13.8 C
New York
Tuesday, March 10, 2026
Home Blog Page 83

Why Open AI’s new Sora 2 will make you never trust video again

0


NEWYou can now listen to Fox News articles!

I have to tell you about Sora 2. It’s OpenAI’s new video-generating app that’s both mind-blowing and terrifying.

It’s the first tool from any AI company that lets you give it a prompt, and in literally seconds, you get a full-blown, AI-generated video up to a minute long. The results aren’t perfect, but they’re close. Like Hollywood close. 

LEAKED META DOCUMENTS SHOW HOW AI CHATBOTS HANDLE CHILD EXPLOITATION

The lighting, camera motion, facial expressions, it’s all shockingly realistic. 

AI messaging

AI videos surge in light of the new Sora 2 video-generating app. (iStock)

Want to see a golden retriever surfing through Times Square in slow motion? Done. A drone shot of a city being built out of clouds? Easy. 

Dead celebrities

People are using Sora 2 to generate fake videos of dead celebrities doing things they never did. 

  • JFK is deepfaked into a WWE superstar.
  • Tupac appears with Mr. Rogers talking about respect.
  • Stephen Hawking is attacked in the UFC. Warning: I knew this was all AI, but it was still upsetting to watch. Weird, right?
  • Even Sam Altman, CEO of OpenAI, is shoplifting GPUs from Target.

SEN SANDERS: AI MUST BENEFIT EVERYONE, NOT JUST A HANDFUL OF BILLIONAIRES

I’m sure you know that under U.S. law, “defaming” someone only applies to living people, not the dead. That means families and estates have no legal recourse when someone uses AI to humiliate or misrepresent their loved one. It’s a free-for-all right now, and no one’s accountable. 

Even creepier?  

Photo of Sora artificial intelligence app on a phone with the Open AI logo in the background

In this photo illustration, a smartphone screen shows the Sora 2 app icon developed by OpenAI, in front of the company’s logo, on October 8, 2025, in Chongqing, China. Sora 2 is OpenAI’s next-generation generative video model that powers the Sora app, supporting synchronized audio, realistic motion, and physically accurate scene simulation. (Photo illustration by Cheng Xin/Getty Images) ((Photo illustration by Cheng Xin/Getty Images))

Sora is also being used for stalking and impersonation. All it takes is a photo, and you can make a video of anyone doing anything. Fake crimes, revenge content, political lies, it’s all possible. 

Zero guardrails

DEMOCRATS DEMAND ‘ROBOT TAX’ AS AI REPORTEDLY THREATENS TO REPLACE 100M US JOBS

OpenAI says you need permission to use a person’s face or voice. Yea, like that’s going to stop someone.  

If the guy who runs OpenAI can’t stop his own face from being misused, what chance do the rest of us have? Right now, you can only get Sora 2 as an iPhone app. You’ll need an OpenAI account, and it’s still invite-only, so most people don’t have access yet.  

Sam Altman speaking into a microphone

Sam Altman, chief executive officer of OpenAI Inc., during a media tour of the Stargate AI data center in Abilene, Texas, US, on Tuesday, Sept. 23, 2025. Stargate is a collaboration of OpenAI, Oracle and SoftBank, with promotional support from President Donald Trump, to build data centers and other infrastructure for artificial intelligence throughout the US. (Photographer: Kyle Grillot/Bloomberg via Getty Images) (Kyle Grillot/Bloomberg via Getty Images)

Sora 2 is an incredible tool. But it’s being abused, and the guardrails are flimsy at best. So from now on, when a video goes viral, you better assume it’s fake until proven real.

CLICK HERE TO GET THE FOX NEWS APP

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

  • National radio:  Airing on 500+ stations across the US – Find yours or get the free podcast.
  • Daily newsletter: Join 650,000 people who read the Current (free!)
  • Watch: On Kim’s YouTube channel

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 



Source link

Wi-Fi calling may drain iPhone battery faster than cellular connection

0


NEWYou can now listen to Fox News articles!

When you live in an area with limited or no cell service, Wi-Fi calling can be a lifesaver. It keeps you connected for calls and texts when your phone would otherwise be useless. However, some iPhone users have noticed that this feature appears to drain their battery more quickly than usual. Laura B wrote to us asking,

“Living in a rural area with no cell service, naturally, my iPhone is used with Wi-Fi and Wi-Fi calling only. It seems to me it uses more battery this way than when connected to cellular data. Is this possible?”

Laura’s question is a common one, and the short answer is: yes, Wi-Fi calling can sometimes use more battery than a strong cellular connection. The reasons haven’t changed much in iOS 26, but Apple has added a few tools that make it easier to understand and manage battery use. And if you’re on Android, don’t worry; we’ll cover the steps for your phone too, further down.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

10 IOS 26 TRICKS THAT HELP YOU GET MORE OUT OF YOUR IPHONE

A person in a red sweater holds a smartphone with a colorful home screen, typing on the device.

Wi-Fi calling keeps you connected but can drain your iPhone battery faster. (Kurt “CyberGuy” Knutsson)

Why Wi-Fi calling can use more power

Even though Wi-Fi calling is designed to keep you connected, there are a few behind-the-scenes reasons it may drain your iPhone battery faster than expected.

1) Your phone still looks for a cellular signal

Even when you don’t have service, your iPhone may periodically scan for towers. That search drains energy unless you take steps to stop it.

2) Wi-Fi antenna + call processes stay active

Wi-Fi calling requires your Wi-Fi radio to remain on constantly while also running extra background processes to stabilize calls. That workload can use more energy than simply maintaining a strong LTE signal.

3) Weak or unstable Wi-Fi makes things worse

If your Wi-Fi signal drops or fluctuates, your iPhone works harder to maintain the connection. That extra effort can warm the phone and eat into your battery.

WHY IPHONE USERS ARE THE NEW PRIME SCAM TARGETS

A person wearing a blue shirt uses a smartphone at a round table with a notebook, pen, and cup of coffee.

