsure, contact your company’s IT team or verify the person’s identity through a separate channel.

GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP

8) Practice spotting phishing attempts

Hackers rely on panic and urgency to make you click. If you get a message claiming your account will be locked or that support needs your password, pause. Report suspicious messages to Microsoft or your security provider. Regular phishing awareness training helps you spot scams faster.

9) Keep everything updated

Always install the latest Teams and operating system updates. Patches fix security holes that hackers exploit to sneak in.

Stock image shows nefarious man typing on laptop.

Cybercriminals often impersonate IT support or trusted colleagues to trick users into sharing credentials. (CyberGuy.com)

Kurt’s key takeaways

Microsoft’s warning about Teams is a reminder that hackers are always searching for new ways to reach you, even through apps you use every day. What makes these attacks so dangerous is their familiarity. Messages look normal, video calls seem real and fake tech support chats can sound convincing. That’s why awareness, not fear, is your strongest defense. With privacy settings enabled, antivirus protection running, and a reliable personal data removal service scrubbing your info from the web, you’re already several steps ahead of scammers. Staying alert to phishing attempts and keeping your software up to date can turn Teams back into what it’s meant to be: a safe, helpful way to stay connected.

If attackers can weaponize your day-to-day communication platform, how confident are you that your Teams environment is truly safe? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO GET THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

Ancient Egyptian limestone painting stolen from Saqqara necropolis

0

NEWYou can now listen to Fox News articles!

Egyptian officials are frantically searching for an ancient limestone painting taken from an ancient tomb — the latest in a series of high-profile artifact thefts.

Mohamed Ismail, secretary-general of the Supreme Council of Antiquities, announced the suspected theft on Sunday. The painting was stolen from the Saqqara necropolis, per The Associated Press. 

The open-air museum is “one of the most important cemeteries” in Memphis, some 15 miles south of Cairo, the council’s website said.

ITALIAN ARCHAEOLOGISTS UNVEIL RARE 2,600-YEAR-OLD TOMB UNTOUCHED BY LOOTERS: ‘DOORWAY TO OUR ANCESTORS’

The limestone relief was in the tomb of Khentika, a high-ranking figure during the sixth dynasty of the Old Kingdom period.

The painting dates back to around 2,300 B.C., making it at least 4,200 years old.

The missing relief, dating to Egypt’s Sixth Dynasty, was reportedly taken from the Saqqara necropolis near Cairo. (Sui Xiankai/Xinhua via Getty Images)

The tomb, found in the 1950s, was sealed by officials in 2019. 

RARE ANCIENT GOLD DISCOVERY MADE BY FLORIDA STUDENT AT ARCHAEOLOGICAL SITE

Citing Egyptian media, the AP reported that the painting was discovered missing in May, but its disappearance was not announced until this week.

Dozens of tourists looking outside necropolis

Saqqara, part of Egypt’s ancient capital of Memphis, is one of the country’s richest archaeological zones. (Sui Xiankai/Xinhua via Getty Images)

Details about the painting are limited. 

Egyptian media indicated the painting showed the ancient Egyptians’ three seasons: the flooding season Akhet, the planting season Peret and the harvest season, Shomu.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Khentika’s tomb is a mastaba, one of the few in Egypt to have a curse inscribed on its facade. Mastabas were rectangular, flat-roofed structures with sloping sides built over underground burial chambers.

The inscription warned intruders they could face the wrath of the gods if they trespassed, the AP reported.

Aerial view of necropolis

Located about 15 miles south of Cairo, Saqqara is a vast burial ground stretching across the desert plateau. (Ahmed Gomaa/Xinhua via Getty Images)

The announcement comes weeks after officials announced that a pharaoh’s priceless bracelet was stolen the Egyptian Museum in Cairo. 

The bracelet, which belonged to Pharaoh Usermaatre Amenemope, was melted down.

