<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Latest Tech News | Fox News</title>
        <link>https://www.foxnews.com/tech</link>
        <description>Discover the latest breaking news feed with FOX News. Find out what the latest news is and read about the latest news happening today.</description>
        <copyright>Copyright 2026 FOX News Network</copyright>
        <language>en-us</language>
        <pubDate>Sun, 26 Apr 2026 17:07:04 -0400</pubDate>
        <image>
            <url>https://global.fncstatic.com/static/orion/styles/img/fox-news/logos/fox-news-desktop.png</url>
            <title>Latest Tech News | Fox News</title>
            <link>https://www.foxnews.com/tech</link>
        </image>
        <atom:link href="https://www.foxnews.com/rss.xml?category=tech" rel="self" type="application/rss+xml"/>
        <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns:atom="http://www.w3.org/2005/Atom"/>
        <item>
            <link>https://www.foxnews.com/tech/hospice-fraud-uses-stolen-identities-fake-patients</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/hospice-fraud-uses-stolen-identities-fake-patients</guid>
            <title>Hospice fraud uses stolen identities for fake patients</title>
            <description>Scammers enroll victims in Medicare and Medi-Cal to bill for care never provided</description>
            <content:encoded>&lt;p&gt;Earlier this month, the &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/us/us-regions/west/california"&gt;California&lt;/a&gt; Attorney General's office filed charges against 21 people tied to a $267 million Medi-Cal hospice fraud ring.&lt;/p&gt;&lt;p&gt;The case, dubbed Operation Skip Trace, accuses the defendants of buying &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/5-myths-about-identity-theft-put-your-data-risk"&gt;stolen personal information on the dark web&lt;/a&gt;, enrolling those identities in Medi-Cal through Covered California, and running 14 shell hospice companies that billed the state for end-of-life care that was never provided.&lt;/p&gt;&lt;p&gt;The patients were not dying. In many cases, they did not even live in California. They were names and Social Security numbers pulled from data breaches and turned into billing line items.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;em&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt; &lt;strong&gt;- &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my &lt;em&gt;Ultimate Scam Survival Guide&lt;/em&gt; free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/us/la-medicare-fraud-doctor-provider-number-billing-probe"&gt;&lt;strong&gt;DOCTOR DENIES KNOWING ABOUT RAMPANT LA-AREA MEDICARE FRAUD USING HIS PROVIDER NUMBER&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How hospice fraud scams actually work&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Scammers pay people to put hospice companies in their names, even though they do not run them. This hides the real operators and gives the group a licensed business it can use to submit bills. Behind the scenes, others buy stolen personal information from &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/tech/topics/cybercrime"&gt;dark web marketplaces&lt;/a&gt;. This includes names, dates of birth, Social Security numbers and addresses.&lt;/p&gt;&lt;p&gt;They then use that information to enroll people in Medi-Cal through Covered California and list them as terminally ill hospice patients. Next, the companies submit claims for visits, prescriptions and daily care tied to those names. They never provide any services. Because hospice care pays a flat daily rate, the billing continues as long as the identity stays active.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why Los Angeles is the epicenter of hospice fraud&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Operation Skip Trace is the latest in a string of hospice fraud cases that federal and state officials have been tracking for years. The typical hospice in &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/us/los-angeles"&gt;Los Angeles County&lt;/a&gt; bills Medicare roughly $29,000 per patient, more than double the national average. Of the roughly 1,800 hospices operating in LA County, more than 700 have triggered multiple fraud red flags, according to state auditors.&lt;/p&gt;&lt;p&gt;On March 23, 2026, the U.S. House Committee on Oversight and Government Reform sent a letter to California Governor &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/person/gavin-newsom"&gt;Gavin Newsom&lt;/a&gt; requesting documents on the state's oversight of federally funded hospice programs. Committee members cited a "well-documented history of fraud," including agencies enrolling beneficiaries without their knowledge and overbilling Medicare.&lt;/p&gt;&lt;p&gt;The Centers for Medicare &amp; Medicaid Services estimates that Los Angeles County alone accounts for roughly $3.5 billion in hospice fraud. Newsom's office said California has revoked more than 280 hospice licenses, maintained a moratorium on new providers and has hundreds more operators under investigation.&lt;/p&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/google-search-led-costly-scam-call"&gt;&lt;strong&gt;GOOGLE SEARCH LED TO A COSTLY SCAM CALL&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What hospice fraud means for your identity and coverage&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Most &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/tech/topics/privacy"&gt;identity theft&lt;/a&gt; stories focus on credit cards, tax returns or new loans. Those usually show up on your credit report. Hospice fraud works differently. Scammers can use your information inside a Medicare or Medi-Cal billing system without triggering a credit alert or hard inquiry. That means it can go unnoticed.&lt;/p&gt;&lt;p&gt;Watch for warning signs like Medicare Summary Notices listing services you never received, Medi-Cal enrollment letters in your name or explanation-of-benefits statements from providers you have never visited.&lt;/p&gt;&lt;p&gt;If you apply for coverage later, you could face a denial because records show you are already enrolled in another state. If your &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/hospital-cyberattacks-threaten-patient-safety"&gt;data was exposed in a breach&lt;/a&gt;, it may already be circulating on the dark web.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How to spot hospice fraud and report identity theft&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The Centers for Medicare &amp; Medicaid Services recommends reviewing your Medicare Summary Notice each quarter through MyMedicare.gov. If you are enrolled in Medi-Cal, check your Covered California account for unexpected activity and report anything suspicious to the California Department of Health Care Services through its Stop Medi-Cal Fraud line.&lt;/p&gt;&lt;p&gt;Suspected Medicare fraud can be reported to 1-800-MEDICARE or directly to the HHS Office of Inspector General at oig.hhs.gov/fraud. The Senior Medicare Patrol offers free help reviewing statements and filing reports in every state. If you notice unfamiliar charges or enrollment activity, place a fraud alert with Equifax, Experian and TransUnion. Medical identity theft often overlaps with other types of fraud.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How identity theft monitoring helps catch hospice fraud&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Hospice fraud schemes like Operation Skip Trace often begin long before billing ever happens. The personal data used is typically traded on dark web marketplaces after large data breaches. Services like Aura monitor these marketplaces and data broker listings for exposed personal information, including Social Security numbers, driver's licenses, and email addresses. They also track public record changes, such as address updates that may signal fraudulent enrollment, and monitor credit files across &lt;span suggestionid="5b6f8698-0d81-4038-9800-486d923a473a" highlighted="false" suggestiontype="_STYLE" isinsertion="false" class="_suggestionUnderline_ry3km_1229 _editorialSuggestion_ry3km_1238" data-suggestion-id="5b6f8698-0d81-4038-9800-486d923a473a" data-is-insertion="false" data-suggestion-type="_STYLE" data-highlighted="false" contenteditable="false"&gt;Equifax, Experian, and TransUnion&lt;/span&gt;.&lt;/p&gt;&lt;p&gt;If suspicious activity is detected, users receive support from fraud resolution specialists who help contact agencies, prepare documentation, and dispute unauthorized accounts. Plans may also include identity theft insurance for eligible recovery costs.&lt;/p&gt;&lt;p&gt;No service can prevent every misuse of a stolen identity. But when fraud happens inside systems you rarely check, like Medicare or Medi-Cal, early alerts can make a critical difference.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How credit monitoring helps detect identity theft early&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Credit monitoring services track activity across the major credit bureaus and alert you when something changes. That gives you a chance to act quickly by freezing your credit, disputing unfamiliar accounts or contacting the lender.&lt;/p&gt;&lt;p&gt;Many services monitor your credit across Equifax, Experian and TransUnion and send alerts soon after activity is reported, so you are not waiting for a daily update to spot a problem.&lt;/p&gt;&lt;p&gt;Some tools also let you lock your credit file with a single tap, which can help stop new applications before they are approved.&lt;/p&gt;&lt;p&gt;Beyond credit reports, certain services monitor other personal data that may be exposed in breaches or sold online. That can include email addresses, phone numbers, driver's license details and even medical IDs, all of which can be used in identity theft schemes.&lt;/p&gt;&lt;p&gt;While no service can prevent every type of fraud, having real-time alerts and broader monitoring can help you catch suspicious activity earlier and limit the damage.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;See my tips and best picks on Best Identity Theft Protection at &lt;/strong&gt;CyberGuy.com&lt;/p&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener" href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This case shows how identity theft is evolving. It is no longer just about draining bank accounts or opening credit cards. Scammers are now turning people into invisible patients inside systems most of us never check. That shift makes this fraud harder to detect and slower to stop. The best defense is to know where your information can appear and to check systems you would not normally review.&lt;/p&gt;&lt;p&gt;If someone could use your identity for months without you knowing, would you ever catch it before the damage is done?  Let us know by writing to us at &lt;strong&gt;&lt;em&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;em&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt; &lt;strong&gt;- &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my &lt;em&gt;Ultimate Scam Survival Guide&lt;/em&gt; free when you join.  &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/10/931/523/3-hackers-leak-childrens-data-in-major-nursery-breach-outro.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">58ef77f6-e306-591f-8921-83f7f004d8ed</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/health/health-care</category>
            <category domain="foxnews.com/taxonomy">fox-news/person/gavin-newsom</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/politics/minnesota-fraud-exposed</category>
            <category domain="foxnews.com/taxonomy">fox-news/us/us-regions/west/california</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Sun, 26 Apr 2026 12:02:55 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/could-get-paid-googles-android-data-lawsuit</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/could-get-paid-googles-android-data-lawsuit</guid>
            <title>You could get paid from Google’s Android data lawsuit</title>
            <description>A $135M settlement claims Android used your data in the background: Here’s what it means and who may qualify</description>
            <content:encoded>&lt;p&gt;If you use an Android phone, there is a good chance this case affects you. &lt;a href="https://www.foxnews.com/category/tech/companies/google" target="_blank" rel="noopener"&gt;Google has agreed&lt;/a&gt; to a $135 million settlement over claims that its &lt;a href="https://www.foxnews.com/category/tech/technologies/android" target="_blank" rel="noopener"&gt;Android system&lt;/a&gt; used people's cellular data without permission. The part that caught our attention is when it allegedly happened.&lt;/p&gt;&lt;p&gt;According to the lawsuit, these data transfers could take place in the background, even when your phone was not in use. Most people assume that if their screen is off, nothing is happening. That isn't always the case.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; &lt;strong&gt;- &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/hackers-abuse-google-cloud-send-trusted-phishing-emails" target="_blank" rel="noopener"&gt;&lt;strong&gt;HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt; &lt;/h2&gt;&lt;h2&gt;&lt;strong&gt;What the lawsuit says your Android phone was doing&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;At the center of this case is how Android handled background activity. The lawsuit claims Android devices were sending information back to Google servers without clear &lt;a href="https://www.foxnews.com/category/tech/topics/privacy" target="_blank" rel="noopener"&gt;user consent&lt;/a&gt;. This reportedly happened over &lt;a href="https://www.foxnews.com/category/tech/technologies/cellular" target="_blank" rel="noopener"&gt;cellular networks,&lt;/a&gt; which means it may have used data you were paying for.&lt;/p&gt;&lt;p&gt;That detail matters. If something runs over Wi Fi, most people do not think twice about it. Cellular data is different. It is limited for many users and often tied to monthly costs.&lt;/p&gt;&lt;p&gt;The plaintiffs argue that Google could have restricted these transfers to Wi Fi. Instead, they say the system used cellular connections, which shifted the cost to users. Google has denied wrongdoing but agreed to settle the case.&lt;/p&gt;&lt;p&gt;"We are pleased to resolve this case, which mischaracterized standard industry practices that keep Android safe. We're providing additional disclosures to give people more information about how our services work," José Castañeda, a Google spokesperson, told CyberGuy.&lt;/p&gt;&lt;h2&gt; &lt;/h2&gt;&lt;h2&gt;&lt;strong&gt;Who may be included in the settlement?&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This case covers a huge number of people. If you used an Android device on a cellular network at any point after November 12, 2017, there is a good chance you are part of the group. The only major exception is if you are already included in a similar case called Csupo v. Google LLC. Estimates suggest around 100 million users could qualify. That makes this one of the larger consumer tech settlements tied to everyday phone use.&lt;/p&gt;&lt;h2&gt; &lt;/h2&gt;&lt;h2&gt;&lt;strong&gt;How much you might actually receive&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Before you start planning how to spend it, this is likely to be a modest payment. The settlement fund is $135 million. When that is divided across millions of people, the amount per person will depend on how many claims are filed. In most cases like this, payments tend to be small. Think of it as getting reimbursed for something you did not realize was costing you.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/allstate-sued-secretly-tracking-selling-45-million-americans-location-data" target="_blank" rel="noopener"&gt;&lt;strong&gt;ALLSTATE SUED FOR ALLEGEDLY TRACKING AND SELLING 45M AMERICANS' LOCATION DATA&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt; &lt;/h2&gt;&lt;h2&gt;&lt;strong&gt;How to claim your payment&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The process is already underway, but it is simpler than most people expect. In many cases, you do not need to file a full claim form to be included. If you qualify, you are already part of the settlement unless you choose to opt out.&lt;/p&gt;&lt;p&gt;That said, there are a few steps worth taking to make sure you actually get paid.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Start by checking your email or physical mail for a notice about the settlement.&lt;/strong&gt; Some users are receiving a class member ID or notice code, which makes the process faster.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Next, &lt;/strong&gt;&lt;a href="https://www.foxnews.com/tech/dont-fall-fake-settlement-sites-steal-your-data" target="_blank" rel="noopener"&gt;visit the official settlement website&lt;/a&gt;&lt;strong&gt; at &lt;/strong&gt;&lt;strong&gt;federalcellularclassaction.com&lt;/strong&gt;&lt;strong&gt; and confirm your eligibility.&lt;/strong&gt; This is also where you can enter or update your payment details. You will typically be able to choose how you want to receive your money, including options like direct deposit or popular payment apps.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;If you do nothing, you may still receive a payment automatically, but there is a higher chance of delays or missed payments if your information is outdated.&lt;/strong&gt; You only need to take extra steps if you did not receive a notice, your contact details have changed, or you want to opt out or object to the settlement.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt; &lt;/h2&gt;&lt;h2&gt;&lt;strong&gt;The timeline you need to know&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;There are a couple of important dates to keep in mind. The deadline to opt out or object to the settlement is May 29, 2026. The final approval hearing is scheduled for June 23, 2026. If the court approves the deal, payments will follow after that process wraps up.&lt;/p&gt;&lt;h2&gt; &lt;/h2&gt;&lt;h2&gt;&lt;strong&gt;Why this situation matters beyond the settlement&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This case taps into something bigger than one payout. Smartphones are designed to stay connected at all times. That includes background activity that most people never see. While that constant connection powers useful features, it also creates gray areas around consent and cost.&lt;/p&gt;&lt;p&gt;Situations like this raise a simple question. How much do you really know about what your phone is doing behind the scenes? It also puts pressure on companies to be clearer about how data is used and when it is being transmitted.&lt;/p&gt;&lt;p&gt;We reached out to Google for comment, but did not hear back before our deadline. &lt;/p&gt;&lt;h2&gt; &lt;/h2&gt;&lt;h2&gt;&lt;strong&gt;What the Android data lawsuit means for you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Even if the payout ends up being small, the takeaway here matters more than the money. Your phone may be using data in ways you do not notice. That includes apps you rarely open and system services running in the background. Taking a few minutes to check your settings can give you more control.&lt;/p&gt;&lt;h3&gt; &lt;/h3&gt;&lt;h3&gt;&lt;strong&gt;Check which apps are using background data&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;&lt;i&gt;(Settings may vary depending on device manufacturer)&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Samsung/Android: Go to &lt;strong&gt;Settings&lt;/strong&gt; &gt; &lt;strong&gt;Connections&lt;/strong&gt; &gt; &lt;strong&gt;Data usage&lt;/strong&gt; &gt; &lt;strong&gt;Mobile data usage &lt;/strong&gt;&gt;  then tap &lt;strong&gt;an app&lt;/strong&gt; to see its data use and background activity.&lt;/p&gt;&lt;h3&gt; &lt;/h3&gt;&lt;h3&gt;&lt;strong&gt;Limit background data for specific apps&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;(Settings may vary depending on device manufacturer)&lt;/p&gt;&lt;p&gt;Samsung/Android: Go to &lt;strong&gt;Settings &gt; Connections &gt; Data usage &gt; Mobile data usage &gt; &lt;/strong&gt;tap an &lt;strong&gt;app&lt;/strong&gt; &gt; toggle &lt;strong&gt;Allow background data usage&lt;/strong&gt; off&lt;/p&gt;&lt;p&gt;This stops the app from using cellular data when you are not actively using it.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Reduce data use for updates and backups&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;(Settings may vary depending on device manufacturer)&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Go to &lt;strong&gt;Settings &gt; Software update &gt; Auto download &gt; Using Wi-Fi only&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;For apps, open the &lt;strong&gt;Google Play Store&lt;/strong&gt; &gt; tap your &lt;strong&gt;profile&lt;/strong&gt; &gt; &lt;strong&gt;Settings &gt; Network preferences &gt; App download preference&lt;/strong&gt; &gt; choose &lt;strong&gt;Over Wi-Fi only &gt; OK&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;These small changes can help you avoid using cellular data without realizing it and give you more visibility into what your phone is doing behind the scenes.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my quiz here: CyberGuy.com&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt; &lt;/h2&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This case is a reminder that the devices we rely on every day are doing more than we see. Most of the time, that works in your favor. Sometimes, it raises questions about transparency and control. Google chose to settle without admitting fault. That leaves room for debate about what really happened. It also highlights how quickly technology can outpace what users expect or understand. As phones become even more connected, these kinds of cases will likely keep coming.&lt;/p&gt;&lt;p&gt;Should companies like Google be allowed to use your cellular data in the background without clear permission, even if it powers features you rely on every day? Let us know your thoughts by writing to us at CyberGuy.com&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; &lt;strong&gt;- &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/tech-giants-anti-scam-accord-2.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">c87ac3c9-8a69-5504-a980-2536dafc9315</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/smartphones</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/android</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/google</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/cellular</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Sun, 26 Apr 2026 11:13:31 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/scammers-build-profile-using-data-brokers</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/scammers-build-profile-using-data-brokers</guid>
            <title>How scammers build a profile on you using data brokers</title>