Simple tweaks help you enjoy Wi-Fi calling without killing your charge. (Kurt “CyberGuy” Knutsson)

How to Make Wi-Fi Calling More Battery-Friendly on iOS 26

These settings are tried-and-true and work just as well in iOS 26:

1) Stop your iPhone from searching for towers

  • Go to Settings
  • Tap Airplane Mode
  • Turn it ON
  • Then go back to Wi-Fi in Settings and turn Wi-Fi ON manually

This keeps your iPhone from wasting power looking for nonexistent cell service.

2) Keep Wi-Fi Calling enabled

  • Open Settings.
  • Scroll down and tap Apps.
  • Click Phone.
  • Tap Wi-Fi Calling.
  • Make sure “Wi-Fi Calling on This iPhone” is switched ON.

3) Reduce background activity

  • Background App RefreshSettings → General → Background App Refresh → set to Wi-Fi only or turn it off for apps you don’t need.
  • Mail FetchSettings → AppsMail → Accounts Fetch New Data → change to Manually or set a longer interval like Every 30 minutes or Every 15 Minutes. 

4) Cut screen and system drain

  • BrightnessSettings → Display & Brightness → lower brightness or use Auto-Brightness by clicking Automatic. 
  • Location ServicesSettings → Privacy & Security → Location Services turn off for apps that don’t need it.

5) Keep Wi-Fi connection strong

  • Place your phone closer to the router
  • Consider upgrading to a mesh Wi-Fi system if your signal drops across the house

YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

Close-up of a smartphone with a green case resting on a wooden surface, showing its USB-C charging port.

iOS 26 adds new battery analytics to track and manage power use. (Kurt “CyberGuy” Knutsson)

What iOS 26 adds to the mix

Apple didn’t change how Wi-Fi calling itself works in iOS 26, but it did improve how you can monitor and manage battery use:

  • Adaptive Power (on supported iPhones): This feature adjusts things like screen brightness, refresh rates and background tasks automatically when your battery starts draining faster than usual.
  • New battery analytics: iOS 26 shows a single weekly average view with clearer breakdowns of which apps and processes are using power. To check this: Open Settings → scroll down and tap Battery→ the Weekly view of average battery use appears by default → tap a bar to see a specific day’s app and process usage → scroll down and tap Show All Battery Usage to view Screen Active vs. Screen Idle time and charging history alongside the updated weekly stats

These tools don’t remove Wi-Fi calling’s overhead, but they give you better visibility and, in some cases, automatic tweaks to help stretch your charge.

How Wi-Fi calling affects battery on Android

Android users face many of the same challenges as iPhone owners when it comes to Wi-Fi calling and battery drain. The basic reasons overlap; extra processes, Wi-Fi radios staying active and unstable signals. But Android also has some unique quirks and settings worth adjusting.

Settings may vary depending on your Android phone’s manufacturer 

Your phone still scans for cell towers

Even when Wi-Fi calling is on, your Android device may keep searching for mobile networks in the background. This constant scan eats up power unless you turn it off.

Fix: Enable Airplane Mode, then manually switch Wi-Fi back on. To do this open Settings, tap Network & Internet, and turn on Airplane Mode. Once it’s active, go back into Wi-Fi, switch it on manually and reconnect to your network so Wi-Fi calling still works without the phone constantly searching for cell towers.

Carrier settings differ

Not every carrier handles Wi-Fi calling the same way on Android. Some route calls differently, which can use more energy depending on the network.

Fix: Check your carrier’s Wi-Fi calling preferences in Settings → Network & Internet → Mobile Network → Advanced → Wi-Fi Calling.

Background apps can pile on

Unlike iOS, many Android devices allow dozens of apps to keep running in the background. When Wi-Fi calling is active, that extra load can drain faster.

Fix: Go to Settings → Battery → Battery Usage and identify apps draining the most power, then restrict background activity.

Adaptive Battery and Power Saving modes

Most Android phones (Pixel, Samsung Galaxy, OnePlus, etc.) include Adaptive Battery or similar power-saving tools. These features limit battery-hungry apps when Wi-Fi calling is active.

Fix: Enable Adaptive Battery in Settings → Battery → Adaptive Preferences, or use Power Saving mode if you notice faster drain during calls.

Strengthen your Wi-Fi signal

As with iPhones, weak Wi-Fi is a big culprit. Dropped or unstable Wi-Fi forces your Android phone to work overtime to keep a call steady.

Fix: Stay near your router or consider upgrading to a mesh Wi-Fi system.

CLICK HERE TO GET THE FOX NEWS APP

Kurt’s key takeaways

Wi-Fi calling is a lifesaver when you’re off the grid, but it does come with trade-offs. It can use more power than a strong cellular connection, especially if your Wi-Fi signal isn’t steady. The good news is that iOS 26 gives you better battery insights and smarter tools to help manage power. With a few simple tweaks, like turning on Airplane Mode when there’s no service, limiting background apps and keeping your Wi-Fi strong, you can cut unnecessary drain.

What’s been your biggest challenge with your phone’s battery life, and how do you manage it? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

Sweden launches tourist campaign for doctors to prescribe visits for health and wellness

0

NEWYou can now listen to Fox News articles!

Sweden has launched a novel tourist campaign that urges boosting mind and body by traveling there, yet some are already sharing differing thoughts. 

The “Prescribe Sweden” campaign has partnered with medical professionals to help people benefit from the country’s “restorative experiences,” as announced by Visit Sweden.

Stress management, lifting one’s spirits and balancing everyday life are among the benefits of taking a trip to the country, according to the program. 

DOGS TREATED LIKE FAMILY IN MAJOR AMERICAN CITY NOW FACE CANINE CANCEL CULTURE

Visitors can fill out a referral forum to bring to their doctor to serve as the basis for taking a medically prescribed trip.