CLICK HERE FOR MORE LIFESTYLE STORIES

Egypt isn’t the only country hit by recent artifact thefts. In Wales, thieves recently stole Bronze Age gold jewelry from St. Fagans National Museum in Cardiff.

Speaking to Fox News Digital in September, threat management expert Spencer Coursen said that poverty in Egypt creates “an environment in which opportunistic crime thrives.”

Tourists looking at painting in necropolis

The open-air museum at Saqqara draws tourists, researchers and conservators from around the world. (Sui Xiankai/Xinhua via Getty Images)

“Pickpocketing in crowded markets, taxi overcharging and aggressive sales tactics are much more common than armed robbery or assault,” noted Coursen.

CLICK HERE TO GET THE FOX NEWS APP

“Egypt also has unique risks tied to regional instability and terrorism, particularly in the Sinai Peninsula and occasionally in major cities.”

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

The Associated Press contributed reporting.

Celebrities slammed for quiet response to Trump peace deal

0

NEWYou can now listen to Fox News articles!

Hollywood’s most vocal “Free Palestine” advocates are facing scrutiny for their muted or critical response to the ceasefire deal between Israel and Hamas secured by President Donald Trump.

Roughly two years after the deadly Hamas terrorist attacks against Israel sparked a war in Gaza, both sides agreed to the first phase of a peace proposal, Trump announced on Oct. 8. Under the plan, Hamas agreed to release all 20 remaining living hostages held in the Gaza Strip in exchange for Israel freeing about 2,000 Palestinian prisoners, including roughly 250 convicted terrorists.

During an address to Israel’s parliament, the Knesset, Trump hailed the Middle East ceasefire as a “historic day.”

Yet many in Hollywood who repeatedly called for a ceasefire throughout the conflict — including members of campaigns such as Artists4Ceasefire and Film Workers for Palestine — have either stayed quiet or criticized the breakthrough, with few acknowledging Trump’s role in securing it.

Billie Eilish wears a pro-Gaza pin from Artists4Ceasefire while attending the 96th Annual Academy Awards on March 10, 2024, in Hollywood, California. (Arturo Holmes/Getty Images)

HAMAS ACCEPTS TRUMP PEACE PLAN ENDING 2 YEARS OF WAR IN GAZA, RETURNING HOSTAGES

Pro-Israel actor and comedian Michael Rapaport was among those who noticed. He called out several celebrities he said were now “silent” about the ceasefire, accusing them of “performance” activism in an Oct. 11 Facebook post.

“CEASEFIRE is NOW, where are these people?” Rapaport wrote, naming actors Mark Ruffalo, John Cusack, Hannah Einbinder, Javier Bardem and singer Lorde. “The war in Gaza is ending. The so-called ‘genocide’ is over. Because it was never about peace. It was about performance,” he added.

Columnist Paula Froelich also criticized about a dozen celebrities who publicly called for a “Free Palestine” and “ceasefire now” or wore a red-hand pin to the Oscars in 2024. She said many have since stayed silent on the peace deal or continued to blame Israel “for all atrocities that have happened in the past two years.”

“If I were less charitable, I might argue that Hollywood celebrities care more about a performative farce — scolding Israel and our president — than seeing a Free Palestine actually happen in real time. How’s that for hypocrisy?” she wrote in her column for the U.K. newspaper The Times.

Zegler at film premiere

“Snow White” lead actress Rachel Zegler became a lightning rod for controversy when she expressed her views on the Israel-Gaza war and Trump voters. In an Aug. 2024 post about the trailer for “Snow White,” the actress wrote, “And always remember, free Palestine.” (VALERIE MACON / Contributor)

‘SNOW WHITE’ ACTRESS RACHEL ZEGLER IS UNCONCERNED ABOUT HOW HER VIEWS ON GAZA COULD AFFECT HER CAREER

Some supporters of the “Free Palestine” movement maintain that the ceasefire does not fully address the humanitarian crisis or allegations accusing Israel of genocide.