            <description>Public data is fueling highly targeted scams against your family</description>
            <content:encoded>&lt;p&gt;Go to any &lt;a href="https://www.foxnews.com/tech/one-thing-scammers-check-targeting-online" target="_blank" rel="noopener"&gt;people finder site&lt;/a&gt; right now and type in your name. What comes back might shock you: your age, home address, phone number, the names of your relatives, where you used to live and even what your property is worth.&lt;/p&gt;&lt;p&gt;You didn't put that there, and you never consented to it. Still, it's out there, and anyone with an internet connection can see it.&lt;/p&gt;&lt;p&gt;Scammers figured this out a long time ago. Since then, they've &lt;a href="https://www.foxnews.com/tech/inside-scammers-day-how-target-you" target="_blank" rel="noopener"&gt;turned it into a system&lt;/a&gt; for targeting you, your parents and your kids.&lt;/p&gt;&lt;p&gt;So how does it actually work, and more importantly, what can you do to stop it?&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com,&lt;/u&gt;&lt;/strong&gt;&lt;strong&gt; &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/how-remove-your-personal-info-from-people-search-sites" target="_blank" rel="noopener"&gt;&lt;strong&gt;HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE SEARCH SITES&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How scammers find your personal data online&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Before a criminal sends a phishing email or makes a call, they do their homework. Importantly, they don't need to hack anything. Instead, they use the same public websites that anyone can access.&lt;/p&gt;&lt;p&gt;In less than 10 minutes, a scammer can build a detailed profile on you using data broker sites like Spokeo, Whitepages, BeenVerified and Intelius. Here's what that profile looks like and how they build it step by step.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Step 1: How scammers search your name on people finder sites&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;It starts simply. A scammer types your name into a search site. Within seconds, they see results like:&lt;/p&gt;&lt;p&gt;John M. Patterson | Age: 61 | Cleveland, OH&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Also known as: John Michael Patterson&lt;/li&gt;&lt;li&gt;Current address: [your street address]&lt;/li&gt;&lt;li&gt;Previous addresses: 4 records found&lt;/li&gt;&lt;li&gt;Phone numbers: 2 found&lt;/li&gt;&lt;li&gt;Email addresses: 3 found&lt;/li&gt;&lt;li&gt;Relatives: 5 found&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;That is the starting point. Many sites show partial data for free. That is often enough to confirm identity. Full reports cost only a few dollars, so access is easy. Scammers can repeat this process hundreds of times a day, building detailed profiles with very little effort.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Step 2: How scammers map your family and relatives&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Next, this is where things get personal. Data broker profiles show more than your name. They reveal your family network.&lt;/p&gt;&lt;p&gt;That often includes:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Spouse or partner&lt;/li&gt;&lt;li&gt;Children&lt;/li&gt;&lt;li&gt;Parents&lt;/li&gt;&lt;li&gt;Siblings&lt;/li&gt;&lt;li&gt;Roommates&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;As a result, scammers can target more than one person. For example, they may learn that your elderly parent lives alone or your child just moved. Because of that, scams like the &lt;a href="https://www.foxnews.com/tech/top-12-elderly-fraud-scams-2024" target="_blank" rel="noopener"&gt;&lt;u&gt;grandparent scam &lt;/u&gt;&lt;/a&gt;feel real instead of random.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Step 3: How scammers use your address history&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;At this point, your address history becomes critical. It is not just about where you live. Instead, scammers use it to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Verify identity&lt;/li&gt;&lt;li&gt;Find relatives&lt;/li&gt;&lt;li&gt;Build trust&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;For example, referencing a past address makes a caller sound legitimate. That detail alone can lower suspicion.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Step 4: How scammers use your financial data&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;More importantly, data brokers also reveal financial clues. These may include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Estimated income&lt;/li&gt;&lt;li&gt;Home value&lt;/li&gt;&lt;li&gt;Ownership status&lt;/li&gt;&lt;li&gt;Length of residence&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This information comes from public records, not hacking. Because of this, scammers tailor their approach. Higher-income targets may see&lt;a href="https://www.foxnews.com/tech/how-scammers-exploit-your-data-pre-approved-retirement-scams" target="_blank" rel="noopener"&gt;&lt;u&gt; investment scams&lt;/u&gt;&lt;/a&gt;. &lt;/p&gt;&lt;p&gt;Others may get job or&lt;a href="https://www.foxnews.com/tech/rental-scams-avoid-being-victim" target="_blank" rel="noopener"&gt;&lt;u&gt; rental scams &lt;/u&gt;&lt;/a&gt;instead.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/google-search-led-costly-scam-call" target="_blank" rel="noopener"&gt;&lt;strong&gt;GOOGLE SEARCH LED TO A COSTLY SCAM CALL&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Step 5: How scammers verify and cross-check your data&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Before launching a scam, criminals often double-check everything. They don't rely on just one site. Instead, they compare multiple data broker profiles, social media accounts and public records to confirm details are accurate.&lt;/p&gt;&lt;p&gt;For example, they may:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Match your address across different sites&lt;/li&gt;&lt;li&gt;Check &lt;a href="https://www.foxnews.com/category/tech/companies/facebook" target="_blank" rel="noopener"&gt;Facebook&lt;/a&gt; or LinkedIn to confirm family relationships&lt;/li&gt;&lt;li&gt;Look for recent moves, job changes or life events&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Because of this, the profile becomes more reliable. That extra step is what turns a guess into something that feels real.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Step 6: How scammers create targeted scams&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;At that point, they have everything they need. They know your name, family, address and financial details. Now the scam becomes highly specific.&lt;/p&gt;&lt;p&gt;By the time you hear from them, they already know enough to sound like someone you trust.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;They may call your parent pretending to be you&lt;/li&gt;&lt;li&gt;They may bypass bank security questions&lt;/li&gt;&lt;li&gt;They may send texts that look like your child&lt;/li&gt;&lt;li&gt;They may send emails that reference your life&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;As a result, the scam feels believable.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Data broker scams are already being prosecuted&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This has already landed in court. The U.S. Department of Justice has prosecuted companies like Epsilon, Macromark Inc. and KBM Group for &lt;a href="https://www.foxnews.com/tech/stop-data-brokers-from-selling-your-information-online" target="_blank" rel="noopener"&gt;selling data to scammers&lt;/a&gt;. Epsilon alone paid $150 million to victims.&lt;/p&gt;&lt;p&gt;At the same time, data tied to the FBI Internet Crime Complaint Center shows more than half of &lt;a href="https://www.foxnews.com/tech/spring-clean-your-digital-footprint-why-retirees-scam-targets" target="_blank" rel="noopener"&gt;fraud cases involving older Americans&lt;/a&gt; were linked to exposed personal data. That shows how serious this problem has become.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why is your personal data on data broker sites&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;You do not need to sign up for these sites. Instead, your data comes from many sources, including:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Voter records&lt;/li&gt;&lt;li&gt;Property records&lt;/li&gt;&lt;li&gt;Court filings&lt;/li&gt;&lt;li&gt;Social media&lt;/li&gt;&lt;li&gt;Marketing surveys&lt;/li&gt;&lt;li&gt;Loyalty programs&lt;/li&gt;&lt;li&gt;Phone directories&lt;/li&gt;&lt;li&gt;Other data brokers&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Because of this, your information spreads quickly.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why your data keeps reappearing online&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Even after removal, your data often comes back. Data brokers constantly update their databases. They buy and resell fresh records. Because of that, one-time removal is not enough.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How to disrupt a scammer's research before they reach your family&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The goal isn't to disappear completely. It's to make the profile messy enough, incomplete enough and hard enough to find that scammers move on to easier targets.&lt;/p&gt;&lt;p&gt;Here's what you can do:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Search for yourself first.&lt;/strong&gt; Go to Spokeo, Whitepages, BeenVerified or any other people search site, and look up your own name. See exactly what's there before a scammer does. That snapshot is your starting point.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Submit opt-out requests manually.&lt;/strong&gt; Every major data broker is required to honor removal requests. The catch: There are hundreds of them, each with its own process, and they relist your information regularly. It's a full-time job.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Use an automated removal service.&lt;/strong&gt; This is where I strongly recommend a data removal service. Instead of spending hours submitting individual opt-out forms, a data removal service sends removal requests to 420-plus data brokers on your behalf and keeps sending them when your data reappears. Because it will reappear.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Set up family alerts.&lt;/strong&gt; Tell your elderly relatives that you will never ask for money via text from an unknown number. Establish a code word. Scams work because they create panic. A simple family protocol breaks the spell.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Change your security questions.&lt;/strong&gt; If your bank still uses "mother's maiden name" or "city you were born in" as verification, that information is likely already on a data broker site. Switch to nonsense answers that only you know and store them in a password manager.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Get a free scan to find out if your personal information is already out on the web: &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;Cyberguy.com&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This kind of scam works because it feels personal. When someone knows your name, your family and even where you used to live, your guard drops. That is exactly what criminals are counting on. &lt;/p&gt;&lt;p&gt;The uncomfortable truth is that your information is already out there, often in more places than you realize. You do not need to panic, but you do need to be proactive. The more you limit what is easily accessible, the harder it becomes for someone to build a convincing story around you. Start with a simple search of your own name. That one step can completely change how you think about &lt;a href="https://www.foxnews.com/tech/9-online-privacy-risks-you-probably-dont-know-about" target="_blank" rel="noopener"&gt;your digital footprint&lt;/a&gt;. From there, take action to remove what you can and protect what you cannot.&lt;/p&gt;&lt;p&gt;If a stranger can build a detailed profile on your family in minutes, what does that say about how much of your life is already exposed online? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; &lt;strong&gt;- &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/02/931/523/person-typing-on-computer.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">047866a0-6ea3-5885-bd2d-0aa72ac0c7c7</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/facebook</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fbi</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Sat, 25 Apr 2026 15:29:05 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/anthropics-mythos-ai-found-2000-unknown-software-vulnerabilities-seven-weeks-testing</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/anthropics-mythos-ai-found-2000-unknown-software-vulnerabilities-seven-weeks-testing</guid>
            <title>Anthropic's Mythos AI found over 2,000 unknown software vulnerabilities in just seven weeks of testing</title>
            <description>The AI model, too dangerous to release publicly, is changing digital security faster than anyone is ready for</description>
            <content:encoded>&lt;p&gt;There is a new AI model called Mythos. Anthropic built it for defensive cybersecurity research. It is so effective at finding &lt;a href="https://www.foxnews.com/category/tech/topics/software" target="_blank" rel="noopener"&gt;software vulnerabilities&lt;/a&gt; that Anthropic decided the general public cannot have it.  &lt;/p&gt;&lt;p&gt;Instead, it is letting a small circle of trusted partners like Microsoft and Google experiment with it first under controlled conditions, while researchers figure out what guardrails need to exist.&lt;/p&gt;&lt;p&gt;That decision alone should tell you something. When the company that built a tool decides the world is not ready for it, you pay attention. And when you understand what Mythos actually did during testing, that caution starts to make complete sense.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/windows-pcs-risk-new-tool-disarms-built-in-security" target="_blank" rel="noopener"&gt;&lt;strong&gt;WINDOWS PCS AT RISK AS NEW TOOL DISARMS BUILT-IN SECURITY&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; —&lt;strong&gt; &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;&lt;strong&gt;How Anthropic's Mythos AI found 2,000 vulnerabilities in seven weeks&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Seven weeks. One AI model. One team. More than 2,000 previously unknown software vulnerabilities were found. If you need a moment with that, take it. John Ackerly, CEO and co-founder of Virtru, a data security company, put that figure into perspective in a way that is hard to shake.&lt;/p&gt;&lt;p&gt;"Mythos is absolutely a turning point for cybersecurity. Think about it. Mythos didn't pick a lock; it found thousands of locks that were never locked in the first place (that no one even knew existed) in software that the best human security researchers had studied for decades.&lt;/p&gt;&lt;p&gt;The math is staggering. One AI model, and one team, in seven weeks, found more than 2,000 zero-day vulnerabilities. That is 30% of the world's entire annual output prior to AI. When thousands of researchers get access to AI models like Mythos, a single year will surface exponentially more zero-days than the 360,000 recorded in all of software history.&lt;/p&gt;&lt;p&gt;Mythos and other AI models like it can now find and exploit software flaws at a speed and scale that is beyond containment. This means that the old approach of building stronger walls around systems and hoping they hold is becoming much less reliable. It also means that the manual "find a vulnerability, patch the vulnerability" process is not going to keep pace with a threat landscape bolstered by the speed and scale of AI.&lt;/p&gt;&lt;p&gt;The threat surface is now expanding faster than any wall can contain it. The only answer to this new dynamic is to protect the data itself, rather than prop up perimeter protection around it.&lt;/p&gt;&lt;p&gt;Thirty percent of the world’s annual output in seven weeks changes the game entirely.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What makes Mythos AI different from other AI security tools&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Cybersecurity teams have used AI tools for years. So, what makes this different?&lt;/p&gt;&lt;p&gt;Ackerly explains it this way: "What makes this different is the &lt;a href="https://www.foxnews.com/tech/first-autonomous-ai-agent-here-worth-risks" target="_blank" rel="noopener"&gt;level of autonomy and speed&lt;/a&gt; it enables. Mythos is being described as a system that can discover vulnerabilities and even generate working exploits much faster than traditional human-led workflows. This model could make it easy for a bad actor to identify and exploit vulnerabilities in software, even if that bad actor isn't knowledgeable or trained."&lt;/p&gt;&lt;p&gt;That last part matters most. Before a tool like this, exploiting a serious software vulnerability required real technical skill. Mythos AI lowers that barrier significantly. A person with bad intentions and no technical background could potentially use a model like this to cause serious damage. The expertise gap that once offered some natural protection is closing.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/fake-paypal-email-let-hackers-access-computer-bank-account" target="_blank" rel="noopener"&gt;&lt;strong&gt;FAKE PAYPAL EMAIL LET HACKERS ACCESS COMPUTER AND BANK ACCOUNT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why Anthropic's Mythos AI is breaking down perimeter security&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Most cybersecurity spending, the overwhelming majority of it, goes toward what experts call perimeter defense. Think firewalls, network monitoring, endpoint security and intrusion detection. The entire strategy is built on one core idea of keeping the bad actors out, and the data inside stays safe.&lt;/p&gt;&lt;p&gt;Ackerly describes how that model is now breaking down.&lt;/p&gt;&lt;p&gt;"The perimeter is the digital wall around your systems and the information you possess. For decades, cyber strategies have primarily focused on the idea that if you protected the perimeter well enough — if you built a strong enough wall — the sensitive data on the inside would stay safe," Ackerly said. &lt;/p&gt;&lt;p&gt;"The industry has poured hundreds of billions of dollars into firewalls, endpoint detection, &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;network security&lt;/a&gt;, application security and other perimeter defenses. Traditional security architecture by itself cannot keep pace in this new world.&lt;/p&gt;&lt;p&gt;"The Mythos development from Anthropic is making a hard truth very apparent: Time is running out for companies to prepare for this new reality. Shifting focus from 'protecting the perimeter' to ‘protecting the data’ is critically important to mitigate data loss or compromise."&lt;/p&gt;&lt;p&gt;Hundreds of billions of dollars. And now the model those dollars were built on is becoming unreliable. It forces a full rethink.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Does Anthropic's Mythos AI give attackers the advantage?&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This is the question everyone wants a straight answer to. Ackerly offers one that is more nuanced than a simple yes or no.&lt;/p&gt;&lt;p&gt;"I wouldn't frame it as attackers automatically having an advantage. But, over time, it does mean that 'bad guys' and 'good guys' will have access to essentially the same tools. As a result, I do think defenders absolutely need a different strategy. If you assume the outer wall may fail, then the smarter move is to protect the data itself so it stays controlled even after a breach."&lt;/p&gt;&lt;p&gt;The playing field is leveling. And that may sound fair until you remember attackers only need to succeed once, while defenders have to succeed every time.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How fast is Mythos AI changing the cybersecurity threat landscape?&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Speed is what makes Mythos AI genuinely alarming. Traditional cyberattacks move through a lifecycle. Reconnaissance takes time. Finding the right vulnerability takes more time. Building an exploit takes more time on top of that.&lt;/p&gt;&lt;p&gt;Ackerly explains what happens when AI compresses all of that.&lt;/p&gt;&lt;p&gt;"&lt;a href="https://www.foxnews.com/tech/ai-now-powering-cyberattacks-microsoft-warns" target="_blank" rel="noopener"&gt;AI is accelerating the threat&lt;/a&gt;. A model that can find and exploit vulnerabilities autonomously compresses the attack lifecycle from weeks to hours, or even minutes. Every layer of the traditional security stack now has to operate at machine speed. Manual security architectures cannot keep up.&lt;/p&gt;&lt;p&gt;"But AI also makes data-centric security more powerful, not less so. When every piece of sensitive data is protected at the object-level, AI agents can enforce governance at scale by checking entitlements, applying attribute-based access controls, and auditing data flows in real time. The same capabilities that make Mythos a dangerous tool in the hands of 'bad guys' make it a valuable tool in the hands of ‘good guys.’"&lt;/p&gt;&lt;p&gt;The question organizations should be asking shifts from "how do I build higher walls?" to "when the walls fail, is my data still protected?" That is the question worth sitting with.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What Mythos AI means for regular people's personal data&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Most of the Mythos coverage has focused on corporate risk. But your bank account and medical records sit in those same vulnerable systems.&lt;/p&gt;&lt;p&gt;"For everyday people, the first change is that breaches and scams could become more frequent, &lt;a href="https://www.foxnews.com/tech/ai-cybersecurity-risks-deepfake-scams-rise" target="_blank" rel="noopener"&gt;more targeted, and harder to&lt;/a&gt; spot. If AI makes it easier to uncover weak points in the systems we all rely on, that can translate into more pressure on the services that hold our personal data, from email and cloud storage to health, banking, and retail platforms.&lt;/p&gt;&lt;p&gt;Consumers shouldn't assume a company is doing the right thing with their data. Now, they really can't assume a company's outer defenses are enough to protect their information.&lt;/p&gt;&lt;p&gt;This also highlights the importance of basic cyber hygiene like &lt;a href="https://www.foxnews.com/tech/10-simple-cybersecurity-resolutions-safer-2026" target="_blank" rel="noopener"&gt;unique passwords and MFA&lt;/a&gt;, so that when breaches happen, the scope of impact on your own personal data is contained."