“Medical doctors can generate a prescription and advise patients to spend time in Sweden,” notes Visit Sweden on its site. 

Boats are shown docked at an island in Sweden. Stress management, lifting one’s spirits and balancing everyday life are among the benefits of taking a trip to the country, according to a new campaign.  (iStock)

Professor Yvonne Forsell at Karolinska Institute created a list of recommended nature, lifestyle and cultural activities. 

Swedish saunas, for example, are suggested to promote relaxation, social connection and physical recovery.

For more Lifestyle articles, visit foxnews.com/lifestyle

Regular sauna bathing is linked to a 65% lower risk of Alzheimers disease and dementia, Visit Sweden said, citing a 2018 study published in the National Library of Medicine. 

Another activity listed is foraging in the wild — highlighting the tradition of looking for fresh berries and mushrooms. 

woman in sweden laying on grass

Visit Sweden has created a medical referral program in which doctors can prescribe trips for people’s mental and physical health. (iStock)

Foraging supports well-being, said Visit Sweden, through stress reduction, connection to nature and mental restoration.

The tourist board states that it does not cover “any costs incurred with a prescription to visit Sweden.” 

City of Gothenburg rooftops panoramic view, Vastra Gotaland County of Sweden

A town in Sweden. A professor has created a list of recommended nature, lifestyle and cultural activities to partake in when traveling to the country. (iStock)

Dr. Sam Everington, British Medical Association vice president, is listed as a medical professor who supports the “prescription.”

“Spending time in nature and engaging with culture are evidence-based ways to support both mental and physical health. Sweden offers an ideal setting for this kind of care,” Everington is quoted as saying on the Visit Sweden site. 

Sweden skyline

The tourist board states that it does not cover “any costs incurred with a prescription to visit Sweden.”  (Jeff Overs/BBC News & Current Affairs via Getty Images)

About 9.15% of foreign travelers were American in 2024, according to Visit Sweden. 

In the “r/Sweden” forum on Reddit, one traveler called the Nordic country the best in the world.

CLICK HERE TO GET THE FOX NEWS APP

“Just got back home (to the USA) from Sweden with utter depression. Visiting Sweden has taught me what a country ought to look like,” the user wrote.

Couple on a hike

Spending time in nature supports well-being through stress reduction, connection to the outdoors and mental restoration, health experts say. (iStock)

The traveler added, “I got to pick some mushrooms! They were delicious. I’ve never seen beard moss until I went to the Swedish forest.”

Another person, however, claimed to be Swedish and wrote on the forum, “Not wishing to be a downer, but it is a bit disheartening to hear our streets being described as clean, pristine and impeccable.”

tourists sweden

About 9.15% of foreign travelers were American in 2024, according to Visit Sweden. (iStock)

“I see tons of plastic, paper, cans … pretty much everywhere l go,” the person added. 

Another person warned, “Just be aware [of] the thick winter darkness.”

MAJOR CRUISE LINE SUSPENDS CARIBBEAN DESTINATION VISITS AMID KIDNAPPINGS, SAFETY CONCERNS

“It’s a great country, but not without its problems,” said yet another person. 

On Facebook, a different person posed this question: “And who will pay for travel and visa?”

Stockholm old town city skyline, cityscape of Sweden at sunset

A waterfront town in Sweden is shown above. “It’s a great country, but not without its problems,” wrote a social media user.  (iStock)

Said another, “Even if my doc prescribes me to visit Sweden, my [job] won’t allow it.”

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Fox News Digital reached out to the Swedish government for comment. 

No end to Gaza war unless Hamas returns all hostages and disarms: ambassador

0

NEWYou can now listen to Fox News articles!

There will be no end to the war in Gaza if Hamas does not hand over all 48 living and deceased hostages and completely disarm per the terms of the agreement finalized overnight between Hamas and Israel, Jerusalem’s ambassador to the U.S., Yechiel Leiter, warned in an interview with Fox News Digital on Thursday. 

The Israeli government is expected to approve the peace deal first presented by President Donald Trump late last month, and then agreed to by Prime Minister Benjamin Netanayhu

But concerns remain over Hamas’ commitment and ability to return all the bodies of the deceased hostages within a 72-hour window beginning Friday night local time, as directed under the terms of the agreement.

Palestinians, including children, gathered in the city of Khan Yunis celebrate after the announcement of the ceasefire agreement in Gaza on Oct. 9, 2025 in Khan Yunis, Gaza.  (Abdallah F.s. Alattar/Anadolu via Getty Images)

TRUMP PEACE DEAL TRIGGERS 72-HOUR COUNTDOWN FOR HAMAS TO RELEASE 48 HOSTAGES FROM GAZA

“They have an obligation to return everyone in 72 hours. Hopefully we’re going be able to keep everything within that framework,” Leiter said when asked about concerns over Hamas’ ability to immediately hand over all the deceased hostages. “There are some glitches that we have to deal with, and this issue is one of them. 

“But we need to see all the bodies back, and I don’t think we’re going to be able to move forward until we do have everyone,” he added.

Leiter said a part of the problem is Hamas did not diligently keep track of where it left the bodies of the deceased, but warned that until every body is returned, Israel will not withdraw its forces from the Gaza Strip.

An international task force involving the U.S., Qatar and Egypt has been formed to help Israel recover the bodies of the deceased, but the White House did not respond to Fox News Digital’s questions regarding what role the U.S. will play or if there will be American boots on the ground aiding the search. 

An agreement was reached overnight after mediators from the U.S., Egypt and Qatar worked for days with Hamas and Israeli officials to hash out details of the peace agreement, though it remains unclear if there were any changes made to Trump’s original 20-point plan. 