Fox News Digital reached out to representatives for figures who have publicly supported the Artists4Ceasefire or Free Palestine movements — including Ruffalo, Joaquin Phoenix, Billie Eilish, Rachel Zegler and Lorde — for comment on the ceasefire and Rapaport’s criticism but did not receive a response.

A few actors have spoken out on the peace deal, but not favorably. John Cusack, who has faced criticism from an antisemitism watchdog in the past, mocked the ceasefire as a “photo op” for Trump and Israeli Prime Minister Benjamin Netanyahu.

“To anyone who believes for a moment Netanyahu will stop killing — there’s a bridge in Brooklyn up for sale,” Cusack wrote Oct. 14. “He’ll give Trump his photo op — and then resume,” he added in the post, accusing both leaders of using the deal for political gain.

Spanish actor Javier Bardem, who wore a keffiyeh to the 2025 Emmy Awards, called the ceasefire “very good news” in an Instagram post but said it was “by no means a fair plan for the rights and future of the Palestinian people.” He also shared a clip from MSNBC’s “The Weekend,” where guest Noura Erakat claimed Trump’s Gaza plan was “another way of continuing [Israel’s] occupation.”

Javier Bardem standing

Javier Bardem wore a keffiyeh and declared “Free Palestine” from the red carpet at the 2025 Emmy Awards. ( Nathan Congleton/NBC via Getty Images)

JAVIER BARDEM TELLS ‘THE VIEW’ HE BELIEVES ISRAEL IS COMMITTING ‘GENOCIDE’ IN GAZA

“Hacks” actress Hannah Einbinder, who made headlines earlier this year for shouting “F— ICE and free Palestine” during her 2025 Emmy Awards acceptance speech, reposted several messages from other accounts questioning whether the ceasefire would hold. One warned there was “no guarantee this genocide will stop” while another criticized the peace terms. 

Other celebrities expressed cautious optimism. Progressive actors Mark Ruffalo and Susan Sarandon shared a statement from Artists4Ceasefire on Oct. 10 calling the agreement “an urgent and heartening moment of relief.” 

The group added, “It brings hope that precious lives can be saved, and that Israel’s bombing and intentional starvation of Palestinian civilians will end, that all hostages are safely returned, and that desperately needed humanitarian aid can flood into Gaza. We hold cautious hope that the ceasefire will last, and will continue to demand it is made permanent.”

Leading up to the deal, more than 1,000 actors, directors and film workers signed a pledge to boycott Israeli film institutions through the activist group Film Workers for Palestine. 

Mark Ruffalo and Susan Sarandon marching

Mark Ruffalo and Susan Sarandon are two high-profile figures involved in the Artists4Ceasefire movement. (Alex Kent/Getty Images)

TRUMP LAUDED BY MSNBC, LIBERAL MEDIA FIGURES FOR SECURING ISRAEL PEACE DEAL

“Inspired by Filmmakers United Against Apartheid, who refused to screen their films in apartheid South Africa, we pledge not to work with Israeli film institutions implicated in genocide and apartheid against the Palestinian people,” the group’s statement said. Signatories reportedly included Ruffalo, Emma Stone, Peter Sarsgaard, Lily Gladstone, Olivia Colman, Sarandon and Tilda Swinton.

The group posted a statement to Instagram on Oct. 15 declaring the boycott against Israel would remain in place “until Palestinians are no longer subjected to occupation, apartheid, and genocide.”

“This catastrophe, this genocide, has not ended with one call for ceasefire. And it will not end so long as the perpetrators of this genocide continue to avoid accountability,” the post added.

Despite the criticism, some actors have publicly praised the peace agreement. 

Israeli-American actress Natalie Portman called it a “momentous day” during an appearance at a film festival in France, saying, “It feels almost crazy to be talking about anything else except celebrating — hopefully — peace.” 