&lt;/p&gt;&lt;p&gt;Your bank account, your medical records, your tax documents, your private messages. All of it already lives across dozens of platforms you trust to protect it. If those platforms' outer defenses are no longer reliable, what exactly is standing between your data and someone who wants it?&lt;/p&gt;&lt;p&gt;Ackerly goes further on where the exposure actually lives. "Data now travels across clouds, devices, partners, and borders. The risk isn't just one hacked server in one building anymore. It's all the places your data passes through or gets copied to along the way. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Was Anthropic right to keep Mythos AI restricted?&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Anthropic made a choice that is rare in the AI industry. They built something powerful and then decided not to release it widely.&lt;/p&gt;&lt;p&gt;On that decision, Ackerly is direct. "Anthropic's decision to withhold Mythos from general release is unprecedented and, frankly, responsible. Time will tell what these partners are able to do with regard to safety, but releasing it to the general public would certainly have been ill-advised and dangerous."&lt;/p&gt;&lt;p&gt;Unprecedented. That word deserves weight here. In an industry that races to release new tech, Anthropic stopped. That speaks volumes.&lt;/p&gt;&lt;p&gt;We reached out to Anthropic for a comment, but did not hear back before our deadline.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/third-party-breach-exposes-chatgpt-account-details" target="_blank" rel="noopener"&gt;&lt;strong&gt;THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How to stay safe as cybersecurity shifts&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The perimeter model is deteriorating, but that does not mean you are helpless. Individual behavior still matters, and it matters more now than it did before.&lt;/p&gt;&lt;p&gt;Ackerly's recommendation is this: "Stop assuming the app, platform, or company perimeter can always protect your information, or that they will do the right thing with your data. People should be much more deliberate about &lt;a href="https://www.foxnews.com/tech/scammers-can-exploit-your-data-from-just-1-chatgpt-search" target="_blank" rel="noopener"&gt;what data they share&lt;/a&gt;, where they store it, and who can access it. Protection needs to travel with the data, not just sit at the edge of a network. For you, that means choosing services that give you stronger control over your information and being more cautious about oversharing sensitive data in the first place. The data owner should always have governance over said data." So where do you start?&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Use unique passwords for every account&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;A password manager makes this realistic. If one platform gets breached, unique passwords keep the damage isolated to that one account.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Turn on multi-factor authentication wherever it is available&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;&lt;a href="//www.foxnews.com/tech/top-multi-factor-authentication-apps-protect-your-accountsounts" target="_blank" rel="noopener"&gt;&lt;u&gt;Multi-factor authentication (MFA)&lt;/u&gt;&lt;/a&gt; adds a layer that survives even when a password is compromised. It is one of the highest-impact steps an individual can take.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Run strong antivirus software and keep devices updated&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Outdated software is one of the most common entry points attackers use. Strong antivirus software catches threats your instincts might miss, and keeping apps and operating systems current closes the gaps that models like Mythos are built to find. &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp; iOS devices at &lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Be selective about what you share and where&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Every app that holds your data is a potential exposure point. The less you overshare, the smaller your footprint becomes.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Use a data removal service&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Data brokers collect and sell your personal information, often without you ever knowing. Data removal services find where your data is listed and request its removal. You cannot control every place your information travels, but you can shrink the trail it leaves behind. &lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) Choose services that offer real data control&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Not all platforms treat your data the same way. Look for services that let you see, manage and limit how your information is used and where it goes.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Monitor your accounts and credit&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Catching a breach early limits the damage significantly. Set up account alerts wherever your bank or financial platform allows it. A credit freeze costs nothing and stops new accounts from being opened in your name without your knowledge.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;8) Stay skeptical of phishing attempts&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Ackerly warned that scams will get more targeted and harder to spot as AI lowers the barrier for bad actors. Scrutinize every link before you click it and treat unexpected emails or texts asking for login information as suspicious by default. If something feels off, it probably is.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;9) Assume breaches will happen&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;The goal is to limit how much damage they can do. When you operate with that assumption, your decisions about data hygiene get sharper, and your exposure gets smaller.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. &lt;strong&gt;Take my Quiz here: &lt;u&gt;Cyberguy.com&lt;/u&gt;    &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways &lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Mythos did not create the vulnerability problem. It made the scale of it visible in a way that is no longer ignorable. The foundation of modern cybersecurity, the idea that strong enough walls will keep data safe, is being tested in real time by a technology that moves faster than any human team can. That is a consumer story as much as it is a corporate one. Your data lives in systems built on that old model. &lt;/p&gt;&lt;p&gt;And the moment to think differently about how it is protected is now, not after the next major breach makes the headlines. Anthropic made a responsible call by limiting access to Mythos. But the model exists. The capability is real. Other versions of it are being developed. The question for every organization and every individual becomes the same one Ackerly keeps returning to.&lt;/p&gt;&lt;p&gt;When the walls fail, and experts are telling us they will, what is actually protecting your data on the other side? Let us know your thoughts by writing to us at &lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; &lt;strong&gt;- &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/anthropic-mythos-ai-fox-news-001.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">5533ff14-7d95-57da-b025-689df3b2597b</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/microsoft</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/google</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Sat, 25 Apr 2026 15:25:57 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/ai-newsletter-next-dairy-queen-order-could-taken-ai</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/ai-newsletter-next-dairy-queen-order-could-taken-ai</guid>
            <title>Fox News AI Newsletter: Your next Dairy Queen order could be taken by AI</title>
            <description>Fox News Poll also finds voters see AI as a direct threat to their personal privacy and future paychecks</description>
            <content:encoded>&lt;h3&gt; &lt;/h3&gt;&lt;h3&gt;&lt;strong&gt;Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;IN TODAY’S NEWSLETTER:&lt;/p&gt;&lt;p&gt;- Dairy Queen's new drive-thrus without humans spark backlash by frustrated customers&lt;/p&gt;&lt;p&gt;- Meta informs staff of layoffs affecting 8,000 employees amid AI push&lt;/p&gt;&lt;p&gt;- Fox News Poll: Voters see AI as a risk to privacy and paychecks&lt;/p&gt;&lt;p&gt;&lt;strong&gt;COLD OPEN:&lt;/strong&gt; &lt;a href="https://www.foxnews.com/food-drink/dairy-queens-new-drive-thrus-without-humans-spark-backlash-frustrated-customers" target="_blank" rel="noopener"&gt;Dairy Queen's new drive-thrus without humans spark backlash from frustrated customers&lt;/a&gt; – &lt;i&gt;Fast-food chain Dairy Queen is moving toward new, fully automated AI drive-thrus operating without human workers.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;TRUST DEFICIT:&lt;/strong&gt; &lt;a href="https://www.foxnews.com/politics/fox-news-poll-voters-see-ai-risk-privacy-paychecks" target="_blank" rel="noopener"&gt;Fox News Poll: Voters see AI risk to privacy, paychecks&lt;/a&gt; – A&lt;i&gt; Fox News Poll this week reveals growing anxiety among voters regarding artificial intelligence, with a significant portion expressing concerns that the rapidly advancing technology poses a direct threat to their personal privacy and future paychecks.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;DIGITAL HEIST:&lt;/strong&gt; &lt;a href="https://www.foxbusiness.com/politics/white-house-china-industrial-scale-ai-technology-theft-trump-xi-summit" target="_blank" rel="noopener"&gt;White House accuses China of ‘industrial-scale’ AI technology theft ahead of Trump-Xi summit&lt;/a&gt; – A&lt;i&gt;head of the highly anticipated summit between former President Donald Trump and Chinese President Xi Jinping, the White House has raised alarms over China's industrial-scale theft of artificial intelligence technology.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;CCP THEFT:&lt;/strong&gt; &lt;a href="https://www.foxnews.com/politics/google-engineer-stole-ai-secrets-china-senate-hears-explosive-testimony" target="_blank" rel="noopener"&gt;Google engineer stole AI secrets for China, Senate hears explosive testimony&lt;/a&gt; – &lt;i&gt;In explosive testimony before the Senate, lawmakers heard alarming details about a Google engineer accused of stealing closely guarded artificial intelligence secrets on behalf of China, highlighting national security risks.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;CODE OR CRIME: &lt;/strong&gt;&lt;a href="https://www.foxbusiness.com/politics/florida-launches-criminal-probe-whether-chatbot-aided-suspect-deadly-campus-shooting" target="_blank" rel="noopener"&gt;Florida launches criminal probe into whether chatbot aided suspect in deadly campus shooting&lt;/a&gt; – &lt;i&gt;Florida officials have launched a criminal probe to determine whether an artificial intelligence chatbot provided assistance to a suspect involved in a deadly campus shooting, demonstrating a novel challenge for law enforcement.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;FINE PRINT FURY: &lt;/strong&gt;&lt;a href="https://www.foxnews.com/politics/schlossberg-unveils-plan-crack-new-frontier-ai-putting-squeeze-consumers-harbinger" target="_blank" rel="noopener"&gt;Schlossberg unveils plan to crack down on new frontier of AI putting squeeze on consumers&lt;/a&gt; – &lt;i&gt;In a move to protect the public from emerging tech threats, Schlossberg has unveiled a comprehensive plan aimed at cracking down on the new frontier of artificial intelligence that is currently putting a financial squeeze on everyday consumers..&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;CODED MORALITY: &lt;/strong&gt;&lt;a href="https://www.foxnews.com/politics/anthropics-moral-compass-architect-suggested-ai-overcorrection-could-address-historical-injustices%20" target="_blank" rel="noopener"&gt;Anthropic's 'moral compass' architect suggested AI overcorrection could address historical injustices&lt;/a&gt; – &lt;i&gt;The architect behind the "moral compass" at the AI firm Anthropic has controversially suggested that implementing an artificial intelligence overcorrection could serve as a mechanism to address historical injustices.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;DIGITAL PREDATOR: &lt;/strong&gt;&lt;a href="https://www.foxnews.com/us/worker-swanky-country-club-accused-using-ai-create-explicit-photos-teen-police-" target="_blank" rel="noopener"&gt;Worker at swanky country club accused of using AI to create explicit photos of teen, police say&lt;/a&gt; – &lt;i&gt;Police say a worker at an exclusive, swanky country club has been accused of utilizing artificial intelligence tools to generate explicit and inappropriate photographs of a teenager.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;BOT BEHAVIOR: &lt;/strong&gt;&lt;a href="https://www.foxbusiness.com/media/expert-rips-irresponsible-ai-study-over-blackmail-scenerios" target="_blank" rel="noopener"&gt;Expert rips 'irresponsible' AI study over blackmail scenarios&lt;/a&gt; – &lt;i&gt;A leading technology expert is pushing back against a recent academic study outlining hypothetical artificial intelligence blackmail scenarios, ripping the research as highly "irresponsible" for stoking unnecessary public panic.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;DOUBLE DOWN: &lt;/strong&gt;&lt;a href="https://www.foxnews.com/media/reese-witherspoon-doubles-ai-comments-adds-one-paying-say" target="_blank" rel="noopener"&gt;Reese Witherspoon doubles down on AI comments, adds no one is paying her to say it&lt;/a&gt; – &lt;i&gt;Hollywood actress Reese Witherspoon has doubled down on her controversial comments regarding the integration of artificial intelligence in the entertainment industry, emphatically adding that no one is paying her to endorse the technology.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;EFFICIENCY DRIVE: &lt;/strong&gt;&lt;a href="https://www.foxbusiness.com/technology/meta-informs-staff-layoffs-affecting-8000-employees-amid-ai-push" target="_blank" rel="noopener"&gt;Meta informs staff layoffs affecting 8,000 employees amid AI push&lt;/a&gt; – &lt;i&gt;Amid a massive strategic pivot toward artificial intelligence, Meta has informed its staff of impending layoffs expected to affect approximately 8,000 employees as the tech giant restructures its workforce.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;ROBOTIC SHOTS: &lt;/strong&gt;&lt;a href="https://www.foxnews.com/sports/49ers-turning-artificial-intelligence-ahead-nfl-draft-gm-says-laggards-already-behind" target="_blank" rel="noopener"&gt;49ers turning to artificial intelligence at NFL Draft, GM says laggards are already behind&lt;/a&gt; – &lt;i&gt;The San Francisco 49ers are heavily integrating artificial intelligence into their scouting process ahead of the NFL Draft, with the team's general manager warning that franchises failing to adopt the technology are already falling behind, according to Fox News Digital.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;HANDS-FREE FEAST: &lt;/strong&gt;&lt;a href="https://www.foxnews.com/tech/alexa-lets-you-order-food-like-real-conversation%20" target="_blank" rel="noopener"&gt;Alexa lets you order food like a real conversation&lt;/a&gt; – &lt;i&gt;Amazon's Alexa is rolling out an updated artificial intelligence feature that enables users to order food by engaging in a seamless, real-time conversation with the virtual assistant.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;FREE THROW BOT: &lt;/strong&gt;&lt;a href="https://www.foxnews.com/tech/toyota-cue7-robot-shoots-hoops-using-ai" target="_blank" rel="noopener"&gt;Toyota's CUE7 robot shoots hoops using AI&lt;/a&gt; – &lt;i&gt;Toyota is showing off the impressive capabilities of its cutting-edge CUE7 robot, which utilizes advanced artificial intelligence algorithms to accurately shoot basketball hoops.&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;a href="https://www.foxnews.com/newsletters" target="_blank" rel="noopener"&gt;&lt;strong&gt;Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/h3&gt;&lt;h3&gt;&lt;strong&gt;FOLLOW FOX NEWS ON SOCIAL MEDIA&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;&lt;a href="https://www.facebook.com/FoxNews" target="_blank" rel="noopener nofollow"&gt;Facebook&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.instagram.com/foxnews/" target="_blank" rel="noopener nofollow"&gt;Instagram&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.youtube.com/c/FoxNews/featured" target="_blank" rel="noopener nofollow"&gt;YouTube&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://x.com/FoxNews" target="_blank" rel="noopener nofollow"&gt;X&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/company/fox-news-channel/" target="_blank" rel="noopener noreferrer nofollow"&gt;LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;SIGN UP FOR OUR OTHER NEWSLETTERS&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/newsletters" target="_blank" rel="noopener"&gt;Fox News First&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/newsletters" target="_blank" rel="noopener"&gt;Fox News Opinion&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/newsletters" target="_blank" rel="noopener"&gt;Fox News Lifestyle&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/newsletters" target="_blank" rel="noopener"&gt;Fox News Health&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;DOWNLOAD OUR APPS&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/apps-products?pid=AppArticleLink" target="_blank" rel="noopener"&gt;Fox News&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxbusiness.com/apps-products" target="_blank" rel="noopener"&gt;Fox Business&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxweather.com/app" target="_blank" rel="noopener"&gt;Fox Weather&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxsports.com/mobile" target="_blank" rel="noopener noreferrer nofollow"&gt;Fox Sports&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://tubitv.com/" target="_blank" rel="noopener"&gt;Tubi&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;WATCH FOX NEWS ONLINE&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/go" target="_blank" rel="noopener"&gt;Fox News Go&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;STREAM FOX NATION&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/category/fox-nation" target="_blank" rel="noopener"&gt;Fox Nation&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News &lt;a href="https://www.foxnews.com/category/tech/artificial-intelligence" target="_blank" rel="noopener noreferrer nofollow"&gt;here&lt;/a&gt;.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/dairy-queen-restaurant-austin-fox-news-001.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">ed255959-2230-5aae-aa73-974a6336da5e</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/columns/artificial-intelligence-newsletter</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/robots</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Fri, 24 Apr 2026 13:02:06 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/fcc-router-rule-raises-questions-future-updates</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/fcc-router-rule-raises-questions-future-updates</guid>
            <title>FCC router rule raises questions about future updates</title>
            <description>What the policy means for your home network and security</description>