Netanyahu stands next to Ambassador Yechiel Leiter

Benjamin Netanyahu, Israel’s prime minister, left, and Yechiel Leiter, Israel’s ambassador to the U.S., speak to members of the media following a meeting with US House Speaker Mike Johnson, a Republican from Louisiana, not pictured, at the US Capitol in Washington, D.C., US, on Tuesday, July 8, 2025.  (Graeme Sloan/Bloomberg via Getty Images)

FATHER OF YOUNGEST AMERICAN HOSTAGE HOLDS OUT SLIVER OF HOPE AFTER TRUMP SECURES GAZA PEACE DEAL

Reports over the weekend suggested Hamas objected to the calls that it completely disarm – though in exchange it would also be granted amnesty and a path out of Gaza to an accepting third party nation should they choose to leave – and Leiter was unable to shed light on whether Hamas has formally conceded to the disarmament terms. 

“We hope it proceeds according to the president’s plan,” Leiter said. “We assume, having long experience with Hamas and Islamic Jihad and these terrorist organizations, that there are going to be glitches along the way.

“Look, they’re going down. This is basically a surrender on Hamas’s part. They don’t like it one bit, and they’re going to do whatever they can to try to show that they’re still relevant,” the ambassador warned. 

People gather in Hostages Square as a woman holds a large yellow sign listing hostages’ names in Hebrew.

People gather in Hostages Square during a rally as a participant displays a sign listing hostages’ names following the Israel-Hamas peace deal. (Dana Reany/Hostages and Missing Families Forum)

Disarmament is not a part of the first phase, which involves the complete return of all hostages, the partial withdrawal of Israeli troops to a designated line as agreed to by Israel and Hamas, and the release of nearly 2,000 Palestinian prisoners, including 250 of whom are serving life sentences for terrorist offenses, including murder. 

The second phase would involve further withdrawal of Israeli forces in coordination with the complete disarmament of Hamas and demilitarization of the enclave. An international “peace body” headed by Trump would also be established to begin the process of rebuilding the Gaza Strip. 

“We’ve put all the focus now on the first phase,” Leiter said, while acknowledging that Hamas has made comments suggesting it will not disarm and the second phase of a peace deal could once again collapse.  

War continues in Gaza

A smoke plume billows following Israeli bombardment on the Gaza Strip as seen from northwest of Nuseirat refugee camp in Gaza, on Oct. 9, 2025.  (Majdi Fathi/NurPhoto via Getty Images)

CLICK HERE TO GET THE FOX NEWS APP

“But that’s part of the plan – that’s very clearly part of the president’s plan. That was the goal set out by Prime Minister Netanyahu from the outset, that Hamas is disarmed, that Gaza is de-radicalized and demilitarized. 

“We can’t go back into a situation where we have Jihadi militants sitting at our border, or else we haven’t accomplished anything,” the ambassador said. “This is performance-based. They disarm, they are disarmed if necessary, and then Israel withdraws.”

Scammers mimic real work emails, making phishing attacks nearly undetectable

0


NEWYou can now listen to Fox News articles!

Cybercriminals are getting smarter every day, and one of their most convincing tricks is disguising phishing emails to look like they’re coming from people you trust. Work emails are particularly dangerous because they lower your guard. After all, if the sender is your boss or IT department, why would you suspect anything? Unfortunately, scammers know this and use it to their advantage. I recently received an email from Krysti from Rockwall, Texas, who highlighted a similar issue.

“I received a spam email from my employer’s email. It had a document attached to it. I tried to open it and could not. I contacted my employer and they told me they hadn’t sent me anything. I changed my password and ran a virus scan. I also have been checking on the dark web for anything coming up on me. So far everything is okay. I did sign up for antivirus software based on your recommendation and we are signed up for identity theft protection. Is there anything else I should do?”

Incidents like this are more common than many realize, Krysti. And while it sounds like you took the right first steps by changing your password, scanning for malware and monitoring for identity misuse, there are a few additional precautions worth taking. A close call is often a warning sign that your digital habits might need tightening. Let’s break down why these attacks are so dangerous and what everyone should do to make sure they’re fully protected.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

PROTECT YOURSELF FROM SNEAKY WEB INJECTION SCAMS

A person wearing headphones sits in a dark room, working on multiple computer screens displaying code.

Phishing emails often look like they come from someone you know, making them harder to spot. (Kurt “CyberGuy” Knutsson)

Why work email scams are so dangerous

Phishing attempts that impersonate coworkers or employers are particularly effective because they rely on trust and urgency. You’re more likely to open an attachment or click a link if you believe it’s tied to your job. Scammers often spoof legitimate email addresses or use addresses that look almost identical to the real ones, hoping you won’t notice the subtle difference.

Once you interact with these emails, the risks multiply. Opening a malicious attachment could install spyware or ransomware. Clicking a fake link might lead to a login page designed to harvest your credentials. Even if nothing obvious happens right away, attackers could still be collecting background information to use in a future attack.

These scams are becoming harder to spot, too. Some are powered by artificial intelligence-generated text, making them free of the usual grammar mistakes that used to be obvious red flags. Others use stolen email threads to insert themselves into ongoing conversations. That’s why even seasoned professionals fall for them.

GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP

A man in a white shirt uses a smartphone, focusing on the screen as he taps with one hand.

Opening a fake attachment can secretly install malware or spyware on your device. (Kurt “CyberGuy” Knutsson)

What to do immediately after a close call

Changing your password or running a malware scan is often not enough to stop attackers. It’s worth going a little further to make sure nothing slipped through. Start by checking your login history to see if there are any unauthorized sign-ins on your email or work accounts.

Most platforms allow you to review recent activity, including device type and location, and if anything looks suspicious, sign out of all sessions immediately and change your password again. Next, enable two-factor authentication on your email and any other critical accounts. Even if attackers manage to steal your password, they won’t be able to gain access without the second verification step.

It’s also important to alert your IT team, especially if the email appears to come from your employer’s address. This could mean the company’s email system has been compromised, and notifying them will allow them to investigate and secure other accounts if necessary. Finally, make sure all your software is up to date. Malware often exploits vulnerabilities in outdated systems, so regularly updating your operating system, antivirus and productivity tools adds another layer of protection against future attacks.

DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

Close-up of a person typing on a laptop keyboard, with a computer monitor in the background.

Work email scams are rising, and even experienced professionals can get fooled. (Kurt “CyberGuy” Knutsson)

7 ways to check if your device or data is compromised

Some cyber threats don’t reveal themselves immediately. Scammers often collect small bits of data over time or wait weeks before trying to use what they’ve stolen. The following steps are actions anyone can take to make sure their device and personal data remain secure, and to catch any signs of compromise before they turn into serious problems.

1) Consider a personal data removal service

The more personal information about you that’s publicly available, the easier it is for scammers to target you. Data removal services can help by scanning hundreds of data broker websites and removing your details from them. Reducing this digital footprint not only makes it harder for attackers to build profiles on you but also limits how easily phishing attempts can be tailored to your life.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS 

2) Monitor for already exposed personal data

Your information could already be circulating in breach dumps and underground markets without you realizing it. Identity protection services monitor known dark-web sources, forums and leak sites for your email, phone, SSN and other sensitive details. If they find a match, they alert you so you can act quickly: change passwords, turn on two-factor authentication and place fraud alerts or credit freezes with the credit bureaus.

Your information might already be circulating in dark web marketplaces without you realizing it. Identity theft protection services can help by continuously scanning those underground sites for your email, passwords or other sensitive details. If your data does show up, these services notify you right away so you can reset credentials, freeze accounts or take other protective actions before the information is misused.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

3) Watch for suspicious financial activity

Even if you never shared payment details, attackers may attempt account takeovers or fraudulent transactions using any information they have. Review your bank, credit card and online account statements frequently for unusual activity. Pairing this habit with identity theft protection tools gives you an added safety net, as they often include financial monitoring and fraud alerts to catch problems quickly. 

4) Review connected accounts

Email accounts are often the central hub for many other services. If your inbox is compromised, attackers might try to break into linked accounts such as cloud storage, messaging apps or collaboration tools. Check each of these services for unfamiliar logins, permission changes or device activity, and secure them by changing passwords and enabling two-factor authentication. 

5) Use a password manager

Weak or reused passwords are one of the easiest ways for attackers to break into accounts after a breach. A password manager solves this by generating and storing strong, unique passwords for every site you use. It also acts as a passive phishing detector. If the tool doesn’t autofill a login form, that’s a sign the page could be fake. Over time, this significantly reduces your risk of falling victim to credential-based attacks.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

6) Install reliable antivirus protection

Modern cyber threats go beyond viruses. A strong antivirus solution now acts as a full security layer, blocking phishing websites, detecting malicious scripts and stopping suspicious activity before it can compromise your device. If you’ve interacted with a suspicious attachment or link, a reputable antivirus tool can catch malware that might still be hiding in the background.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

7) Enable account alerts

Most major platforms allow you to turn on alerts for unusual account activity, such as new sign-ins, password resets or changes to security settings. These real-time notifications act as an early warning system, giving you a chance to lock down your accounts before significant damage occurs.

CLICK HERE TO GET THE FOX NEWS APP 

Kurt’s key takeaway

Close calls like this are unsettling, but they are also valuable wake-up calls. Cybercriminals are constantly refining their tactics, and phishing emails that once looked laughably fake can now be nearly indistinguishable from the real thing. The key is to build layers of defense, not just reactive steps after an incident, but proactive habits that make you a harder target in the first place.

Have you ever clicked on an email that turned out to be a scam? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link

LifeX Research is at The Forefront of Revolutionizing Health Insurance by Equipping Individuals and Employers With Cutting-Edge Insights Derived From Data Analysis

0
LifeX Research is at The Forefront of Revolutionizing Health Insurance by Equipping Individuals and Employers With Cutting-Edge Insights Derived From Data Analysis 39

LifeX is Revolutionizing the way individuals obtain, comprehend, and enhance their welfare outside of conventional coverage frameworks.

Atlanta, GA, October 9, 2025 – In a world where health insurance often feels like a complex maze, LifeX Research is leading the charge to simplify and elevate how people think about their well-being. With an unwavering commitment to empowering individuals and employers alike, this innovative company harnesses advanced data-driven insights to transform the landscape of health coverage.

Gone are the days of one-size-fits-all solutions that leave many feeling lost or underserved. LifeX Research is rewriting the rules on access, understanding, and optimization beyond traditional coverage models. As they pave the way for a brighter future in health insurance, you’ll want to be part of this exciting journey toward personalized wellness solutions.

The Impact of Data-Driven Insights on the Health Insurance Industry

Data-driven insights are revolutionizing the health insurance landscape. By leveraging vast amounts of information, insurers can tailor plans that meet individual needs more precisely than ever before.

These insights allow for risk assessments based on real-time data, transforming how premiums are calculated and coverage is offered. Individuals receive personalized options rather than a one-size-fits-all approach.

Predictive analytics help identify potential health risks early. This proactive strategy not only improves patient outcomes but also reduces costs for both providers and consumers.

Health insurers who embrace this shift can enhance customer satisfaction significantly. Engaging with clients through transparent data fosters trust and loyalty in an industry often viewed with skepticism.

As these advanced techniques gain traction, they’re poised to reshape standard practices within the sector, paving the way for innovative solutions that prioritize stakeholder well-being above all else.

How LifeX Research Utilizes Advanced Technology and Data Analytics

LifeX Research is at the forefront of technological innovation in health insurance. By harnessing advanced data analytics, they unlock insights that were once hidden from both individuals and employers. Through machine learning algorithms, LifeX can analyze vast amounts of health data. This allows them to identify trends and patterns that inform better decision-making. Real-time data access empowers users to monitor their health metrics actively.

Personalized recommendations guide individuals on how to improve their well-being beyond traditional coverage models. LifeX’s technology integrates seamlessly with existing healthcare systems. This ensures a smooth transition for companies looking to adopt these cutting-edge solutions without disruption.