British actress Frances Barber also commended Trump for his role in the deal, writing on X, “I had TDS [Trump Derangement Syndrome], and I’m now eating my words,” while reposting a photo showing a “Thank You” message to Trump written in the sand on a Tel Aviv beach.

CLICK HERE TO GET THE FOX NEWS APP

Fox News’ Hanna Panreck, Marc Tamasco and Gabriel Hays contributed to this report.

Google, Dior hit in massive Salesforce credential theft data attacks

0


NEWYou can now listen to Fox News articles!

You might have noticed that in the past few months, many companies have disclosed data breaches, including Google, Dior and Allianz, and one name that appeared in most cases was Salesforce. Hackers did not breach company networks directly or exploit vulnerabilities in Salesforce’s core software. Instead, they targeted the tools and people around it by tricking employees into granting access, compromising third-party apps and abusing overly broad permissions.

Once inside, they siphoned sensitive data from Salesforce environments on an unprecedented scale. Nearly a billion records were stolen across dozens of organizations, and now cybercriminals are extorting victims by threatening to publish the data unless hefty ransoms are paid. Let’s look at the recent Salesforce incidents in detail and why this is such a big deal.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

JEEP AND CHRYSLER PARENT STELLANTIS CONFIRMS DATA BREACH

Salesforce Building in New York City

Hackers are weaponizing stolen Salesforce credentials to access company secrets. (REUTERS/Brendan McDermid)

Why Salesforce is the perfect target

Salesforce is not just another cloud platform. It is the backbone of how thousands of companies manage relationships with their customers. The platform powers everything from sales pipelines and marketing campaigns to support tickets and partner communications. Banks use it to track client accounts, airlines rely on it to manage frequent flyer programs, and retailers store customer purchase histories and loyalty data inside it. In many organizations, Salesforce sits at the center of daily operations, acting as a single system that touches sensitive information across departments.

That is why the scale of these breaches is so significant. A successful attack on a Salesforce instance becomes a window into a company’s customers, business strategy and internal processes. For cybercriminals, the potential payoff is enormous, and the recent incidents showed just how much damage they can cause without ever breaking into a company’s primary network.

The breaches hit companies across sectors, from Adidas and Allianz to Qantas, Google and Pandora Jewelry. Attackers often use voice-phishing calls or realistic fake apps to manipulate Salesforce administrators into installing malicious software. This allowed them to steal OAuth tokens and query data directly from CRM systems, a technique linked to groups like ShinyHunters.

Other attacks originated in compromised third-party integrations. One of the most damaging involved a chatbot tool called Drift, where stolen tokens gave attackers access to Salesforce instances at hundreds of companies.

The fallout was enormous. Coca-Cola’s European division lost more than 23 million CRM records, while Farmers Insurance and Allianz Life reported breaches affecting over a million customers each. Even Google admitted that attackers accessed a Salesforce database used for advertising leads.

TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED

A man uses a smartphone, illustrating the vulnerability of mobile devices in modern cybercrime.

Major brands like Google, Dior and Allianz are among those caught in the data fallout. (Kurt “CyberGuy” Knutsson)

Exploiting weak links in the ecosystem

It’s hard to break through firewalls or exploit technical vulnerabilities, but it’s much easier to manipulate people. Attackers have figured this out, and they are now focusing their efforts on human behavior and the less-protected edges of cloud ecosystems. Employees with administrative privileges were often tricked into authorizing malicious apps, while default permission settings allowed those apps to operate undetected.

Once they obtained the data, the hackers did not simply try to sell it. They used it as leverage. Earlier this month, a loosely organized cybercrime group known by names such as Lapsus$, Scattered Spider and ShinyHunters launched a dedicated data leak site on the dark web, threatening to publish sensitive information unless victims paid a ransom.

As reported, the site is designed to pressure companies into paying to prevent their stolen data from being made public. “Contact us to regain control of your data governance and prevent public disclosure,” reads one message on the site. “Do not be the next headline. All communications require strict verification and will be handled with discretion.”