            <content:encoded>&lt;p&gt;A new move from the &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/tech/topics/fcc"&gt;Federal Communications Commission&lt;/a&gt; is being framed as a national security step. But if you already have a router at home, the bigger question is simple: how long will it keep getting security updates?&lt;/p&gt;&lt;p&gt;The FCC recently updated its "Covered List" to include &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/politics/your-internet-router-could-china-linked-fcc-cracks-down-unacceptable-security-risks"&gt;routers produced in foreign countries&lt;/a&gt;, which blocks new models of that covered equipment from being approved for sale in the U.S.&lt;/p&gt;&lt;p&gt;At the same time, the FCC made something else clear. This change does not affect routers you already own, and it does not stop retailers from continuing to sell models that were previously approved.&lt;/p&gt;&lt;p&gt;So nothing shuts off overnight. However, the policy introduces a new layer of uncertainty around how long some devices will continue receiving updates.&lt;/p&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/your-home-wi-fi-really-safe-think-again"&gt;&lt;strong&gt;IS YOUR HOME WI-FI REALLY SAFE? THINK AGAIN&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://CyberGuy.com"&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; &lt;strong&gt;- &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my &lt;em&gt;Ultimate Scam Survival Guide&lt;/em&gt; free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;&lt;strong&gt;What the FCC router rule actually changed&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The policy focuses on future device approvals, not the devices already in your home.&lt;/p&gt;&lt;p&gt;Here is what the FCC says in plain terms:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Existing routers can still be used&lt;/li&gt;&lt;li&gt;Previously approved models can still be sold and imported&lt;/li&gt;&lt;li&gt;New covered models cannot receive FCC authorization&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This action is tied to &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/politics/executive/national-security"&gt;national security concerns&lt;/a&gt; about supply chain risks, not a product-by-product security test of individual routers. The key takeaway is this: your current router is not banned, recalled or disabled.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why the FCC router rule raises update concerns&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The real issue is not about using your router today. It is about future &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/tech/topics/software"&gt;software&lt;/a&gt; and firmware updates. Alongside the policy change, the FCC issued a temporary waiver. That waiver allows existing routers to continue receiving updates that patch vulnerabilities, maintain functionality and ensure compatibility with operating systems. Right now, that waiver runs through at least March 1, 2027.&lt;/p&gt;&lt;p&gt;That date is not a guaranteed cutoff. The FCC has said it will re-evaluate the policy before then and may extend or modify the waiver. So the situation is still evolving.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How the FCC router rule could affect your router security&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Your router is the gateway to &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/smart-home-hacking-fears-whats-real-whats-hype"&gt;everything connected in your home&lt;/a&gt;. Phones, laptops, smart TVs and cameras all depend on it. When a vulnerability is discovered, a software update is usually what fixes it.&lt;/p&gt;&lt;p&gt;If updates slow down or stop, the risk builds over time. That does not mean your router suddenly becomes unsafe. But it can become easier for attackers to exploit known flaws.&lt;/p&gt;&lt;p&gt;Even the FCC acknowledged this in its waiver, noting that continued updates help mitigate harm to consumers and support essential security functions. So the concern is not immediate. It is about what happens over time if support policies change.&lt;/p&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/browser-extensions-put-millions-google-chrome-users-risk"&gt;&lt;strong&gt;BROWSER EXTENSIONS PUT MILLIONS OF GOOGLE CHROME USERS AT RISK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why the FCC is making exceptions for some routers&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;One important wrinkle is that the FCC has already begun granting conditional approvals for some devices. In April 2026, the agency approved certain products from NETGEAR and Adtran to continue operating under specific conditions through October 1, 2027.&lt;/p&gt;&lt;p&gt;That shows this is not a one-size-fits-all rule. Instead, it is an evolving policy where some devices may continue receiving support while others may face tighter restrictions.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What the FCC says about router risks and next steps&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The FCC says the decision is based on national security concerns, including supply chain vulnerabilities and &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/chinese-hackers-target-us-telecoms-what-you-need-know-protect-your-data"&gt;potential cybersecurity risks&lt;/a&gt; tied to certain foreign-produced equipment.&lt;/p&gt;&lt;p&gt;At the same time, the policy includes a path for exceptions. Companies can seek conditional approvals through federal agencies, and regulators can revisit the rules as more information becomes available.&lt;/p&gt;&lt;p&gt;That means the final impact will likely depend on how those decisions play out over time.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;8 ways to protect your network after the FCC router rule&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Until there is more clarity, a few simple steps can help keep your home network secure.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Check how long your router is supported&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;First, find your &lt;strong&gt;router's exact model number&lt;/strong&gt;. You can usually see it on a label on the bottom or back of the device. Next, go to the manufacturer's website, such as NETGEAR, Linksys or TP-Link, and search for &lt;strong&gt;that model.&lt;/strong&gt; Open its &lt;strong&gt;support page&lt;/strong&gt; and look for sections like &lt;strong&gt;Support, Downloads, Firmware or End of Life&lt;/strong&gt;. Then, check for &lt;strong&gt;a support timeline,&lt;/strong&gt; the date of the most recent firmware update or any notes saying the product is no longer supported. If you cannot find clear information, that is a warning sign that your router may not receive regular security updates. &lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Keep your router updated&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Next, log into your &lt;strong&gt;router settings.&lt;/strong&gt; To do this, open a &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/tech/technologies/browsers"&gt;web browser&lt;/a&gt; and type your router's &lt;strong&gt;IP address&lt;/strong&gt; into the address bar. Common ones include 192.168.1.1 or 192.168.0.1. Then sign in using your &lt;strong&gt;admin username and password&lt;/strong&gt;. Once you are in, look for sections labeled &lt;strong&gt;Firmware, Software Update &lt;/strong&gt;or &lt;strong&gt;Administration.&lt;/strong&gt; Check for available &lt;strong&gt;updates&lt;/strong&gt; and&lt;strong&gt; install them&lt;/strong&gt; if needed. If your router supports automatic updates, turn that on. This helps close security gaps quickly without you having to check manually. If you are not sure where to find these settings, you can also use your router's mobile app if it has one, which often makes updates easier.&lt;/p&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/get-faster-wi-fi-simple-home-fixes"&gt;&lt;strong&gt;GET FASTER WI-FI WITH THESE SIMPLE HOME FIXES&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Plan ahead for replacement&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If your router is already a few years old, start planning for a replacement. Do not wait until updates stop. Instead, look for models with clearly stated support timelines. &lt;strong&gt;Check out our picks for the Top Routers for best security at &lt;/strong&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://cyberguy.com"&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;cyberguy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt; &lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Secure your devices as a backup layer&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Your router is the first line of defense. However, your devices matter too. Keep your phone, computer and tablet updated. Also, use strong antivirus software to help catch threats that slip through. &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp; iOS devices at &lt;/strong&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://Cyberguy.com"&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Review connected devices&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;From time to time, check what is connected to your network. You can do this in your router settings under "Connected Devices" or in your router's app. If you see anything unfamiliar, remove it right away.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) Use strong passwords&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Create a &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/dont-use-your-home-wi-fi-before-fixing-security-risks"&gt;strong Wi-Fi password&lt;/a&gt; and a separate admin password for your router. Avoid using default credentials. A password manager can help you generate and store secure logins. &lt;strong&gt;Check out the best expert-reviewed password managers of 2026 at &lt;/strong&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://Cyberguy.com"&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Turn off remote access&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;First, log into your router settings using a web browser. Type your router's IP address, such as &lt;strong&gt;192.168.1.1&lt;/strong&gt; or &lt;strong&gt;192.168.0.1&lt;/strong&gt;, into the address bar and sign in with your admin credentials. Next, look for settings labeled &lt;strong&gt;Remote Access, Remote Management, Web Access from WAN, or Cloud Access&lt;/strong&gt;. These are often found under sections like &lt;strong&gt;Advanced, Administration or Security&lt;/strong&gt;. Then, turn that setting off and save your changes. This prevents your router from being accessed from outside your home network. If you cannot find the option, check your router's mobile app or the manufacturer's support page. Some routers hide this setting or disable it by default.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;8) Restart your router regularly&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;First, unplug your router from the power outlet. Wait about &lt;strong&gt;30 seconds&lt;/strong&gt; to let it fully shut down. Next, plug it back in and wait a few minutes for it to reconnect to the internet. You can also restart your router through its settings. Log in, then look for options like &lt;strong&gt;Reboot or Restart&lt;/strong&gt; under sections such as &lt;strong&gt;Administration or System&lt;/strong&gt;. Doing this every few weeks can help apply updates and clear temporary issues that may affect performance or security. If your router supports scheduled reboots, you can turn that on to automate the process.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaway&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This is not a situation where your internet suddenly becomes unsafe. There is no recall. There is no shutdown. Your router will not stop working on a specific date. However, there is a new question mark that did not exist before. The Federal Communications Commission has created a system where future updates for some devices could depend on how the rules evolve. That puts more importance on something most people rarely think about: how long their router will stay supported. For now, you still have time. The current waiver runs into 2027, and regulators have signaled they may revisit the policy before then. The smart move is simple. Know what you own, keep it updated and stay aware as this situation develops.&lt;/p&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener" href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;As policies around your home tech change, how much responsibility should fall on regulators versus the companies that keep your devices updated? Let us know by writing to us at &lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://Cyberguy.com"&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://CyberGuy.com"&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; &lt;strong&gt;- &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my &lt;em&gt;Ultimate Scam Survival Guide&lt;/em&gt; free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 &lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://CyberGuy.com"&gt;CyberGuy.com&lt;/a&gt;.  All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/fcc-router-rule-1.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">02f9d928-e5ab-5fd9-a151-6e04b281abc6</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/newsedge/consumer</category>
            <category domain="foxnews.com/taxonomy">fox-news/us</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/wifi</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fcc</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Fri, 24 Apr 2026 09:17:31 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/amazon-put-elon-musks-starlink-notice</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/amazon-put-elon-musks-starlink-notice</guid>
            <title>Amazon just put Elon Musk's Starlink on notice</title>
            <description>Amazon dropped $11.57 billion on a satellite company, and the battle for who connects the world just got a lot more interesting</description>
            <content:encoded>&lt;p&gt;Chances are, you have never thought much about who owns the satellites keeping your phone connected in the middle of nowhere. That could change soon. &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/tech/companies/amazon"&gt;Amazon is betting $11.57 billion&lt;/a&gt; that you will start paying attention. Its acquisition of Globalstar is a major move against Starlink, and the stakes go far beyond bragging rights.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://CyberGuy.com"&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; &lt;strong&gt;- &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my &lt;em&gt;Ultimate Scam Survival Guide&lt;/em&gt; free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/amazon-takes-elon-musk-launching-27-internet-satellites"&gt;&lt;strong&gt;AMAZON TAKES ON ELON MUSK, LAUNCHING 27 INTERNET SATELLITES&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What Amazon's Globalstar deal means for you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Globalstar has operated for more than 30 years as a mobile satellite services provider. It brings something Amazon needed badly: spectrum. The company operates in Band 53, a slice of spectrum from 2483.5 to 2495 MHz. It describes this aslicensed spectrum with global authorizations designed to support fast, low-latency connectivity with reduced interference. That matters. Spectrum is limited, and having access to it gives Amazon a real edge. &lt;/p&gt;&lt;p&gt;Amazon is also getting Globalstar's satellites, infrastructure and global licenses. It is a full package. But the real value is the spectrum. This deal is also about what that spectrum enables. Amazon plans to use it to power &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/never-lose-cell-service-again-space-age-satellite-tech"&gt;direct-to-device satellite services&lt;/a&gt;, allowing phones to send texts, make calls and access data even when there is no cellular signal. &lt;/p&gt;&lt;p&gt;The system is expected to roll out starting in 2028 and will support features on devices like &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/tech/companies/apple"&gt;iPhones and Apple Watches,&lt;/a&gt; including emergency messaging and roadside assistance. That turns this into more than an infrastructure deal. It is a shift in how everyday devices stay connected beyond traditional networks.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Amazon vs Starlink: Where things stand now&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Let's be clear about the gap. &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/person/elon-musk"&gt;Starlink serves&lt;/a&gt; more than nine million users and has about 10,000 satellites in orbit. Amazon's Leo network has just over 200 satellites. Adding Globalstar's two dozen barely moves the number. So why spend $11.57 billion? Because this deal is not about satellite count. It is about future capability. &lt;/p&gt;&lt;p&gt;Amazon plans to launch a next-generation direct-to-device system in 2028. This would deliver voice, data and messaging straight to phones. The Globalstar deal gives Amazon the tools to make that happen. It brings spectrum, infrastructure and experience together.&lt;/p&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener" href="https://www.foxbusiness.com/fox-news-world/musk-confirms-spacex-success-preventing-russian-military-from-accessing-stolen-starlink-units"&gt;&lt;strong&gt;MUSK CONFIRMS SPACEX SUCCESS IN PREVENTING RUSSIAN MILITARY FROM ACCESSING STOLEN STARLINK UNITS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How Amazon's satellite service will power iPhones and Apple Watches&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This is where the story hits home. Amazon and Apple have an agreement for Amazon Leo to support satellite features on iPhones and Apple Watches. That includes &lt;a target="_blank" rel="noopener noreferrer nofollow" href="https://www.foxnews.com/tech/connect-crisis-ios-18s-new-video-call-feature-emergency-services"&gt;&lt;u&gt;Emergency SOS&lt;/u&gt;&lt;/a&gt; via satellite. If you rely on that feature in a dead zone, it will soon run through Amazon's network. Apple says the service has already helped in real emergencies, including stranded hikers and crash victims rescued in remote areas. Amazon will continue supporting current devices using Globalstar's system while working with Apple on future upgrades. So nothing breaks, but the system behind it changes.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Amazon satellite timeline and FCC approval&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The deal still needs regulatory approval, and that takes time. Amazon expects it to close in 2027. The FCC will decide, though early signs look positive. Amazon also faces a deadline. It plans to deploy about 3,200 satellites by 2029. About half must be in orbit by July 2026. That timeline adds pressure to move fast.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What this means for rural and remote users&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This deal matters most in places where cell towers do not reach. Satellite connectivity can act as a backup during &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/weather/hurricanes"&gt;disasters like hurricanes&lt;/a&gt; or wildfires. In those moments, having no signal can be dangerous. But the impact goes beyond emergencies. Remote workers, trucking fleets, maritime crews and rural communities all stand to benefit. These are places where traditional networks fall short. Amazon's full Leo network will include thousands of satellites. It aims to support hundreds of millions of devices worldwide.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://Cyberguy.com"&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;    &lt;/p&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener" href="https://www.foxbusiness.com/technology/blue-origin-launches-38th-new-shepard-flight-space"&gt;&lt;strong&gt;BLUE ORIGIN LAUNCHES 38TH NEW SHEPARD FLIGHT INTO SPACE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Amazon's $11.57 billion acquisition of Globalstar sends a clear message. It does not plan to let Starlink dominate the sky. Right now, the satellite gap is massive. Amazon knows that. Instead, it is betting on better spectrum, &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech"&gt;smarter technology&lt;/a&gt; and key partnerships like Apple. Amazon executive Panos Panay says billions of people still lack reliable connectivity. Amazon wants to close that gap. That is a real problem and a serious opportunity. The big question is speed. Can Amazon scale fast enough to compete before Starlink pulls further ahead?&lt;/p&gt;&lt;p&gt;If two of the richest companies in the world are racing to control the sky, who decides how that access is priced and delivered? And what does that mean for you? Let us know by writing to us at &lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://Cyberguy.com"&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener" href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://CyberGuy.com"&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; &lt;strong&gt;- &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my &lt;em&gt;Ultimate Scam Survival Guide&lt;/em&gt; free when you join. &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 &lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://CyberGuy.com"&gt;CyberGuy.com&lt;/a&gt;.  All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/amazon-leo-satellites-rocket-launch.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">b8bc23cc-7238-5a4e-9fac-6d4974128200</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/amazon</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fcc</category>
            <category domain="foxnews.com/taxonomy">fox-news/science/air-and-space</category>
            <category domain="foxnews.com/taxonomy">fox-news/person/elon-musk</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Fri, 24 Apr 2026 06:32:07 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/florida-retiree-lost-200k-fake-paypal-refund-scam</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/florida-retiree-lost-200k-fake-paypal-refund-scam</guid>
            <title>How Florida retiree lost $200K in fake PayPal refund scam</title>
            <description>A simple refund email led to fake bank balances, gold coins and a $200,000 loss</description>
            <content:encoded>&lt;p&gt;Brian Oliver is retired, sharp and financially savvy enough to have a stock-and-bond portfolio worth hundreds of thousands of dollars. He is not the type of person you picture getting scammed. That is exactly why scammers picked him.&lt;/p&gt;&lt;p&gt;What happened to Oliver, 85, is the kind of story that makes your jaw drop, and your stomach turn at the same time. It started with a routine-looking &lt;a href="https://www.foxnews.com/category/tech/technologies/email" target="_blank" rel="noopener"&gt;email&lt;/a&gt; and ended with a box of gold coins rolling away in the back of a black Mustang. In between, Oliver lost $200,000 and nearly half of his retirement savings.&lt;/p&gt;&lt;p&gt;He told his story on my Beyond Connected podcast at getbeyondconnected.com, along with Detective Justin Torres of the Gainesville &lt;a href="https://www.foxnews.com/category/shows/cops" target="_blank" rel="noopener"&gt;Police Department&lt;/a&gt; in Florida. What they shared together is equal parts chilling and clarifying.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and &lt;a href="https://www.foxnews.com/category/deals/trending/sales-deals" target="_blank" rel="noopener"&gt;exclusive deals&lt;/a&gt; delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join. &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/beware-fake-credit-card-account-restriction-scams" target="_blank" rel="noopener"&gt;&lt;strong&gt;BEWARE FAKE CREDIT CARD ACCOUNT RESTRICTION SCAMS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;It all started with a PayPal refund scam email&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Brian got an &lt;a href="https://www.foxnews.com/tech/fake-paypal-email-let-hackers-access-computer-bank-account" target="_blank" rel="noopener"&gt;email that said PayPal&lt;/a&gt; owed him money. It was not a wild claim. He had dealt with PayPal before and figured, "Maybe they found some money for me." So he responded. The email included a phone number, and that number connected him to a man who called himself Andrew Johnson.&lt;/p&gt;&lt;p&gt;"Yeah, we have $450 for you. Type in the number 100 on your computer and we'll get it started."&lt;/p&gt;&lt;p&gt;Brian typed 100. Andrew immediately said he had made a mistake: "Oh no, you put in 10,000."&lt;/p&gt;&lt;p&gt;Brian pushed back. He said he did not type 10,000. Andrew told him to check his Bank of America account. Brian opened it, and there it was: $10,000 sitting in his checking account.&lt;/p&gt;&lt;p&gt;Except it was not real. The scammers had somehow &lt;a href="https://www.foxnews.com/tech/how-one-man-got-scammed-seconds-using-google" target="_blank" rel="noopener"&gt;mirrored his bank's website&lt;/a&gt;. What Brian saw looked exactly like his actual Bank of America page, complete with a new balance and a phone number embedded in the "Contact Us" section. That number was fake, too.&lt;/p&gt;&lt;p&gt;Brian called it. A man named Josh answered, identifying himself as a Bank of America representative. He told Brian that the only way to return the money without triggering a $3,500 tax penalty was to withdraw $10,000 in cash and feed it into a &lt;a href="https://www.foxnews.com/tech/6-crypto-scam-scripts-criminals-use-steal-your-money" target="_blank" rel="noopener"&gt;crypto ATM&lt;/a&gt;.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How the PayPal refund scam tricked Brian&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Oliver had never heard of a crypto ATM before that day. Josh helpfully told him exactly where to find one. It was in a sketchy part of town, and Oliver walked in carrying $10,000 in his pocket.&lt;/p&gt;&lt;p&gt;"I'm on my knees, on a cement floor, and I'm 85," Oliver said.