By prioritizing transparency and user engagement, LifeX creates an ecosystem where knowledge fosters empowerment. Clients no longer feel lost in complex insurance processes but are equipped with tools tailored specifically for their needs.

Individuals can explore options that empower them to take charge of their well-being. This approach fosters better decision-making, resulting in improved health outcomes and increased satisfaction.

Employers benefit from enhanced workforce productivity as employees experience lower healthcare costs and reduced absenteeism. By investing in comprehensive coverage models designed through advanced analytics, companies create a healthier work environment.

Their commitment to utilizing sophisticated technology and analytics sets them apart in a landscape where other unaffiliated companies sometimes utilize these structures as scams. LifeX stands out by offering transparency and integrity in its offerings, ensuring that clients receive genuine value from their services.

Join this revolution today; empower yourself or your organization with data-driven insights that redefine what it means to be healthy in today’s world.

For more information, visit: https://lifexresearch.com/

Media Contact:

LifeX Research Corp.
Attn: Media Relations
Atlanta, GA
support@lifexresearch.com

20250712 213641736
LifeX Research is at The Forefront of Revolutionizing Health Insurance by Equipping Individuals and Employers With Cutting-Edge Insights Derived From Data Analysis 40

Ancient artifacts found at thrift store for $30 continue to puzzle experts

0

NEWYou can now listen to Fox News articles!

A bargain hunter recently spotted ancient artifacts, including rings and medallions, that were up for sale for a mere $30.

The customer noticed the treasures at a thrift store in Chilliwack, Canada, around 60 miles east of Vancouver. Simon Fraser University, a public university in British Columbia that ultimately received the finds, announced the donation in a Sept. 24 press release.

Employees at Thrifty Boutique, a store run by the Chilliwack Hospice Society, alerted the school after a customer with an archaeology background noticed the jewelry and its “potential archaeological significance.” 

RARE ANCIENT GOLD DISCOVERY MADE BY FLORIDA STUDENT AT ARCHAEOLOGICAL SITE

The set included 11 rings and two medallions. Pictures of the artifacts show they were intricately carved, and still with signs of patina.

Thirty Canadian dollars is equal to around $21.50 in U.S. dollars — making the set of 13 objects remarkably cheap.

Researchers say artifacts found at a thrift shop could trace back to ancient Europe. (SFU / Sam Smith)

The age of the objects, and the location in Europe where they originated, are still a mystery for now.

Sabrina Higgins, associate professor of global humanities and archaeology, said she believes the objects are most likely medieval.

RARE CHRISTIAN CROSS AMONG SPECTACULAR 1,000-YEAR-OLD VIKING TREASURES FOUND BY METAL DETECTORISTS

“I think they most likely originate from somewhere within the boundaries of what was once the Western Roman Empire,” Higgins said in a statement.

“The shapes, designs and construction make me think that these are medieval, as the Romans typically used slightly different materials and techniques.”

Hand holding artifact from thrift store

Experts are investigating whether rings and medallions donated to SFU were looted, forged or genuine. (SFU / Sam Smith)

SFU is currently designing a course around identifying the artifacts. Higgins called the donation “an amazing opportunity for students here at SFU.”

She predicted, “It will take at least a semester – if not longer – to piece together the origins of these artifacts.”

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

“We’re fortunate to have access to cutting-edge research technologies within our department to properly study these objects, so it promises to be a rewarding journey for students.”

The university is also exploring whether the objects were looted or forged. 

Layout of medallions, rings, showing signs of wear and patina

The jewelry’s intricate carvings and patina suggest authentic age, but SFU is testing for forgery. (SFU / Museum of Archaeology & Ethnology)

Even if the latter is true, SFU assistant professor Cara Grace Tremain said the objects still provide an “interesting learning experience.”

MORE FROM FOX NEWS LIFESTYLE

“What we’re doing is essentially being detectives. We’re trying to recover the story of these items,” Tremain observed.

“They could offer up new information that may change the way we think about that culture or history. In which case, we want to know that we’re basing our theories on something that is authentic.”

Archivist holding large ancient medallian

“What we’re doing is essentially being detectives. We’re trying to recover the story of these items,” said a professor.  (SFU / Sam Smith)

The finds are currently in the possession of SFU’s museum in Burnaby, British Columbia. 

In a statement, Chilliwack Hospice Society executive director Sue Knott called it a “privilege” to work with university officials.

CLICK HERE TO GET THE FOX NEWS APP

“This story is a beautiful reminder of how every donation carries meaningful history and unknown potential,” she said.

EXCLUSIVE: Sen. Lummis presses FBI over Jack Smith phone tracking

0

NEWYou can now listen to Fox News articles!

EXCLUSIVE: Sen. Cynthia Lummis, R-Wyo., is demanding information from the FBI on whether she has been subjected to additional surveillance, following revelations that former Special Counsel Jack Smith tracked her phone calls, calling the action “one of the most serious infringements on the separation of powers in American history.” 

Fox News Digital first reported Monday that Smith and his Arctic Frost” team investigating Jan. 6 allegedly monitored the phone calls of Lummis and fellow GOP Sens. Lindsey Graham of South Carolina, Marsha Blackburn of Tennessee, Ron Johnson of Wisconsin, Josh Hawley of Missouri, Bill Hagerty of Tennessee, Dan Sullivan of Alaska, Tommy Tuberville of Alabama and GOP Rep. Mike Kelly of Pennsylvania.

Fox News Digital exclusively obtained an FBI document stating the names of the lawmakers and that an FBI special agent on Smith’s team “conducted preliminary toll analysis” on the toll records associated with them.