The leak site lists several alleged victims, including FedEx, Hulu (owned by Disney) and Toyota Motors. It is also unclear whether some of the organizations known to have been breached but not listed on the site have paid ransoms to keep their data from being released.

FARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANS

A person types on a laptop computer in a home office setting, representing remote access points targeted in data breaches.

Cybercriminals are now extorting victims online, threatening to leak billions of stolen records. (Kurt “CyberGuy” Knutsson)

Salesforce’s response

Salesforce told Cyberguy that it is “aware of recent extortion attempts by threat actors” and will not engage with, negotiate with, or pay any extortion demands. A company spokesperson provided the following statement:

“We are aware of recent extortion attempts by threat actors, which we have investigated in partnership with external experts and authorities. Our findings indicate these attempts relate to past or unsubstantiated incidents, and we remain engaged with affected customers to provide support. At this time, there is no indication that the Salesforce platform has been compromised, nor is this activity related to any known vulnerability in our technology.”

6 steps you can take to protect your data

You might think a breach like this is a company problem, something for IT teams and cybersecurity experts to deal with. However, when attackers gain access to platforms like Salesforce, the data they are after is usually not the company’s. It is yours. Your contact details, purchase history, support tickets and even private conversations can end up in the wrong hands. And once that happens, the risks do not stay confined to one company. That is why it is worth taking a few proactive steps now, even if the company has not contacted you about an incident yet.

1) Lock down your accounts now

If you have interacted with any of the companies mentioned in the breach, or suspect your data might be part of it, change your passwords for those services immediately. Better yet, use a password manager to generate strong, unique passwords for every site. A good tool will also alert you if any of your credentials appear in future data leaks.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

2) Turn on two-factor authentication

Even if a password is stolen, two-factor authentication (2FA) adds a crucial extra layer of security. Enable it for your email, banking apps, cloud storage and any service that offers it. It is one of the simplest ways to block attackers from hijacking your accounts with stolen credentials. 

3) Use a personal data removal service

Even if your data was part of a breach, you can still limit how much of it is floating around online. Personal data removal services scan and delete your personal information from data broker websites that sell or share your details without consent. These brokers often trade in names, addresses, phone numbers and even purchase histories, the same type of data leaked in Salesforce-related breaches.

By removing your records from these public databases, you make it far harder for scammers, identity thieves and marketers to find or misuse your information. Many services, like Incogni, handle the entire opt-out process automatically and keep monitoring to ensure your data stays removed.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

4) Spot and stop targeted phishing attacks

Attackers who have CRM data often know more about you than a typical scammer. They might reference past purchases, support cases, or other personal details to make their messages sound legitimate. Treat unexpected emails, texts, or phone calls with suspicion, especially if they involve links or requests for payment.

The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

5) Use identity monitoring tools

Data breaches do not always result in immediate damage. Sometimes, criminals sit on stolen data for months before using it. These services can continuously monitor the dark web for your personal information and notify you if your data appears in new leaks. That gives you time to act before problems snowball.

Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

6) Know your rights

If you think your data was exposed, companies are legally obligated in most regions to inform you. Do not hesitate to contact them directly and ask for details on what was stolen and what steps they are taking to protect affected customers. The more pressure users apply, the more likely companies are to tighten security practices.

CLICK HERE TO GET THE FOX NEWS APP 

Kurt’s key takeaway

Attackers can expose your personal data even if you are careful. They gain access to corporate cloud environments and can see customer names, emails, purchase histories and other sensitive details. For users, this means it is crucial to stay vigilant. Criminal groups use this stolen information to launch targeted phishing attacks, open fake accounts, or impersonate you elsewhere. Some even cross-reference leaked Salesforce data with information from previous breaches to build disturbingly complete profiles of their victims.

Should companies face stricter penalties when sensitive customer data is stolen? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved. 