&lt;/p&gt;&lt;p&gt;He fed one hundred $100 bills into the machine, bill by bill, watching over his shoulder the entire time. Some bills got kicked back out. He fed them in again. When the machine finally accepted all of them, he photographed the receipt and sent it to Andrew Johnson, just as he had been instructed.&lt;/p&gt;&lt;p&gt;Then Oliver went home and told Andrew it was done. Andrew told him they still had to take care of his refund. He told Oliver to type in the number 200.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/fake-paypal-email-let-hackers-access-computer-bank-account" target="_blank" rel="noopener"&gt;&lt;strong&gt;FAKE PAYPAL EMAIL LET HACKERS ACCESS COMPUTER AND BANK ACCOUNT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Oliver typed it. Andrew's response came fast: "Oh my God, my boss is going to kill me. It's $200,000 we've transferred to your account."&lt;/p&gt;&lt;p&gt;This type of scam is becoming more common, and it often involves criminals impersonating trusted platforms like PayPal.&lt;/p&gt;&lt;p&gt;"PayPal does not tolerate fraudulent activity, and we work hard to protect our customers from evolving phishing scams," a spokesperson for PayPal told CyberGuy. "We always encourage consumers to learn how to spot the warning signs of common fraud, including our tips on the PayPal Newsroom for identifying phishing emails that attempt to impersonate trusted brands. We further recommend contacting Customer Support for assistance through official channels such as the PayPal app and our Contact Us webpage, and never responding to suspicious, unexpected emails."&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How the scam escalated to $200,000 in gold&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Oliver opened his bank account again. The fake mirrored site showed $200,000 sitting there. Josh Wilson was back on the phone with a new plan. This time, the crypto ATM would not work because the amount was too large. Oliver needed to liquidate $200,000 from his stock and bond portfolio, convert it to cash and use it to buy gold coins.&lt;/p&gt;&lt;p&gt;Oliver protested. He told them to just reverse the transfer. They said it was impossible.&lt;/p&gt;&lt;p&gt;"This is my retirement money. 50% of my retirement money," he said.&lt;/p&gt;&lt;p&gt;The scammers told him not to breathe a word to anyone. Josh specifically warned him that telling his broker the truth could trigger tax problems. So Oliver called his broker and said he had his eye on a piece of &lt;a href="https://www.foxnews.com/category/lifestyle/real-estate" target="_blank" rel="noopener"&gt;real estate&lt;/a&gt; he wanted to flip. The broker processed the sale without question.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/youtube-job-scam-text-how-spot-fast" target="_blank" rel="noopener"&gt;&lt;strong&gt;YOUTUBE JOB SCAM TEXT: HOW TO SPOT IT FAST&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Oliver went to a gold coin store, wrote a check for $198,560 and waited two to three days for it to clear. Andrew Johnson stayed in regular contact the entire time.&lt;/p&gt;&lt;p&gt;When the gold was ready, Johnson gave Oliver one final instruction. A courier would come to his door to pick up the box. Before handing it over, Oliver should ask the courier for a password. The password was "blue."&lt;/p&gt;&lt;p&gt;The courier arrived. He was driving a black Mustang. He said the word blue. Oliver handed over the box.&lt;/p&gt;&lt;p&gt;"He told me the password," Oliver said. "I handed the box, and off went my $200,000."&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The moment Brian Oliver realized it was all a scam&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The day after the courier left, Andrew Johnson called back with urgency. He told Brian Oliver another $200,000 had landed in his account, and they needed to do the whole thing over again. That was the moment it broke.&lt;/p&gt;&lt;p&gt;"That's when I came out from under the ether of this scam," Oliver said. "And I said, this cannot be right."&lt;/p&gt;&lt;p&gt;He immediately called the Gainesville Police Department.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The high-stakes sting that brought down a scam courier&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Detective Justin Torres of the Gainesville Police Department took the call and started working the case immediately. The scammers had asked Oliver for photos of the gold and the purchase receipt, which gave &lt;a href="https://www.foxnews.com/category/crime" target="_blank" rel="noopener"&gt;law enforcement&lt;/a&gt; about a day and a half to set up an operation before the courier was scheduled to return.&lt;/p&gt;&lt;p&gt;Detective Torres pulled in four officers from the department's Gun Violence Initiative unit, a team of intermediate detectives trained for exactly this kind of boots-on-ground work. They set up covert and marked vehicles around Oliver's residence at a careful distance.&lt;/p&gt;&lt;p&gt;"It was pretty high intensity because I'm listening to Mr. Oliver's conversation with Andrew," Torres said. "And I'm also trying to be a good distance away to listen to my radio and be able to broadcast what I need to to the other officers on the outside."&lt;/p&gt;&lt;p&gt;The scammers were suspicious. They kept pushing Oliver to be more compliant. Oliver pushed back. The goal was to keep them on the line long enough for the courier to show up. The courier, a man named Seth Wayne, drove in from Tampa. The officers waited. When he arrived, they arrested him. The case went to trial. Seth Wayne received an 18-year prison sentence.&lt;/p&gt;&lt;p&gt;A federal jury has since convicted a second courier in the same scheme. Atharva Shailesh Sathawane, 22, an undocumented immigrant from India, was found guilty of conspiracy to commit wire fraud and money laundering, with Brian Oliver among his victims.&lt;/p&gt;&lt;p&gt;Sathawane was arrested after the Gainesville Police Department set up a second sting operation at Brian's home. Court documents showed Sathawane was involved in more than 30 transactions across multiple states, contributing to nearly $8 million stolen from elderly victims. He faces up to 20 years on each count, with sentencing scheduled for Dec. 16 in Gainesville, though he is appealing his conviction.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How refund scams are hitting multiple victims&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Ten other victims testified at Seth Wayne's trial. They had come from all over the state of Florida, and their stories made Oliver furious.&lt;/p&gt;&lt;p&gt;Some had received &lt;a href="https://www.foxnews.com/tech/fake-agent-phone-scams-spreading-fast-across-us" target="_blank" rel="noopener"&gt;fake arrest warrants&lt;/a&gt;, official-looking documents claiming their identities had been tied to gun running. They were told the only way to clear their names was to pull their savings and buy gold, which would be placed in a special locker in Washington, D.C., until their names were cleared.&lt;/p&gt;&lt;p&gt;One victim lost $1.8 million. Another lost $4.9 million. A third woman lost over $1 million across two separate pickups by the same courier. Her husband was in hospice care in Florida while all of this was happening. She drained her entire life savings, sold her condo and had to move in with her daughter and son-in-law in Alabama, leaving her dying husband behind.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Where the money from refund scams actually goes&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Once the gold or cash leaves a victim's hands, recovery is nearly impossible. Most of Seth Wayne's deliveries went to parking lots at McDonald's or shopping centers, where he handed the money directly to a controller. One pickup went to a jewelry store, where an employee came outside to collect it. That connection is still under active investigation by the IRS and &lt;a href="https://www.foxnews.com/category/tech/topics/fbi" target="_blank" rel="noopener"&gt;FBI&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;The call centers running these operations are overseas. Higher-level couriers in the United States are still being investigated. The full network is, as Detective Torres put it, "very intricate" and "very complicated."&lt;/p&gt;&lt;p&gt;Seth Wayne himself was a mid-to-upper-level courier. He was also paying other couriers and compensating his handler. When investigators downloaded his cell phone after a judge-approved search warrant, they found evidence that he had researched exactly what he was doing before deciding the money was worth the risk.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/scams-arent-illegal-but-should-be" target="_blank" rel="noopener"&gt;&lt;strong&gt;SCAMS THAT AREN'T ILLEGAL (BUT SHOULD BE)&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The defense of "willful blindness," the idea that a courier can claim ignorance and escape responsibility, no longer holds up in Florida courts. Seth Wayne found that out the hard way.&lt;/p&gt;&lt;p&gt;For a deeper look at what Oliver went through, you can hear the full story on my Beyond Connected podcast at getbeyondconeccted.com.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How to stay safe from refund scams&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Detective Torres laid out the most important red flags clearly, and Oliver added a few from painful personal experience. Here is what both of them want you to know.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Hang up on urgency&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scammers manufacture pressure because it works. If someone on the phone is telling you that you must act right now, that is not a real emergency. That is a tactic. Torres put it directly: "They want to make you believe that you have to do all this right now."&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Never call the number they give you&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If someone calls claiming to be from PayPal, your bank or a law enforcement agency, hang up and find the real number yourself. The number embedded in Oliver's fake bank website looked completely legitimate. It was not.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Pause for ten seconds&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Literally ten seconds. Detective Torres confirmed what many security experts say: "If you pause these scams for just 10 seconds, many of them will just fall apart." A scammer who is pushed back even slightly will often overreact, and that reaction will feel wrong.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Isolation is the biggest red flag&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;The moment someone on the phone tells you not to tell a family member, friend or neighbor what is happening, stop. That instruction exists for one reason: to prevent you from getting help before they get your money. "Once you start hearing that isolation conversation, that is the biggest red flag," Torres said. "You need to hang up the phone."&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Gold is always a scam signal&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Oliver made this one simple: "If you're told to go buy gold, the only reason they tell you to buy gold is because it can never be traced. It's a scam." No legitimate company, government agency or financial institution will ever ask you to buy gold coins and hand them to a stranger.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) The courier at your door means stop&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If you have already bought gold and someone is coming to your home to pick it up in a box, Oliver's advice is direct: "Stop right there. It's a scam."&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Never move money to fix a 'mistake'&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If someone claims they &lt;a href="https://www.foxnews.com/tech/top-5-overpayment-scams-avoid" target="_blank" rel="noopener"&gt;accidentally sent you money&lt;/a&gt; and asks you to return it, stop right there. Real companies fix errors on their own systems. They will not ask you to withdraw cash, buy crypto or purchase gold to correct a transaction.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;8) Verify your account on your own device&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If you need to check your bank account, use your official banking app or type the website yourself. Do not trust links, screens or phone numbers provided during a call. In many cases, scammers create fake sites that look identical to the real thing.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;9) Be wary of step-by-step instructions&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scammers often stay on the phone and guide you through every move. That level of control should raise concern. Legitimate companies do not walk you through withdrawing cash, using crypto ATMs or buying gold to solve a problem.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;10) Bring in a second person&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Before moving a large amount of money, pause and call someone you trust. A quick conversation with a family member or friend can shift your perspective. In many cases, that outside voice is enough to stop a scam in progress.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;11) Limit how much of your information is online&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scammers build convincing stories using real details they find online. This can include your phone number, home address or financial history. To reduce that risk, consider &lt;a href="https://www.foxnews.com/tech/one-thing-scammers-check-targeting-online" target="_blank" rel="noopener"&gt;removing your information&lt;/a&gt; from data broker and people-search sites. While you can do this manually, it often takes time, which is why some people use a data removal service such as Incogni to help automate the process and keep their information from resurfacing.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Get a free scan to find out if your personal information is already out on the web: &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Brian Oliver lost $200,000, leaving him with only half of his retirement savings. Today, he says he is slowly sinking toward bankruptcy, and the odds of getting that money back are slim. Even so, he chose to go public so others could hear his story before it happens to them. What makes this case different is that it led to real consequences. Detective Torres and his team moved quickly and set up a sting operation. As a result, they arrested a courier who later received an 18-year prison sentence. Meanwhile, the IRS and FBI are still investigating the larger network. However, this kind of outcome is rare. In most cases, victims lose everything and never see justice. These scams are complex, often run from overseas, and are designed to move money fast. Because of that, law enforcement usually focuses on the people closest to the victim and works backward. In the end, Oliver's turning point came during a second demand for money. At that moment, something felt off, so he paused. Then he said, "This cannot be right." That instinct matters. In many cases, that brief pause is enough to break the scam.&lt;/p&gt;&lt;p&gt;If you were in Oliver's position, at what exact moment do you think you would have stopped, and what would it have taken for you to make that call? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/Brian-Oliver-Gainesville-Florida-Money-Gold-Split.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">4a1b2c16-be93-5de6-87e4-b8d654674b6e</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/email</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fbi</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/us/crime/robbery-theft</category>
            <category domain="foxnews.com/taxonomy">fox-news/us/economy/taxes</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Thu, 23 Apr 2026 12:30:40 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/toyota-cue7-robot-shoots-hoops-using-ai</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/toyota-cue7-robot-shoots-hoops-using-ai</guid>
            <title>Toyota's CUE7 robot shoots hoops using AI</title>
            <description>How a car company taught a robot to play basketball and why it matters way beyond sports</description>
            <content:encoded>&lt;p&gt;Most people &lt;a href="https://www.foxnews.com/category/auto/make/toyota" target="_blank" rel="noopener"&gt;think of Toyota&lt;/a&gt; and picture a Camry, a Tacoma, maybe a Prius. A 7-foot-2 robot shooting free throws at halftime of a professional basketball game? That's a harder image to conjure. But recently, that's exactly what happened at Toyota Arena Tokyo, and around 8,400 fans watched it go down live.&lt;/p&gt;&lt;p&gt;The robot is called the CUE7. It smoothly stood up from a seated position, dribbled a basketball and sank a free throw without any human input. The crowd applauded. The engineers probably exhaled. Toyota had officially debuted its most advanced AI-powered humanoid robot, and it chose basketball as the venue.&lt;/p&gt;&lt;p&gt;So why is a car company &lt;a href="https://www.foxnews.com/category/tech/technologies/robots" target="_blank" rel="noopener"&gt;building basketball robots?&lt;/a&gt; And what does any of this have to do with you? More than you might think.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/ai-powered-robot-sinks-seemingly-impossible-basketball-hoops" target="_blank" rel="noopener"&gt;&lt;strong&gt;AI-POWERED ROBOT SINKS SEEMINGLY IMPOSSIBLE BASKETBALL HOOPS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The CUE7 started from scratch, on purpose&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Here's the thing that makes the CUE7 genuinely different from its predecessors: Toyota's team discarded everything they had built and started over.&lt;/p&gt;&lt;p&gt;"We made full use of AI, and we discarded everything we had built up and started again from scratch," said Tomohiro Nomi, research leader for &lt;a href="https://www.foxnews.com/tech/humanoid-robots-hit-mass-production-china" target="_blank" rel="noopener"&gt;humanoid robots at Toyota's&lt;/a&gt; Frontier Research Center.&lt;/p&gt;&lt;p&gt;That's not a small statement. The CUE series goes back to 2017, when a group of Toyota employees launched it as a voluntary side project on their own time. It eventually became an official research program, and over nearly a decade, the team stacked up some genuinely impressive hardware. The CUE3 earned a Guinness World Record in 2019 for most consecutive basketball free throws by a humanoid robot (assisted), sinking 2,020 in a row. Then the CUE6 earned the record for the &lt;a href="https://www.foxnews.com/tech/ai-powered-robot-sinks-seemingly-impossible-basketball-hoops" target="_blank" rel="noopener noreferrer nofollow"&gt;&lt;u&gt;farthest basketball shot by a robot&lt;/u&gt;&lt;/a&gt;, connecting from about 80 feet 6 inches) away.&lt;/p&gt;&lt;p&gt;So the legacy was already there. What changed with CUE7 was the philosophy behind how it learns.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;From human programming to AI that figures it out alone&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Earlier versions of the CUE relied on something called model predictive control. Basically, human engineers programmed exactly how the robot should move, step by step. It worked well enough to break world records. But it also had a ceiling. Every new motion required new programming by a human being.&lt;/p&gt;&lt;p&gt;The CUE7 instead uses &lt;a href="https://www.foxnews.com/category/tech/understanding-ai" target="_blank" rel="noopener"&gt;reinforcement learning&lt;/a&gt; powered by artificial intelligence. It learns to shoot the ball based on its own experience and trial and error rather than pre-programmed instructions. The AI acts as an autonomous agent: it tries something, observes the result, adjusts and tries again. Over enough repetitions, it gets good. Really good.&lt;/p&gt;&lt;p&gt;The hybrid control system merges reinforcement learning with model predictive control, creating a robot that adapts to unexpected situations rather than just following a fixed script. Think of it as the difference between a player who memorized every play in the book and one who reads the game in real time. CUE7 is learning to read the game.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What's actually inside the CUE7 robot&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The CUE7 stands about 7 feet 2 inches tall and weighs roughly 163 pounds, making it about 40% lighter than the previous version, which came in around 265 pounds. Toyota pulled that off by simplifying the structure and reducing the number of axles.&lt;/p&gt;&lt;p&gt;It also switched from four wheels to two, which makes its movement faster and more fluid. One moment that really stood out was how smoothly it can rise from a seated position. That kind of motion, especially at this size, takes serious engineering and drew a reaction from a crowd of more than 8,000 people.&lt;/p&gt;&lt;p&gt;For sensing and aiming, the robot uses lidar sensors in its torso to detect its surroundings, along with a stereo camera in its head to calculate distance and angle. It is powered by high-performance batteries adapted from Toyota's racing tech.&lt;/p&gt;&lt;p&gt;Here's where it gets interesting. The robot measures the distance to the hoop, calculates the angle, determines the right trajectory and then releases the shot with controlled force. If it misses, it learns from that attempt and adjusts on the next one.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/ai-powered-robot-sinks-seemingly-impossible-basketball-hoops" target="_blank" rel="noopener"&gt;&lt;strong&gt;ROBOT PLAYS TENNIS WITH HUMANS IN REAL TIME&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The AI that actually makes this work&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Toyota trained the system using human motion data, which is what gives CUE7 its surprisingly natural movement. Rather than looking mechanical, its actions mirror how a person actually moves, and that's by design.&lt;/p&gt;&lt;p&gt;That same combination of &lt;a href="https://www.foxnews.com/tech/chinas-compact-humanoid-robot-shows-off-balance-flips" target="_blank" rel="noopener"&gt;real-time calculation&lt;/a&gt; and learned experience is what lets it handle something like dribbling (fluid, continuous) alongside shooting (precise, calculated) without the two working against each other.&lt;/p&gt;&lt;p&gt;Toyota says testing that kind of learning in a live environment is a key part of the project.&lt;/p&gt;&lt;p&gt;"We believe it is an exceptionally valuable opportunity to validate a reinforcement-learning-based robot in the inherently uncertain environment of a basketball arena," Tomohiro Nomi, Head of Humanoid Robotics Research Unit, Frontier Research Center, Toyota Motor Corporation, told CyberGuy. "Moving forward, we will continue developing robots that inspire and bring joy to people."