JACK SMITH TRACKED PRIVATE COMMUNICATIONS, CALLS OF NEARLY A DOZEN GOP SENATORS DURING J6 PROBE, FBI SAYS

Sen. Cynthia Lummis, R-Wyo., is demanding information from the FBI on whether she has been further surveilled, following the revelations that former Special Counsel Jack Smith was tracking her phone calls. (Caroline Brehman/Pool/Sipa USA)

An FBI official told Fox News Digital that Smith and his team were able to view which phone numbers the senators called, along with the location each call originated and where it was received.

Lummis is now seeking more information on the matter, writing a letter to FBI Director Kash Patel thanking him, President Donald Trump and Attorney General Pam Bondi for their “transparency regarding the blatantly unconstitutional surveillance activities conducted on the U.S. Senate and House of Representatives by the Biden Administration during Operation Arctic Frost.”

“Your willingness to expose these abuses is crucial to getting the FBI and Department of Justice focused back on its core mission of delivering justice for all,” she wrote in the letter to Patel, obtained by Fox News Digital.

Lummis is now demanding all FBI and DOJ records that identify which members of the Biden administration “authorized or approved the surveillance of my phone records and communications.”

FBI FIRES AGENTS, DISMANTLES CORRUPTION SQUAD AFTER PROBE UNVEILS MONITORING OF GOP SENATORS, PATEL SAYS

Lummis is asking for the names of all DOJ officials, FBI officials, and any White House officials involved; the entire data file collected on her, including all phone records and any recordings or transcripts of her private communications; any legal statutes cited to justify the data collection; and any individuals with whom the information was shared.

She is also requesting documentation of “any other surveillance conducted by the FBI or DOJ from January 20, 2021, through January 20, 2025, on me related to my official duties as a United States senator.”

Jack Smith delivers remarks in August 2023.

Special Counsel Jack Smith tracked the private conversations of multiple Republican senators during the Jan. 6 investigation. (Drew Angerer/Getty Images)

“I believe that the surveillance of sitting United States Senators by the executive branch represents one of the most serious infringements on the separation of powers in American history,” she wrote. “It seriously impinges on both my civil rights and my constitutional duties as a legislator, especially since this surveillance was directly connected to core legislative activities protected by the Speech or Debate Clause of the United States Constitution.”

Lummis added that “the American people deserve to know the truth about how the Biden administration weaponized federal law enforcement against their elected representatives.”

“Those responsible will be held accountable,” she wrote. “Thank you for your prompt attention to these requests, and for restoring integrity to the FBI.”

“Arctic Frost” was opened inside the bureau on April 13, 2022. Smith was appointed as special counsel to take over the probe in November 2022. 

An FBI official told Fox News Digital that “Arctic Frost” is a “prohibited case,” and that the review required officials to go “above and beyond in order to deliver on this promise of transparency.” The discovery is part of a broader, ongoing review.

“The American people deserve the truth, and under my leadership, they will have it,” Patel told Fox News Digital. “We promised accountability for those who weaponized law enforcement, and we will deliver it.”

Kash Patel sworn in

Kash Patel is sworn in as FBI director by U.S. Attorney General Pam Bondi in the Indian Treaty Room in the Eisenhower Executive Office Building (EEOB) on the White House campus in Washington, D.C., on Feb. 21, 2025. (REUTERS/Leah Millis)

HAWLEY RIPS JACK SMITH’S ‘BIDEN’S STASI’ PROBE, CALLS ALLEGED SPYING ‘ABUSE OF POWER BEYOND WATERGATE’

Patel added: “Under our watch, the FBI will never again be turned against the American people.”

“It is a disgrace that I have to stand on Capitol Hill and reveal this — that the FBI was once weaponized to track the private communications of U.S. lawmakers for political purposes,” FBI Deputy Director Dan Bongino, who briefed senators on the matter, told Fox News Digital. “That era is over.”

Bongino added: “Under our leadership, the FBI will never again be used as a political weapon against the American people.”

Meanwhile, the FBI has terminated employees and disbanded the CR-15 squad. Patel announced the actions were taken in response to the revelation of the “baseless monitoring” of U.S. lawmakers.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

“We are cleaning up a diseased temple three decades in the making — identifying the rot, removing those who weaponized law enforcement for political purposes and those who do not meet the standards of this mission while restoring integrity to the FBI. I promised reform, and I intend to deliver it,” Patel said in a statement to Fox News Digital.

Patel also posted about it on X, saying, “Transparency is important, and accountability is critical. We promised both, and this is what promises kept looks like… We terminated employees, we abolished the weaponized CR-15 squad, and we initiated an ongoing investigation with more accountability measures ahead.”

How an Arizona woman helped North Korean workers infiltrate US companies

0


NEWYou can now listen to Fox News articles!

This isn’t a ripped-from-the-headlines new Netflix series. This really happened in a quiet neighborhood called Litchfield Park that’s about a 20-minute drive from Phoenix.

Christina Chapman, 50, looked like your average middle-aged suburban woman. But inside her humble home? A secret cyber ops center built to help North Korean IT workers buy equipment and tools for their military by infiltrating hundreds of U.S. companies. 

WOMAN LEARNS FATE AFTER DOJ GUILTY PLEA ADMITTING SHE HELPED NORTH KOREAN TECH WORKERS INFILTRATE US COMPANIES

Christina Chapman DOJ scene photo

Christina Chapman, 50, of Litchfield Park, Ariz., set up a massive cyber operation that helped North Korean actors infiltrate U.S. companies. (Department of Justice)

That picture above was just a small part of her setup.

North Korean workers aren’t browsing LinkedIn or applying at Google, Amazon and Meta. They can’t. Sanctions block them from working for American companies, at least legally. So what do they do? 

They steal real Americans’ identities, including names, birth dates, Social Security numbers and more. Then, they use them to pose as remote IT workers, slipping into U.S. companies under anyone’s radar.

But when companies send out laptops and phones to their “remote new hires”? Those devices can’t exactly be shipped to Pyongyang.

Enter Christina

Over the course of three years, Christina turned her suburban home into a covert operations hub for North Korea’s elite cybercriminals.