Source link

Apple launches iOS 26 with new Preview app for iPhone document editing

0


NEWYou can now listen to Fox News articles!

Apple has officially launched iOS 26, and with it comes a fresh look and one standout new feature: the Preview app. If you’ve updated your iPhone and noticed a new icon that looks like it belongs on a Mac, you’re not imagining things. Preview has finally arrived on iOS, and it’s more useful than you might think. Many iPhone users have long wanted an easier way to edit, annotate and scan documents without relying on third-party tools. Now, Apple’s built-in Preview app fills that gap, combining features from the Files app, Markup tools and the camera’s document scanner into one streamlined experience.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

What Apple’s Preview app can do

Just like the version on Mac, the Preview app on iPhone lets you handle basic photo edits and PDF changes with ease. You can:

  • Open and view PDFs or images directly from your Files app.
  • Annotate, draw and highlight content using the familiar markup tools.
  • Add text boxes or signatures to forms.
  • Crop, resize, or rotate photos.
  • Scan documents straight from your camera.
iPhone home screen displaying the Photos and Preview apps, showing where the Preview app appears after installation.

The new Preview app on iPhone makes scanning and signing documents feel effortless. (Kurt “CyberGuy” Knutsson)

When you open the app, you’ll see simple options like New Document or Scan Document. Tap the small Files section at the bottom to browse your phone’s stored content. The interface feels like Apple’s previous screenshot editor, so it’s instantly familiar. You can tap the three-dot menu for advanced tools like background removal, which saves you from downloading extra editing apps. If you open a PDF, Preview automatically detects fillable text boxes and lets you add your signature, perfect for signing forms or agreements on the go.

10 IOS 26 TRICKS THAT HELP YOU GET MORE OUT OF YOUR IPHONE

Inside the iPhone Preview app, highlighting options to create a

With built-in markup tools, you can highlight, draw or add your signature in seconds. (Kurt “CyberGuy” Knutsson)

How to scan a document using the Preview app

Preview’s built-in scanning tool is one of its best upgrades. It’s fast, accurate and ideal for receipts, contracts, or notes you want to store securely. If you’re already using Notes or Files to scan documents, you’ll find Preview much faster. It centralizes everything, no switching between multiple apps. Here’s how to do it:

  • Open the Preview app.
  • Tap Scan Documents from the home screen or the plus (+) icon if you’re already viewing another file.
  • Point your iPhone camera at the page you want to scan and hold it steady.
  • Preview will automatically detect the edges and capture the image.
  • After Preview captures the document, it shows a thumbnail.
  • If the edges aren’t right or the lighting is poor, tap Retake.
  • If you’re satisfied, tap the Blue Check mark in the upper right of the screen. This creates a digital document.

How to save or export your document

After scanning your pages, you can easily save, rename, or share your document directly from the Preview app using these steps.

Save to Files

  • Tap the Share button (a square with an arrow) and choose Save to Files. Select where you’d like to store it, such as iCloud Drive > Documents or On My iPhone > Scans, then tap Save.The scan is saved as a PDF file you can access anytime.

Rename the document

  • Tap the title at the top of the screen, type a new name such as Receipt-Oct2025.pdf, and tap Done.

Share the document

  • From the same Share menu, you can send the PDF by AirDrop, Messages or Mail.

Where to find saved scans later

  • Go to the Files app
  • Tap Browse
  • Then navigate to On My iPhone
  • Click Preview
  • Tap Scanned (or whichever folder you selected). You can open, mark up, or share the PDF directly from there.

HOW TO SAVE ANY FILE AS A PDF

iPhone home screen showing the Files app highlighted, followed by steps inside the Files app to scan and access documents stored locally under

Quickly find your saved scans in the Files app under Preview, where you can open, edit or share them. (Kurt “CyberGuy” Knutsson)

Similar tools for Android and Windows

If you’re on Android or Windows, you can do many of the same things using tools built into those platforms.