&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What this means to you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;You're probably not buying a robot basketball player anytime soon. But here's the part worth paying attention to: the same AI that helps CUE7 sink free throws is the technology Toyota is actively &lt;a href="https://www.foxnews.com/category/us/economy/manufacturing" target="_blank" rel="noopener"&gt;developing for manufacturing,&lt;/a&gt; automotive systems and real-world robotics.&lt;/p&gt;&lt;p&gt;Basketball demands everything that manufacturing robots struggle with: target identification, distance gauging, trajectory computation, coordinated movement and precise force control, all in sequence and under pressure. Toyota chose basketball specifically because it tests all those capabilities at once, in an environment where success and failure are completely obvious.&lt;/p&gt;&lt;p&gt;The reinforcement learning powering CUE7 could eventually show up in &lt;a href="https://www.foxnews.com/tech/humanoid-robots-handle-quality-checks-assembly-auto-plant" target="_blank" rel="noopener"&gt;factory robots that adapt&lt;/a&gt; mid-shift when production requirements change, in vehicles that handle unexpected road conditions more fluidly, or in home and care robots that need to navigate unpredictable environments. Toyota treats CUE7 as a testbed for vision systems, motion control and coordinated movement, with capabilities that reach well beyond halftime demonstrations into broader real-world applications.&lt;/p&gt;&lt;p&gt;When Toyota teaches a robot to play basketball, it's really teaching machines how to learn. And that skill transfers. In other words, this is less about basketball and more about teaching machines how to learn physical skills in unpredictable environments. That is where the real impact starts to show up.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/new-robot-could-make-chores-thing-past" target="_blank" rel="noopener"&gt;&lt;strong&gt;THE NEW ROBOT THAT COULD MAKE CHORES A THING OF THE PAST&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways &lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The CUE7 is a fascinating piece of technology, but the real story isn't about basketball. It's about a fundamental shift in how robots are trained, moving away from rigid human programming toward AI systems that learn through experience and adapt on the fly. What started as a voluntary employee side project in 2017 has grown into a genuine proving ground for Toyota's embodied AI research. Nearly a decade in, the results are landing in front of thousands of live spectators and stacking up Guinness World Records along the way. The CUE7 made a free throw at halftime in front of a packed arena. More importantly, it demonstrated that AI-powered machines can now acquire complex physical skills through trial and error, the same basic way humans do. That's a shift with implications that reach far beyond the basketball court.&lt;/p&gt;&lt;p&gt;If a robot can teach itself to make free throws better than most humans ever will, purely through AI-driven trial and error, what physical skill do you still believe machines will never be able to learn on their own? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/toyota-basketball-robot-1.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">d83f3af6-6df1-56e2-8f0d-b6447332d078</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/auto/make/toyota</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/innovation</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
            <category domain="foxnews.com/taxonomy">fox-news/sports/nba</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/robots</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/forefront-of-innovation</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Thu, 23 Apr 2026 08:03:25 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/booking-com-data-breach-exposes-traveler-data-scams</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/booking-com-data-breach-exposes-traveler-data-scams</guid>
            <title>Booking.com data breach exposes traveler data to scams</title>
            <description>Stolen Booking.com data may be used in scams. Here's how to protect your data</description>
            <content:encoded>&lt;p&gt;You probably didn't expect a &lt;a href="https://www.foxnews.com/category/travel" target="_blank" rel="noopener"&gt;travel booking platform&lt;/a&gt; to send you into a security spiral. Yet here we are.&lt;/p&gt;&lt;p&gt;Booking.com confirmed that &lt;a href="https://www.foxnews.com/category/tech/topics/hackers" target="_blank" rel="noopener"&gt;hackers may have accessed customer data,&lt;/a&gt; including names, email addresses, phone numbers and booking details. That is enough information to make scam messages look real.&lt;/p&gt;&lt;p&gt;If you've booked a hotel or rental through the platform, this is worth your attention.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/smart-travel-safety-tips-before-your-next-trip" target="_blank" rel="noopener"&gt;&lt;strong&gt;SMART TRAVEL SAFETY TIPS BEFORE YOUR NEXT TRIP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What happened in the Booking.com data breach&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The company sent &lt;a href="https://www.foxnews.com/category/tech/technologies/email" target="_blank" rel="noopener"&gt;email notifications&lt;/a&gt; to affected customers after detecting "suspicious activity involving unauthorized third parties" accessing guest booking information. That's the corporate way of saying someone got in who shouldn't have been there.&lt;/p&gt;&lt;p&gt;One user shared the full notification on Reddit, where dozens of others said they received the same message. That suggests this was not an isolated case. The notice warned that anything customers "may have shared with the accommodation" could also have been exposed, meaning the breach went beyond basic account data.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What data was exposed in the Booking.com breach&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Booking.com confirmed that &lt;a href="https://www.foxnews.com/tech/banking-tech-data-breach-exposes-672k-ransomware-attack" target="_blank" rel="noopener"&gt;financial information was not accessed&lt;/a&gt;. Physical home addresses were also not part of the breach, according to the company. So no, someone doesn't have your credit card number or home address from this incident.&lt;/p&gt;&lt;p&gt;What they do potentially have: your name, email address, phone number and the details of your reservation. That's enough to craft a &lt;a href="https://www.foxnews.com/tech/new-fbi-warning-reveals-phishing-attacks-hitting-private-chats" target="_blank" rel="noopener noreferrer nofollow"&gt;&lt;u&gt;convincing phishing message&lt;/u&gt;&lt;/a&gt;, which some hackers may already be doing.&lt;/p&gt;&lt;p&gt;"At Booking.com, we are dedicated to the security and data protection of our guests," a Booking.com spokesperson said in a statement to CyberGuy. "We recently noticed some suspicious activity involving unauthorized third parties being able to access some of our guests' booking information, which may include booking details, names, email addresses and phone numbers and anything that travelers may have shared with the accommodation."&lt;/p&gt;&lt;p&gt;"Financial information was not accessed from Booking.com's systems, nor were guests' physical addresses," the spokesperson continued. "Upon discovering the activity, we took action to contain the issue. We have updated the PIN number for these reservations and informed our guests."&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/apple-now-lets-you-add-your-passport-your-phones-wallet" target="_blank" rel="noopener"&gt;&lt;strong&gt;APPLE NOW LETS YOU ADD YOUR PASSPORT TO YOUR PHONE'S WALLET&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How scammers are using stolen booking data&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;A user who posted the notification on Reddit said that two weeks before receiving it, they got a phishing message on WhatsApp that included their real booking details and personal information. That timing matters. It suggests hackers may have already been using the data before many customers were notified.&lt;/p&gt;&lt;p&gt;It is not clear whether that earlier phishing attempt is directly tied to this specific breach, but it shows how detailed booking information can be used in targeted scams.&lt;/p&gt;&lt;p&gt;That is what makes this breach more dangerous than it first appears. When scammers know where you are staying and when, they can create messages that feel legitimate. A fake alert about a problem with your reservation or a request to confirm payment details suddenly looks real.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How past incidents highlight potential risks&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This breach did not happen in a vacuum. In 2024, hackers infected computers at &lt;a href="https://www.foxnews.com/category/travel/general/hotels" target="_blank" rel="noopener"&gt;multiple hotels&lt;/a&gt; with a type of consumer-grade spyware known as stalkerware. In one documented case, a hotel employee was logged into their Booking.com admin portal when the software captured a screenshot of the screen, exposing visible customer data.&lt;/p&gt;&lt;p&gt;That detail points to a broader issue. In some cases, vulnerabilities may exist not just within a platform, but across the hotels and systems connected to it. The current breach may follow a similar pattern, though the company has not confirmed how the unauthorized access occurred.&lt;/p&gt;&lt;p&gt;To put the scale in context, Booking.com says 6.8 billion bookings have been made through the platform since 2010. Even a small percentage of affected users represents a large number of people.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/new-fbi-warning-reveals-phishing-attacks-hitting-private-chats" target="_blank" rel="noopener"&gt;&lt;strong&gt;NEW FBI WARNING REVEALS PHISHING ATTACKS HITTING PRIVATE CHATS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Ways to stay safe after the Booking.com breach&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;You don't have to &lt;a href="https://www.foxnews.com/tech/how-minimize-your-digital-footprint-when-you-travel" target="_blank" rel="noopener"&gt;swear off travel apps&lt;/a&gt; to protect yourself. A few targeted steps go a long way.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Check for an official notification&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Check your email for a message from Booking.com. If you received one, take it seriously rather than filing it away. The company says it has updated PINs for affected reservations, but your account itself may still need attention.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Update your password now&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Change your Booking.com password, especially if you reuse it anywhere else. &lt;a href="https://www.foxnews.com/tech/200-million-social-media-records-leaked-major-x-data-breach" target="_blank" rel="noopener"&gt;Credential stuffing attacks are&lt;/a&gt; common after breaches, and reused passwords make it easy for hackers to break into other accounts. A password manager can help you create and store strong, unique passwords so you are not relying on the same one across multiple sites.&lt;strong&gt; Check out the best expert-reviewed password managers of 2026 at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Turn on two-factor authentication&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Enable two-factor authentication (&lt;a href="https://www.foxnews.com/tech/what-two-factor-authentication-should-enable-it" target="_blank" rel="noopener noreferrer nofollow"&gt;&lt;u&gt;2FA&lt;/u&gt;&lt;/a&gt;) if you haven't already. It adds a step, but it also blocks access even if someone has your password.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Consider identity theft protection&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Even though financial data was not accessed, exposed personal details can still be used in scams or identity theft attempts. An identity protection service can monitor your information, alert you to suspicious activity and provide support if your identity is compromised. &lt;strong&gt;See my tips and best picks on Best Identity Theft Protection at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Watch for highly targeted phishing messages&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Be skeptical of any message that references your booking details, whether it arrives by email, text or WhatsApp. Legitimate companies rarely ask you to click a link and re-enter payment information. Hackers with your booking data can write convincing fakes that look urgent.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) Verify bookings through official channels&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If you get a message about your reservation, do not click the link. Open the Booking.com app or type the website address manually. You can also contact the hotel directly using the number listed on its official website.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Add a safety net in case you click something malicious&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If you accidentally click a suspicious link, strong antivirus software can help detect malicious websites or downloads before they cause damage. Look for tools that offer real-time protection and phishing detection, not just basic virus scans. &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp; iOS devices at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;8) Limit how your personal data is exposed online&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Data brokers collect and sell personal details like your phone number and email address. That makes it easier for scammers to &lt;a href="https://www.foxnews.com/tech/1-billion-identity-records-exposed-id-verification-data-leak" target="_blank" rel="noopener"&gt;connect stolen booking data&lt;/a&gt; to a real person. Removing your information from these sites with a data removal service can reduce how often you are targeted. &lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;9) Report anything suspicious quickly&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If you receive a phishing attempt that includes your real reservation details, contact Booking.com directly and report the message to your phone carrier or email provider. Reporting helps shut down scams faster.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Data breaches at major travel platforms are uncomfortable precisely because travel feels personal. Your itinerary, your accommodation and your plans are wrapped up in those booking details, and now someone else may have a copy. The good news is that financial information and home addresses were not part of this breach. The bad news is that the stolen data is detailed enough to be weaponized in targeted phishing attacks, and there's evidence that it already has been. Booking.com updated its customers, reset PINs for affected reservations and publicly confirmed the incident. That's more transparency than many companies offer. But the fact that users were receiving phishing messages on WhatsApp two weeks before the formal notification went out is worth sitting with. You can't control whether the platform you use gets breached. You can control whether you're an easy target once your data is out there.&lt;/p&gt;&lt;p&gt;How much responsibility should companies like Booking.com take when your personal data fuels scams? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 &lt;a href="http://CyberGuy.com" target="_blank" rel="noopener noreferrer nofollow"&gt;CyberGuy.com&lt;/a&gt;. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/booking-com-data-breach-1.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">9351d18d-4c41-5b13-a7d3-bfeb9938072a</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
            <category domain="foxnews.com/taxonomy">fox-news/travel/general/hotels</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Wed, 22 Apr 2026 18:30:52 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/robots-beat-humans-half-marathon</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/robots-beat-humans-half-marathon</guid>
            <title>Robots beat humans in half marathon</title>
            <description>Humanoid runners smash records and hint at what comes next</description>
            <content:encoded>&lt;p&gt;At the end of a &lt;a href="https://www.foxnews.com/category/sports/running" target="_blank" rel="noopener"&gt;half-marathon&lt;/a&gt;, runners are usually wiped out. That part looked normal in Beijing. What didn't look so normal was who crossed the finish line first — a humanoid robot named Lightning.&lt;/p&gt;&lt;p&gt;While people slowed down and tried to catch their breath, the &lt;a href="https://www.foxnews.com/category/tech/technologies/robots" target="_blank" rel="noopener"&gt;robots&lt;/a&gt; just stood there like nothing happened. No sweat. No fatigue.&lt;/p&gt;&lt;p&gt;And the gap was not small. The winning robot, built by Honor, finished in 50 minutes and 26 seconds. That beat the current human world record set by Jacob Kiplimo, who finished in 57 minutes and 20 seconds.&lt;/p&gt;&lt;p&gt;That is not a small improvement. It is a big jump.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/how-432-robots-relocating-7500-ton-historic-building" target="_blank" rel="noopener"&gt;&lt;strong&gt;HOW 432 ROBOTS ARE RELOCATING A 7,500-TON HISTORIC BUILDING&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;&lt;strong&gt;How humanoid robots went from struggling to record-breaking&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This year tells a different story. Nearly half of the &lt;a href="https://www.foxnews.com/tech/autonomous-humanoid-robot-soccer-debuts-china" target="_blank" rel="noopener"&gt;robots ran autonomously&lt;/a&gt;. No joystick. No remote operator guiding every step. They navigated the course on their own while running alongside human participants.&lt;/p&gt;&lt;p&gt;The event included &lt;a href="https://www.foxnews.com/tech/china-robotics-giant-puts-200-robots-test" target="_blank" rel="noopener"&gt;more than 100 robot teams&lt;/a&gt; from 13 provinces, alongside about 12,000 human runners, showing how quickly this space is growing.&lt;/p&gt;&lt;p&gt;What matters more than the finish time is how they did it. Autonomy means these machines are starting to make real-time decisions in the real world. That is the same kind of challenge they would face in factories, warehouses or even homes. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why these humanoid robots are so fast&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The winning robot, nicknamed Lightning, was engineered with a clear goal. Engineers gave it long legs designed to mimic elite human runners. The stride length and cadence were tuned for efficiency over distance.&lt;/p&gt;&lt;p&gt;They also borrowed technology from &lt;a href="https://www.foxnews.com/category/tech/technologies/smartphones" target="_blank" rel="noopener"&gt;smartphones&lt;/a&gt;, including liquid cooling systems. That helped prevent overheating during sustained high-speed movement.&lt;/p&gt;&lt;p&gt;Sensors and onboard computing allowed the robot to adjust its &lt;a href="https://www.foxnews.com/tech/chinas-compact-humanoid-robot-shows-off-balance-flips" target="_blank" rel="noopener"&gt;balance and path in&lt;/a&gt; real time. That is a big deal. Running is controlled falling. Doing that at speed without crashing requires constant correction.&lt;/p&gt;&lt;p&gt;According to the engineers behind the project, the real goal is not racing. It is stress-testing systems. If a robot can run 13.1 miles at high speed without failing, it can likely handle long shifts in industrial settings without breaking down.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What the robot companies are actually saying&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The teams behind these machines are not claiming robots will replace marathon runners. That would miss the point. Instead, they see events like this as a proving ground.&lt;/p&gt;&lt;p&gt;Engineers involved in the project say improvements in movement, cooling and structural durability will carry over into real-world uses. That includes &lt;a href="https://www.foxnews.com/tech/robots-coming-mcdonalds-near-you" target="_blank" rel="noopener"&gt;manufacturing, logistics and potentially&lt;/a&gt; service roles.&lt;/p&gt;&lt;p&gt;In other words, the race is a demo. The real product is reliability. And reliability is what makes robots useful where people actually need them.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why humanoid robots still struggle in real-world situations&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;For all the headlines, this was not flawless. &lt;a href="https://www.foxnews.com/tech/humanoid-robot-malfunctions-sparks-viral-panic" target="_blank" rel="noopener"&gt;One robot fell at&lt;/a&gt; the start. Another collided with a barrier. Those moments matter.&lt;/p&gt;&lt;p&gt;They show that even with record-breaking speed, humanoid robots still struggle with unexpected situations. Unexpected obstacles, sudden changes or minor errors can still cause failure.&lt;/p&gt;&lt;p&gt;That gap between peak performance and consistent performance is where humans still have an edge. For now.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why this humanoid robot half-marathon is bigger than a race&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;It is easy to dismiss a robot race as a stunt. That would be a mistake. Running combines balance, endurance, decision-making and energy management. If robots are improving this quickly in one of the hardest physical tasks, progress in simpler tasks will move even faster.&lt;/p&gt;&lt;p&gt;We are already seeing robots carry groceries, assist in kitchens and handle repetitive cleaning tasks. Add mobility and endurance at this level, and their usefulness expands quickly.&lt;/p&gt;&lt;p&gt;This is how adoption happens. Quiet improvements, then sudden capability jumps that feel overnight.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What this means to you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;You are not about to get outrun by a robot at your local 5K. But you are getting closer to a world where robots show up in more parts of your daily life.&lt;/p&gt;&lt;p&gt;Expect to see them in warehouses first, then in customer-facing roles where consistency matters more than personality. Over time, costs will drop, and capabilities will improve.&lt;/p&gt;&lt;p&gt;That affects jobs, convenience and even how services are delivered.&lt;/p&gt;&lt;p&gt;It also raises questions about safety, oversight and how much autonomy we are comfortable giving machines.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/job-killing-robot-learns-work-its-coming-factory-floor" target="_blank" rel="noopener"&gt;&lt;strong&gt;JOB-KILLING ROBOT LEARNS AT WORK, AND IT’S COMING TO THE FACTORY FLOOR&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;A robot winning a half-marathon sounds like clickbait. But it is also a sign of where things are headed. Not because robots are faster, but because they are starting to run on their own in the real world. That is when this stops being interesting and starts becoming something you feel in your everyday life. Are you ready for a world where this is normal?&lt;/p&gt;&lt;p&gt;If robots keep improving at this pace, where do you draw the line between helpful automation and something that starts to replace too much of what humans do? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt; &lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.  &lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/Robots-beat-humans-in-half-marathon-1.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">ced72ac0-d846-59a5-b6a0-e48ba1b3fee1</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/health/orthopedics/technology</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/smartphones</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/innovation</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/robots</category>