She received more than 100 laptops and smartphones shipped from companies all across the U.S. These weren’t no-name startups. We’re talking major American banks, top-tier tech firms and at least one U.S. government contractor. 

All thought they were hiring remote U.S.-based workers. They had no idea they were actually onboarding North Korean operatives.

Once the gear arrived, Chapman connected the devices to VPNs, remote desktop tools like AnyDesk and Chrome Remote Desktop, and even rigged up voice-changing software. 

The goal? To make it seem like the North Koreans were logging in from inside the United States. Chapman also shipped 49 laptops and other devices supplied by U.S. companies to locations overseas, including multiple shipments to a city in China on the border with North Korea.

NORTH KOREA LASHES OUT AFTER TRUMP DOJ EXPOSES MASSIVE IT INFILTRATION SCHEME

Christina Chapman DOJ scene photo

Chapman’s fake employees “showed up” from halfway around the world every day, siphoning American cash and technology directly into the Kim regime. (Department of Justice)

Follow the money

These fake employees “showed up” every day, submitting code, answering emails, taking meetings, all from halfway around the world. In reality, they were siphoning U.S. tech and cash straight into Kim Jong Un’s regime.

When HR teams requested video verification, Chapman didn’t blink. 

She jumped on camera herself, sometimes in costume, pretending to be the person in the résumé. She ran the whole operation like a talent agency for cybercriminals, staging fake job interviews, coaching the operatives on what to say and even laundering their salaries through U.S. banks.

Her take? At least $800,000, paid as “service fees.”

The total haul for North Korea? Over $17 million in stolen salaries, according to the FBI, which called the scheme a national security threat. Chapman called it “helping her friends.” Really.

KIM JONG UN’S YOUNG DAUGHTER BEING GROOMED TO LEAD REGIME AFTER MILITARY PARADE VISIT IN CHINA: EXPERT

North Korea flag next to barb wire

North Korea netted over $17 million in stolen salaries, courtesy Chapman’s scheme. (REUTERS/Edgar Su)

Eventually, the scam began to unravel. Investigators noticed odd patterns like dozens and dozens of remote hires all listing the same Arizona address, or company systems being accessed from countries the workers supposedly had never visited.

Chapman was arrested and sentenced in July 2025 to 102 months in federal prison.

And the wildest part? She did it all from her living room. Talk about working from home! 

CLICK HERE TO GET THE FOX NEWS APP

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

  • National radio:  Airing on 500+ stations across the US – Find yours or get the free podcast.
  • Daily newsletter: Join 650,000 people who read the Current (free!)
  • Watch: On Kim’s YouTube channel

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 



Source link

St. Fagans National Museum in Wales suffers robbery of Bronze Age gold jewelry

0

NEWYou can now listen to Fox News articles!

Thieves recently targeted a prominent cultural institution in Wales, stealing precious ancient jewelry from its gallery, officials said.

St. Fagans National Museum, one of the most visited museums in the Welsh capital of Cardiff, was broken into at around 12:30 a.m. on Oct. 6.

The open-air museum is on the grounds of St. Fagans Castle, a 16th-century manor house. It hosts a variety of exhibits displaying Welsh artifacts.

HOBBYISTS SEARCHING FOR ROCKETS ACCIDENTALLY UNEARTH ‘INCREDIBLE’ ANCIENT TREASURES BURIED DEEP UNDERGROUND

The heist targeted gold jewelry from the Bronze Age, according to the South Wales Police. 

Cadw, the Welsh heritage service, said the Bronze Age ended in Wales in 800 B.C., making the jewelry some 3,000 years old.

Police are investigating the Oct. 6 theft of several pieces of Bronze Age gold jewelry from St. Fagans National Museum in Cardiff. Above, one of the buildings on the grounds.  (Barry Batchelor – PA Images/PA Images via Getty Images)

The stolen lot included bracelets and crescent-shaped gold ornament known as a lunula, according to a report by The Guardian.  

In a statement, Detective Inspector Bob Chambers said the thieves took “several items.”

“At this time, we believe that two suspects forced entry to the main building, where several items, including Bronze Age gold jewelry, have been stolen from a display case,” Chambers said.

MUSEUM’S ANCIENT BRACELET THEFT JOINS LIST OF OTHER PRICELESS ARTIFACTS STOLEN AND DESTROYED WORLDWIDE

“An investigation is ongoing, and we urge anyone with information to contact us as soon as possible,” he added. “Any information, no matter how small, may be relevant to the investigation.”

“[S]everal items, including Bronze Age gold jewelry, have been stolen from a display case.”

A spokesperson for Museum Wales, the body that oversees St. Fagans National Museum, told Fox News Digital that two suspects, aged 43 and 50, were arrested in connection to the incident on Tuesday, but the search for the artifacts is still ongoing.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

The organization was unable to disclose the specific artifacts that were stolen given the investigation.

In a statement, Museum Wales said it was “saddened” by the theft, which it described as targeted.

Colorful rose gardens at St Fagans Castle

St. Fagans National Museum, one of Cardiff’s most visited cultural landmarks, remains at the center of the investigation. (iStock)

“We would like to thank South Wales Police for their cooperation in this investigation and their prompt response when they were alerted in the early hours,” the official added.

MORE FROM FOX NEWS LIFESTYLE

“We are also very grateful to the staff members who were on duty overnight, followed protocol and who were thankfully uninjured during the incident.”

Old Welsh church at St Fagans museum site

The theft on Oct. 6 struck at the heart of Wales’ national museum system, which safeguards important cultural treasures. (iStock)

The theft occurred just a month after a pharaoh’s 3,000-year-old bracelet was stolen from the Egyptian Museum in Cairo. 

CLICK HERE TO GET THE FOX NEWS APP

The artifact was taken by a museum employee and melted down. 

It was made of gold and strung with beads made of lapis lazuli, a blue stone prized in antiquity.