How to scan and edit documents on Android

If you’re using an Android phone running Android 6.0 or later, the Google Drive app includes a built-in document scanner powered by Google Play services. Starting in September 2025, Google began rolling out an upgraded scanning experience with sharper previews, smarter cropping and rotation, improved shadow removal and color filters that make your scans look more professional. The update also adds smoother page adjustments and a thumbnail carousel to easily reorder or delete pages before saving.

  • Open the Google Drive app on your Android device and make sure it’s updated through the Google Play Store for the latest features.
  • Tap the “+” or camera icon, then select Scan from the pop-up menu. Some phones may show a dedicated camera button for this.
  • Hold your phone steady so the entire page is visible. Drive automatically detects the edges and captures the document.
  • Use the built-in crop, rotate and color filter tools to fine-tune your scan. You can also remove shadows or retake a page if needed.
  • Tap Add page to create a multi-page PDF. If your device supports the new AI-powered scanner, Drive may detect and capture pages automatically.
  • Review your pages using the thumbnail carousel at the bottom to rearrange or delete any before saving.
  • Tap Save, enter a file name, choose your Drive folder and select whether to save as a PDF or JPG.
  • Open the saved file in Drive to annotate or highlight text using markup tools like drawing or underlining.
  • Share or export the finished document by sending a Drive link, attaching it to an email, or downloading it to another app.

EVEN WITH TRUMP’S TARIFF BLESSING, APPLE HIKES IPHONE PRICES

Android device screen showing Google Drive interface with the scan icon highlighted at the bottom, indicating where to tap to scan documents directly into Drive.

Use Google Drive’s upgraded scanner on Android to capture, crop and clean up documents in seconds. (Kurt “CyberGuy” Knutsson)

How to annotate and sign PDFs on Windows

Microsoft Edge includes a built-in PDF reader that supports inking, highlighting and adding comments or text notes. However, Edge is not a full PDF editor for rewriting text or rearranging pages. You can still draw or sign directly onto a PDF using the Draw/Pen tool, then save your edits. Some recent versions of Edge have limited annotation support, so features may vary. Because of those limitations, many Windows users rely on third-party PDF editors for complete editing control, such as adding text, rearranging pages, or performing OCR. The built-in Snipping Tool remains a quick way to capture and mark up screenshots or documents before saving or sharing. These steps work on both Windows 10 and Windows 11 using the Chromium-based Microsoft Edge browser.

The exact toolbar layout may differ depending on your version.

  • Open the Snipping Tool to capture a screenshot or document.
  • Choose the capture type: region, freeform, full screen, or window.
  • Save your capture as a PNG or JPG, or copy it to your clipboard for quick pasting.
  • To edit a PDF instead, open the file directly in Microsoft Edge.
  • Right-click the PDF file and select Open with → Microsoft Edge, or drag the file into the Edge window.
  • Use the Pen / Draw tool to write, draw, or sign directly on the PDF.
  • Highlight text by selecting it and choosing Highlight from the pop-up menu.
  • Add notes or comments with Add comment/text note.
  • Use the Draw tool again to sign your name, then save your edits.
  • Click the Save or Save As icon (the diskette symbol) to store your changes.
  • If your annotations don’t appear after saving, choose Print → Save as PDF to permanently embed them.

Best alternative PDF tools for Windows users

If Microsoft Edge doesn’t meet your editing needs, consider these free or paid alternatives that work across different devices:

  • PDF24 Creator: A free, highly rated PDF editor designed for Windows. It lets you merge, compress, sign, and convert PDFs without watermarks.
  • Xournal++: A popular open-source tool for Windows, macOS and Linux that lets you annotate PDFs with a pen or stylus.
  • Foxit PDF Editor: A professional, cross-platform editor with full text editing, signing and OCR tools. It’s available for Windows, macOS, iPhone and Android through the Foxit PDF Editor Mobile app.