            <category domain="foxnews.com/taxonomy">fox-news/sports/running</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/forefront-of-innovation</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Wed, 22 Apr 2026 14:29:54 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/michael-susan-dell-surpass-1-billion-donations-backing-ai-driven-hospital-project</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/michael-susan-dell-surpass-1-billion-donations-backing-ai-driven-hospital-project</guid>
            <title>Michael and Susan Dell surpass $1 billion in donations backing AI-driven hospital project</title>
            <description>The couple's latest $750M gift will help build an 'AI-native' hospital expected to open in 2030</description>
            <content:encoded>&lt;p&gt;Billionaire Michael Dell and his wife, Susan Dell, have become the first donors to give more than $1 billion to the &lt;a href="https://www.foxnews.com/category/us/us-regions/southwest/texas" target="_blank" rel="noopener"&gt;University of Texas at Austin&lt;/a&gt;, funding a massive new medical research campus and hospital system powered by artificial intelligence.&lt;/p&gt;&lt;p&gt;The couple’s latest investment includes a $750 million gift to help build the UT Dell Medical Center, a planned "AI-native" hospital expected to open in 2030 as part of a more than 300-acre advanced research campus.&lt;/p&gt;&lt;p&gt;University officials said the project will integrate research, clinical care and advanced computing to improve early disease detection, personalize treatment and expand access to care in the rapidly growing Austin region.&lt;/p&gt;&lt;p&gt;The Dells’ support builds on decades of contributions to UT, including funding for its medical school, scholarships and research programs.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/politics/exclusive-republicans-key-red-state-launch-campaign-elect-true-conservatives-ahead-trump-return" target="_blank" rel="noopener"&gt;&lt;strong&gt;EXCLUSIVE: REPUBLICANS IN KEY RED STATE LAUNCH CAMPAIGN TO ELECT ‘TRUE’ CONSERVATIVES AHEAD OF TRUMP RETURN&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;"By bringing together medicine, &lt;a href="https://www.foxnews.com/category/science" target="_blank" rel="noopener"&gt;science&lt;/a&gt; and computing in one campus designed for the AI era, UT can create more opportunity, deliver better outcomes, and build a stronger future for communities across Texas and beyond," Michael Dell and Susan Dell said.&lt;/p&gt;&lt;p&gt;The gift ranks among the largest in the history of &lt;a href="https://www.foxnews.com/category/us/education/college" target="_blank" rel="noopener"&gt;higher education&lt;/a&gt;, alongside major contributions like Phil Knight’s $2 billion pledge to Oregon Health &amp; Science University and Michael Bloomberg’s $1.8 billion donation to Johns Hopkins University.&lt;/p&gt;&lt;p&gt;The new UT Dell Medical Center will be developed in collaboration with MD Anderson &lt;a href="https://www.foxnews.com/category/health/cancer" target="_blank" rel="noopener"&gt;Cancer&lt;/a&gt; Center, integrating cancer care into a system designed to connect prevention, diagnosis and treatment.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/us/ai-running-classroom-texas-school-students-say-its-awesome" target="_blank" rel="noopener"&gt;&lt;strong&gt;AI IS RUNNING THE CLASSROOM AT THIS TEXAS SCHOOL, AND STUDENTS SAY 'IT'S AWESOME'&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;"We will deliver better outcomes for patients by providing research-driven cancer care that is precise, compassionate and hope-filled," Peter WT Pisters, president of UT MD Anderson, said.&lt;/p&gt;&lt;p&gt;Officials said the facility will be built from the ground up to incorporate AI, rather than retrofitting older infrastructure — an approach they say could transform how hospitals operate.&lt;/p&gt;&lt;p&gt;Independent experts have cautioned that AI in health care can introduce risks if not carefully validated. A widely cited &lt;a href="https://www.science.org/doi/10.1126/science.aax2342?__cf_chl_tk=leOfgpSzU06laXYkoLUnFPubYCiLfil.00h7z9O2jJU-1776824385-1.0.1.1-cQtudsCEUEXQ6w4eSd2xNWFcWJCxLtZGe1_VLhTWVvI" target="_blank" rel="nofollow noopener"&gt;study published in the journal Science&lt;/a&gt; by researchers at the University of California, Berkeley and the University of Chicago found that a commonly used healthcare algorithm underestimated the needs of Black patients due to biased training data, highlighting broader concerns about equity in AI-driven systems.&lt;/p&gt;&lt;p&gt;The project also includes funding for undergraduate scholarships, student housing and the &lt;a href="https://www.foxnews.com/tech/meta-builds-worlds-largest-ai-superclusters-future" target="_blank" rel="noopener"&gt;Texas Advanced Computing Center&lt;/a&gt;, where officials are developing one of the nation’s most powerful academic supercomputers.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/politics/turning-point-usa-backs-trump-accounts-program-dollar-for-dollar-match-eligible-employee-newborns" target="_blank" rel="noopener"&gt;&lt;strong&gt;TURNING POINT USA BACKS TRUMP ACCOUNTS PROGRAM WITH 'DOLLAR-FOR-DOLLAR MATCH' FOR ELIGIBLE EMPLOYEE NEWBORNS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Texas Gov. &lt;a href="https://www.foxnews.com/category/person/greg-abbott" target="_blank" rel="noopener"&gt;Greg Abbott&lt;/a&gt; said the investment will help position the state as a national leader in healthcare innovation.&lt;/p&gt;&lt;p&gt;"Texas already dominates in technology, energy and business, and now we will further cement our leadership in health care innovation as well," Abbott said.&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The university said it plans to break ground on the medical center later this year and has launched a broader campaign to raise $10 billion over the next decade.&lt;/p&gt;&lt;p&gt;&lt;i&gt;The Associated Press contributed to this report.&lt;/i&gt;&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/michael-dell-1b-ut-austin-ai-hospital-campus-001.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">4d5096c6-898d-50bf-8b02-8380299b08dc</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
            <category domain="foxnews.com/taxonomy">fox-news/us/austin</category>
            <category domain="foxnews.com/taxonomy">fox-news/us/us-regions/southwest/texas</category>
            <category domain="foxnews.com/taxonomy">fox-news/health/medical-research</category>
            <category domain="foxnews.com/taxonomy">fox-news/health/orthopedics/technology</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Tue, 21 Apr 2026 22:35:52 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/fake-windows-update-installs-hidden-malware</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/fake-windows-update-installs-hidden-malware</guid>
            <title>Fake Windows update installs hidden malware</title>
            <description>A convincing Microsoft lookalike site is slipping past users and security tools</description>
            <content:encoded>&lt;p&gt;If you've ever clicked &lt;a href="https://www.foxnews.com/category/tech/technologies/windows-os" target="_blank" rel="noopener"&gt;"Check for updates"&lt;/a&gt; and trusted what you saw, you're not alone. That's exactly what this latest scam is counting on.&lt;/p&gt;&lt;p&gt;The page mimics official branding, includes a believable knowledge base number and presents a big blue download button that feels familiar.&lt;/p&gt;&lt;p&gt;The catch? The download installs &lt;a href="https://www.foxnews.com/category/tech/topics/cybercrime" target="_blank" rel="noopener"&gt;malware designed to steal passwords,&lt;/a&gt; payment details and account access.&lt;/p&gt;&lt;p&gt;According to researchers at Malwarebytes Labs, a cybersecurity research and threat intelligence team inside Malwarebytes, the site uses a typosquatted domain that looks close enough to a real Microsoft URL to fool a quick glance. That small trick is often all it takes.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/apple-app-password-scam-email-warning" target="_blank" rel="noopener"&gt;&lt;strong&gt;APPLE APP PASSWORD SCAM EMAIL WARNING&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join. &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;&lt;strong&gt;Why this fake Windows update malware slips past detection&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;At first glance, nothing seems off. The file looks like a standard Windows installer. It even lists "Microsoft" in its properties. That's where this attack gets clever. Instead of using obvious malicious code, the attackers built the installer with legitimate tools and layered the attack in stages. Each piece looks harmless on its own.&lt;/p&gt;&lt;p&gt;Here's what's happening behind the scenes:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;The installer launches what appears to be a normal app&lt;/li&gt;&lt;li&gt;That app quietly runs hidden scripts&lt;/li&gt;&lt;li&gt;A disguised process loads a full Python environment&lt;/li&gt;&lt;li&gt;Data theft tools activate in the background&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Because each step looks routine, many &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;security tools&lt;/a&gt; fail to flag it right away. Researchers also noted that antivirus engines initially showed zero detections for key parts of the attack. That does not mean the file is safe. It means the malicious behavior is well hidden.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What this fake Windows update malware is stealing&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Once installed, the malware gets to work fast. It collects details about the infected device, including location and IP address. Then it reaches out to remote servers to receive instructions and upload stolen data.&lt;/p&gt;&lt;p&gt;The targets include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Saved browser passwords&lt;/li&gt;&lt;li&gt;Login sessions and cookies&lt;/li&gt;&lt;li&gt;Payment details&lt;/li&gt;&lt;li&gt;Discord account tokens&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;It even tries to shut down other processes on your system to avoid interference while it works. In some cases, it modifies apps like Discord to intercept account activity in real time.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How the fake Windows update malware stays on your system&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This malware is designed to stick around. It creates entries that look like normal system processes, so they blend in. One registry entry mimics Windows Security Health, which most users would ignore. It also drops a shortcut in your startup folder with a &lt;a href="https://www.foxnews.com/category/tech/companies/spotify" target="_blank" rel="noopener"&gt;familiar name like Spotify.&lt;/a&gt; That makes it easy to overlook. Two different persistence tricks mean it can survive a reboot and keep running.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/fake-windows-update-pushes-malware-new-clickfix-attack" target="_blank" rel="noopener"&gt;&lt;strong&gt;FAKE WINDOWS UPDATE PUSHES MALWARE IN NEW CLICKFIX ATTACK&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why this fake Windows update scam feels so real&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;There's a bigger trend behind this. Researchers say campaigns like this often target regions where large data breaches have already &lt;a href="https://www.foxnews.com/category/us/personal-freedoms/privacy" target="_blank" rel="noopener"&gt;exposed personal information.&lt;/a&gt; When attackers already know your name, provider or habits, they can build scams that feel tailored to you. That makes a fake Windows update page far more believable than a generic phishing email.&lt;/p&gt;&lt;p&gt;It also highlights something important. Today's malware often hides inside legitimate tools and trusted frameworks. That makes it harder to detect and easier to trust. This campaign shows how far scammers have come. They are no longer relying on sloppy emails or obvious fake links. Instead, they are building layered attacks that look and behave like trusted software.&lt;/p&gt;&lt;p&gt;Even experienced users can get caught off guard when everything appears normal. The biggest takeaway is simple. A clean scan result or a familiar interface does not guarantee safety.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Microsoft says it's aware of the threat&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/category/tech/companies/microsoft" target="_blank" rel="noopener"&gt;Microsoft confirmed&lt;/a&gt; it is tracking this type of activity and urges users to be cautious when downloading updates from unfamiliar sources. &lt;/p&gt;&lt;p&gt;"We are aware of reports of fraudulent websites impersonating Microsoft, and we actively work to detect and disrupt malicious activity across the internet," A Microsoft spokesperson told CyberGuy. "We encourage customers to be cautious of unexpected prompts or downloads and to verify that they are interacting with legitimate Microsoft domains. As a best practice, we recommend users verify the legitimacy of a link by going directly to our website from your own saved favorite, from a web search, or by typing the domain name yourself."&lt;/p&gt;&lt;p&gt;For more guidance on how to protect against online phishing scams, you can refer to Microsoft's official support page at &lt;i&gt;&lt;strong&gt;&lt;u&gt;support.microsoft.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/microsoft-crosses-privacy-line-few-expected" target="_blank" rel="noopener"&gt;&lt;strong&gt;MICROSOFT CROSSES PRIVACY LINE FEW EXPECTED&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Ways to stay safe from fake Windows update malware&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;You don't need to be a security expert to avoid this. A few habits make a big difference.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Only update Windows from your settings&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Go to &lt;strong&gt;Settings&lt;/strong&gt; &gt;&lt;strong&gt; Windows Update&lt;/strong&gt; and check for &lt;strong&gt;updates&lt;/strong&gt; there. Avoid downloading updates from websites. &lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Double-check the URL&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Real Microsoft pages use microsoft.com. Anything else, even if it looks close, should raise a red flag.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Be cautious with urgent update prompts&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If a site or message pressures you to install an update, stop and verify it manually. &lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Use strong antivirus software with behavior detection&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Traditional antivirus software, which often comes built into your device or as basic security software, mainly looks for known threats using signature matching, which means it can miss new or well-hidden attacks like this one. Strong antivirus software uses behavior detection to monitor what programs are doing in real time, helping flag suspicious activity even if the malware hasn't been seen before.  &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp; iOS devices at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Use a data removal service to limit your exposure&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If your personal information is already circulating online from past breaches, it can make scams like this more convincing. A data removal service helps reduce how much of your information is publicly available, making it harder for attackers to target you with tailored phishing attempts. &lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) Turn on two-factor authentication&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Two-factor authentication (&lt;a href="https://www.foxnews.com/tech/what-two-factor-authentication-should-enable-it"&gt;&lt;u&gt;2FA&lt;/u&gt;&lt;/a&gt;) adds a second layer of protection if your passwords are stolen.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Avoid downloading installer files from unknown sites&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Legitimate updates rarely require manual downloads. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Fake updates are one of the most effective tricks because they tap into something we all trust. Keeping your system secure should not put you at risk, yet that's exactly what attackers are exploiting here. The safest move is to slow down, verify where updates come from and stick to built-in tools whenever possible.&lt;/p&gt;&lt;p&gt;Are tech companies doing enough to keep fake updates from putting your data at risk? Let us know your thoughts in the comments below. Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/fake-windows-update-malware.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">cc6f1616-0000-52fa-b806-31fbf2bc4d64</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/microsoft</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/windows-os</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Tue, 21 Apr 2026 12:30:04 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/alexa-lets-you-order-food-like-real-conversation</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/alexa-lets-you-order-food-like-real-conversation</guid>
            <title>Alexa+ lets you order food like a real conversation</title>
            <description>Amazon brings voice ordering to Uber Eats and Grubhub</description>
            <content:encoded>&lt;p&gt;You're hungry, and your stomach's already growling. Normally, you'd grab your phone, open your favorite delivery app and start scrolling through &lt;a href="https://www.foxnews.com/category/food-drink/food/restaurants" target="_blank" rel="noopener"&gt;endless restaurant lists.&lt;/a&gt; Tap a few menus, pick a few items and before you know it, you've built your order piece by piece.&lt;/p&gt;&lt;p&gt;But with &lt;a href="https://www.foxnews.com/category/tech/companies/amazon" target="_blank" rel="noopener"&gt;Amazon Alexa+,&lt;/a&gt; you can skip all that tapping and scrolling. Just tell Alexa what you're in the mood for, change your mind halfway or add something extra as you go, like you're chatting with someone taking your order.&lt;/p&gt;&lt;p&gt;That's the new idea behind Alexa+. Amazon has rolled out a voice-powered food ordering feature that lets you get delivery from Uber Eats and Grubhub without ever opening an app. Just say what you want, and Alexa handles the rest. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/alexa-com-brings-alexa-your-browser" target="_blank" rel="noopener"&gt;&lt;strong&gt;ALEXA.COM BRINGS ALEXA+ TO YOUR BROWSER&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What you need to use Alexa+&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Now, before you start ordering with your voice, there are a few quick setup steps.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;You need an &lt;strong&gt;Alexa+ compatible device&lt;/strong&gt;, like an Echo Show&lt;/li&gt;&lt;li&gt;You must link your &lt;strong&gt;Uber Eats or Grubhub accoun&lt;/strong&gt;t in the &lt;strong&gt;Alexa app&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Your &lt;strong&gt;past orders&lt;/strong&gt; can sync automatically for quick reordering&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Once that's done, it becomes a &lt;a href="https://www.foxnews.com/category/tech/topics/innovation" target="_blank" rel="noopener"&gt;hands-free experience.&lt;/a&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How to set up Alexa+ for food ordering (step by step)&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;We set this up using the Amazon Alexa app on a phone, and these are the exact steps we followed. The menus may look slightly different depending on your device.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open the &lt;strong&gt;Alexa app&lt;/strong&gt; on your phone&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;"More" &lt;/strong&gt;(it usually has three horizontal lines)&lt;/li&gt;&lt;li&gt;Tap&lt;strong&gt; "Alexa+ Store"&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Use the &lt;strong&gt;search bar&lt;/strong&gt; and type in &lt;strong&gt;Uber&lt;/strong&gt; or &lt;strong&gt;Grubhub.&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap the &lt;strong&gt;service&lt;/strong&gt; you want&lt;/li&gt;&lt;li&gt;When it appears, tap to&lt;strong&gt; open it.&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;"Connect" &lt;/strong&gt;or&lt;strong&gt; "Enable" &lt;/strong&gt;(You may see a page from "pitangui.amazon.com" during setup. That's part of Amazon's system and is safe if you open it from the Alexa app. )&lt;/li&gt;&lt;li&gt;Next&lt;strong&gt;, sign in&lt;/strong&gt; to your account on your phone&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;"Grant access"&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;"Continue"&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;"Close"&lt;/strong&gt; to return to the app&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;After we linked our Grubhub account, we got a confirmation email saying everything was successfully connected. Once that's all done, it becomes a hands-free experience.