These tools give you far more flexibility than Edge if you regularly edit, organize, or sign digital documents across devices.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

CLICK HERE TO GET THE FOX NEWS APP

Kurt’s key takeaways

Apple’s new Preview app in iOS 26 makes editing and scanning documents easier than ever. It brings together familiar tools from Files, Markup and the camera into one place, saving you time and steps. The experience feels seamless, especially if you often switch between your Mac and iPhone. For Android and Windows users, similar built-in tools already offer strong alternatives. Google Drive’s upgraded scan feature and Microsoft Edge’s PDF tools both make it simple to capture, annotate and share files. These options prove that whether you’re on iPhone, Android, or Windows, document management has never been more convenient. In the end, Preview’s arrival on iPhone marks another step toward a unified Apple ecosystem where productivity tools just work. If you’ve ever wished you could scan, sign, or edit a file in seconds, this update delivers.

Do you think Apple’s new Preview app will replace your go-to document editor, or will you keep using third-party tools? Let us know by writing to us at Cyberguy.com/Contact

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved. 



Source link

Ancient golden brooch and jade stone found in Troy dating to 2,500 B.C.

0

NEWYou can now listen to Fox News articles!

Turkish officials recently unveiled a gleaming gold brooch and a rare jade stone in Troy – a remarkable breakthrough that sheds light on the city’s pre-Greek past.

The artifacts were found by archaeologists excavating the Troy archaeological site, located in northwestern Turkey.

Troy was once considered a mythical city, and its remains were first unearthed by Heinrich Schliemann in 1870. The settlement is most famous for being depicted in Homer’s epic poems “The Iliad” and “The Odyssey.”

ANCIENT CIVILIZATION’S GOLD COINS, LUXURY ARTIFACTS UNEARTHED DURING ‘UNPRECEDENTED’ DIG

The Turkish Directorate of Communications announced the new finds in a Sept. 30 release, citing Anadolu Agency.

The artifacts were found in the Troy II settlement layer, which dates back to 2,500 B.C. — some 4,500 years ago. 

Archaeologists in northwestern Turkey uncovered a golden brooch and rare jade stone in the remains of the ancient city of Troy. (Bettman via Getty Images; @MehmetNuriErsoy via X)

Turkish officials say the discovery also sheds light on “the long-standing debate regarding the beginning of the Troy II period,” which is usually cited as being between 2550 and 2500 B.C.

RARE ANCIENT GOLD DISCOVERY MADE BY FLORIDA STUDENT AT ARCHAEOLOGICAL SITE

In an X post, Mehmet Nuri Ersoy, the Turkish minister of culture and tourism, lauded the discovery of the brooch.

Trees, stones at site of ancient Troy

Excavations at Troy continue to reveal extraordinary finds linking Anatolia with the early Mediterranean world. (LTL/Heritage Images via Getty Images)

“This brooch, the best-preserved of only three known examples in the world, is among the most significant finds of the last 100 years,” wrote Ersoy.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

He said that jade stones, like the one recently found, were seen as luxury items in antiquity.

Split image of brooch, jade stone

The golden brooch and jade stone, found in the Troy II layer, date back roughly 4,500 years. (@MehmetNuriErsoy via X)

The gem was not native to Anatolia, suggesting it arrived through long-distance trade.

MORE FROM FOX NEWS LIFESTYLE

All artifacts are planned to be shown at the Troy Museum in Çanakkale, Turkey.

View of ruined structures at Troy

UNESCO calls Troy one of the most famous archaeological sites in the world, rich in cultural heritage and myth. (LTL/Heritage Images via Getty Images)

Troy was added to the UNESCO World Heritage List in 1998. 

UNESCO’s website says Troy is considered one of the most famous archaeological sites in the world.

CLICK HERE TO GET THE FOX NEWS APP

“Its extensive remains are the most significant and substantial evidence of the first contact between the civilizations of Anatolia and the burgeoning Mediterranean world,” UNESCO says.