&lt;/p&gt;&lt;p&gt;To actually place an order, go to your Echo device and say, "Alexa, I want to order food," then follow the prompts on the screen. Note: the feature is still rolling out and works best on newer Echo Show devices.&lt;/p&gt;&lt;p&gt;You can also manage or remove the connection anytime in the Alexa app by going to: &lt;strong&gt;Alexa App&lt;/strong&gt; &gt; &lt;strong&gt;Menu &gt; Settings &gt; Manage Alexa+ Services &lt; The service you want to remove &gt; Unlink &amp; Revoke Permissions &lt;/strong&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How Alexa+ actually builds your order&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;After you're set up, this is where things start to change. For years, voice assistants followed a simple pattern. You ask something. It answers. That's it.&lt;/p&gt;&lt;p&gt;With Amazon Alexa+, that model shifts. Instead of giving one command at a time, you can carry on a back-and-forth conversation.&lt;/p&gt;&lt;p&gt;You might start with:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;"Show me Mexican food"&lt;/li&gt;&lt;li&gt;"Actually, let's do pizza"&lt;/li&gt;&lt;li&gt;"Add a large pepperoni with extra cheese"&lt;/li&gt;&lt;li&gt;"Wait, make that two"&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The system &lt;a href="https://www.foxnews.com/food-drink" target="_blank" rel="noopener"&gt;updates your order&lt;/a&gt; in real time. If you change your mind, it adjusts instantly on screen. Even better, it only jumps in when you need help. That means fewer interruptions and a smoother flow.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/grubhub-confirms-data-breach-amid-extortion-claims" target="_blank" rel="noopener"&gt;&lt;strong&gt;GRUBHUB CONFIRMS DATA BREACH AMID EXTORTION CLAIMS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How Alexa+ lets you customize your order&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This is where things start to feel different from anything we've seen before.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;You can explore like you're talking to a person&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;You don't need exact menu names. Say something like "meat lovers pizza," and Alexa+ finds the closest match. Want dessert? Just ask. Curious what's popular? Ask that too.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;You can change your mind mid-order&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/category/tech/technologies/apps" target="_blank" rel="noopener"&gt;Most apps&lt;/a&gt; make you backtrack. Alexa+ lets you pivot on the fly. Add items. Remove them. Adjust quantities. Switch restaurants entirely. Everything updates live on your screen.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;You see the full breakdown before you pay&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Before checkout, you'll get a clear summary:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Item names&lt;/li&gt;&lt;li&gt;Quantities&lt;/li&gt;&lt;li&gt;Individual prices&lt;/li&gt;&lt;li&gt;Total cost&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;That transparency matters, especially when small add-ons can quickly add up.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;You can track your delivery with your voice&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Once your order is placed, you can simply ask:&lt;/p&gt;&lt;p&gt;"Alexa, where's my food?"&lt;/p&gt;&lt;p&gt;No need to dig through notifications or open another app.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why Amazon is pushing Alexa+ now&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This isn't just about food delivery. Amazon is testing a bigger idea. It wants Alexa+ to adapt based on what you're trying to do. Ordering food needs flexibility. Checking the weather doesn't. So instead of one rigid interaction style, Alexa+ shifts its behavior depending on the task. Food ordering is just the beginning. Amazon is already hinting at future uses like grocery shopping and travel planning.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxbusiness.com/technology/grubhub-launches-first-ever-commercial-drone-food-delivery-service-new-jersey" target="_blank" rel="noopener"&gt;&lt;strong&gt;GRUBHUB LAUNCHES FIRST-EVER COMMERCIAL DRONE FOOD DELIVERY SERVICE IN NEW JERSEY&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What this means to you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This feature sounds convenient, and in many ways it is. Still, there are a few things worth thinking about before you start ordering dinner out loud. First, it makes ordering easier. That's great for speed, but it can also make spending feel effortless. When ordering becomes a conversation, it's easy to keep adding items without paying attention to the total. Second, &lt;a href="https://www.foxnews.com/category/tech/topics/privacy" target="_blank" rel="noopener"&gt;your data matters.&lt;/a&gt; Linking accounts means Amazon can connect your voice activity with your food habits. That includes what you order, when you order and how often. Third, it changes how you interact with technology. Instead of tapping and scrolling, you're relying on AI to interpret what you mean. That saves time, but it also means trusting the system to get things right. Finally, it may reshape your habits. If this becomes second nature, opening apps could start to feel old-fashioned before long.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Ordering food has always been simple. Now it's becoming conversational. That shift might sound small, but it signals something bigger. Technology is moving away from commands and toward natural interaction. The goal is to make devices feel less like tools and more like assistants. The real question is how far that goes. If your device can handle dinner tonight, what else will it manage tomorrow?&lt;/p&gt;&lt;p&gt;And here's something to think about: At what point does convenience start making decisions for you instead of helping you make them? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; &lt;strong&gt;– &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/boston-food-delivery-e-bike-driver.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">ecc6cecc-8676-548e-a0e0-7c01fbe72047</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/amazon</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/innovation</category>
            <category domain="foxnews.com/taxonomy">fox-news/food-drink/food</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/apps</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/forefront-of-innovation</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Tue, 21 Apr 2026 08:57:03 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/6-crypto-scam-scripts-criminals-use-steal-your-money</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/6-crypto-scam-scripts-criminals-use-steal-your-money</guid>
            <title>6 crypto scam scripts criminals use to steal your money</title>
            <description>Real examples of the messages scammers use to convince people to send cryptocurrency</description>
            <content:encoded>&lt;p&gt;Just about every day, we receive emails from readers who have encountered new scams. Many involve cryptocurrency. The pattern keeps repeating. Someone receives a message that feels urgent, emotional or exciting. The person on the other end sounds confident and persuasive. Before long, the victim is being asked to &lt;a href="https://www.foxbusiness.com/category/cryptocurrency" target="_blank" rel="noopener"&gt;send money through cryptocurrency.&lt;/a&gt; Once the money is sent, it often disappears forever.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/category/tech/topics/cybercrime" target="_blank" rel="noopener"&gt;Cryptocurrency appeals to scammers&lt;/a&gt; for a simple reason. Transactions move quickly, often cross international borders and usually cannot be reversed once completed. That combination makes crypto payments especially attractive to criminals.&lt;/p&gt;&lt;p&gt;Kate recently wrote to us with a great question.&lt;/p&gt;&lt;p&gt;Kate is absolutely right. These scripts are convincing because scammers practice them constantly. They use psychology, urgency and emotion to push people toward quick decisions.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/fake-google-gemini-ai-pushes-google-coin-crypto-scam" target="_blank" rel="noopener"&gt;&lt;strong&gt;FAKE GOOGLE GEMINI AI PUSHES ‘GOOGLE COIN’ CRYPTO SCAM&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Let's break down some of the most common crypto scam scripts, so you know what they sound like before they reach your inbox or phone.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;&lt;strong&gt;The investment opportunity script&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This script often begins with a friendly introduction through social media, email or even a text message.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Example script:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;"Hi, I work with a &lt;/i&gt;&lt;a href="https://www.foxnews.com/category/us/economy/investment" target="_blank" rel="noopener"&gt;&lt;i&gt;private investment group&lt;/i&gt;&lt;/a&gt;&lt;i&gt; that trades cryptocurrency. We've helped many people earn steady returns. If you invest $500 today, you could earn $5,000 within weeks. I can show you proof of other investors' success."&lt;/i&gt;&lt;/p&gt;&lt;p&gt;The scammer may send fake screenshots of profits. Some will even allow a small withdrawal early on to build trust. Eventually, they push the victim to send larger deposits. Once the larger transfer is sent, the account suddenly stops responding.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The romance crypto script&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This scam often starts with a simple message on a dating app, &lt;a href="https://www.foxnews.com/category/tech/companies/facebook" target="_blank" rel="noopener"&gt;Facebook or Instagram.&lt;/a&gt; The first contact is friendly and low-pressure.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Example initial script:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;"Hi, insert name here, I hope you don't mind me saying hello. Your profile caught my attention, and you seem like a very kind person. How has your day been?"&lt;/i&gt;&lt;/p&gt;&lt;p&gt;After a few days of conversation, the scammer begins sharing details about their life. They often claim to work overseas as an engineer, doctor or business owner. Eventually, they mention cryptocurrency trading as something they do on the side.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Later message in the script:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;"I have been doing some short-term crypto trading after work. It has helped me save a lot faster. If you are interested, I can show you the platform I use. It is very easy to start with a small amount."&lt;/i&gt;&lt;/p&gt;&lt;p&gt;From there, the scammer guides the victim to a fake trading site or asks them to transfer cryptocurrency to a wallet they control. At first, the account may show fake profits. The victim believes the investment is working and sends more money. Eventually, the victim cannot withdraw any money. &lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/malicious-mac-extensions-steal-crypto-wallets-passwords" target="_blank" rel="noopener"&gt;&lt;strong&gt;MALICIOUS MAC EXTENSIONS STEAL CRYPTO WALLETS AND PASSWORDS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The government impersonation script&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Scammers often pretend to represent government agencies or law enforcement.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Example script:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;"This is an urgent notice &lt;/i&gt;&lt;a href="https://www.foxnews.com/category/us/economy/taxes" target="_blank" rel="noopener"&gt;&lt;i&gt;regarding your tax account.&lt;/i&gt;&lt;/a&gt;&lt;i&gt; Your Social Security number has been linked to suspicious activity. To prevent legal action, you must verify your identity and pay the outstanding balance today using cryptocurrency."&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Government agencies do not demand payment through cryptocurrency. The goal is to scare you into acting quickly without checking the facts. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The tech support emergency script&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This scam often begins with a pop-up warning or an unexpected phone call.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Example script:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;"Your computer has been compromised by hackers. Your bank information may be at risk. To secure your system, we need you to transfer funds temporarily into a &lt;/i&gt;&lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;&lt;i&gt;protected cryptocurrency wallet.&lt;/i&gt;&lt;/a&gt;&lt;i&gt;"&lt;/i&gt;&lt;/p&gt;&lt;p&gt;The scammer claims the funds will be returned once the system is secure. In reality, the transfer moves the money directly to the criminal.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The crypto giveaway script&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This scam frequently appears on social media or video platforms.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Example script:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;"&lt;i&gt;We are celebrating a new crypto launch. Send 0.1 Bitcoin to this wallet, and we will immediately send back double the amount."&lt;/i&gt;&lt;/p&gt;&lt;p&gt;The message may appear to come from a well-known company or public figure. The wallet address belongs to the scammer. Anyone who sends funds receives nothing in return.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The fake recovery service script&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This scam targets people who have already lost money.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Example script:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;"We specialize in recovering stolen cryptocurrency. Our investigators located the wallet that received your funds. To begin the recovery process, we require a small crypto payment to unlock the legal tracing tools."&lt;/i&gt;&lt;/p&gt;&lt;p&gt;The victim believes they are hiring professionals to recover their money. Instead, they are being scammed again.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why these scripts work so well&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;These scams succeed because they exploit human behavior. First, they create urgency. Victims feel pressured to act quickly.&lt;/p&gt;&lt;p&gt;Second, they create trust. The scammer may sound friendly or sympathetic.&lt;/p&gt;&lt;p&gt;Third, they promise rewards. Investment scams offer profits that feel life-changing.&lt;/p&gt;&lt;p&gt;Finally, cryptocurrency adds confusion. Many people are still learning how it works. Criminals take advantage of that uncertainty.&lt;/p&gt;&lt;p&gt;Understanding these scripts is the first step to protecting yourself. Once you recognize the patterns scammers use, it becomes much easier to stop the conversation before money is involved. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How to protect yourself from crypto scams&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Crypto scammers rely on urgency, trust and confusion to pressure victims into sending money. These practical steps can help you recognize warning signs and avoid costly mistakes. &lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/one-click-cost-father-4-million-bitcoin-vishing-scammers" target="_blank" rel="noopener"&gt;&lt;strong&gt;1 CLICK COST A FATHER $4 MILLION IN BITCOIN TO VISHING SCAMMERS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Slow down when money is involved&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scammers depend on urgency to push victims into fast decisions. If someone pressures you to send money immediately, treat it as a warning sign. Pause the conversation and verify the situation independently. Contact the company, agency or person through a known phone number or official website. Taking even a few minutes to step back can stop a scam before money leaves your account.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Never send cryptocurrency to someone you do not know&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Cryptocurrency transactions work very differently from credit cards or bank transfers. Once funds are sent, they usually cannot be reversed. Scammers prefer crypto because it moves quickly and often crosses international borders. If someone asks for payment through Bitcoin, Ethereum or another digital currency, assume the request is suspicious until proven otherwise.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Verify investment opportunities independently&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Many crypto scams promise fast profits or guaranteed returns. Legitimate investments never guarantee profits. Before investing, search the company name, website and contact information online. Look for warnings from regulators or consumer protection agencies. If you cannot find reliable information about the company, that is a major red flag.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Use strong antivirus software on your devices&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scammers frequently use phishing links, fake websites and malicious downloads to trick victims. Strong antivirus software can help detect these threats before they cause damage. Strong antivirus software can warn you about suspicious websites, block malicious downloads and help stop phishing attempts that try to steal your financial information. &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Reduce the personal information scammers can find online&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scammers often research their targets before sending messages. They may gather &lt;a href="https://www.foxnews.com/tech/one-thing-scammers-check-targeting-online" target="_blank" rel="noopener"&gt;details from public records,&lt;/a&gt; social media or data broker websites. Limiting the amount of personal information available online can make it harder for criminals to craft convincing messages. Removing your data from people search sites with a data removal service can reduce the chances of becoming a target. &lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) Be cautious with online relationships&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Romance scams often begin with friendly messages on dating apps or social media. Over time, the scammer builds trust and eventually introduces a crypto investment opportunity. If someone you have never met begins discussing cryptocurrency investments or asks you to move money, take a step back. Real relationships do not require financial transfers to strangers.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Never trust screenshots or profit dashboards&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Crypto scammers often show screenshots of trading accounts that appear to generate large profits. These images are easy to fake or are displayed on fraudulent websites controlled by the scammer. Even if a platform shows profits, it does not mean the money exists. If you cannot withdraw funds easily through a verified exchange, the investment may be fake.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;8) Watch for requests to move conversations off the platform&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Many scams begin on social media, &lt;a href="https://www.foxnews.com/category/tech/technologies/apps" target="_blank" rel="noopener"&gt;dating apps or messaging platforms.&lt;/a&gt; After the first contact, scammers often ask victims to continue the conversation on WhatsApp, Telegram or another private messaging app. Moving the conversation helps them avoid detection by the original platform. If someone quickly asks you to switch apps, treat it as a warning sign. &lt;/p&gt;&lt;h3&gt;&lt;strong&gt;9) Talk to someone you trust before sending money&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scammers often isolate their victims and discourage them from discussing the situation with friends or family. Before sending cryptocurrency or making a large investment, pause and talk to someone you trust. A second opinion can often spot warning signs that are easy to miss when emotions are involved. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What to do if you already sent cryptocurrency to a scammer&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;If you believe you sent cryptocurrency to a scammer, act quickly. Contact the exchange or platform you used to send the funds and report the transaction immediately. Some exchanges may be able to flag the receiving wallet and help investigators track suspicious activity.&lt;/p&gt;&lt;p&gt;You should also report the scam to the FTC at &lt;i&gt;&lt;strong&gt;reportfraud.ftc.gov&lt;/strong&gt; &lt;/i&gt;and notify your local law enforcement agency. If the scam began on a social media site, dating app or messaging platform, report the account there as well so it can be investigated and removed. &lt;/p&gt;&lt;p&gt;While recovering funds can be difficult, reporting the incident can help authorities identify larger fraud networks and potentially prevent others from becoming victims. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Cryptocurrency scams continue to grow because the scripts are polished and carefully tested. The criminals behind them understand human psychology. They know when to apply pressure, when to build trust and when to promise rewards. Recognizing these patterns is one of the most powerful ways to stop them. When you know the script, the scam becomes much easier to spot.&lt;/p&gt;&lt;p&gt;Have you ever received a message that tried to convince you to send cryptocurrency, and did the script almost sound believable? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/cryptocurrency-scam-scripts-1.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">e0db021b-5a16-594c-a4e3-81ec4f27d59a</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Mon, 20 Apr 2026 12:30:34 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/bmw-puts-humanoid-robots-work-building-evs</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/bmw-puts-humanoid-robots-work-building-evs</guid>
            <title>BMW puts humanoid robots to work building EVs</title>
            <description>The German automaker brings humanoid robots from the US to its German factory</description>
            <content:encoded>&lt;p&gt;BMW Group has spent years &lt;a href="https://www.foxnews.com/category/tech/topics/innovation" target="_blank" rel="noopener"&gt;testing automation,&lt;/a&gt; but this latest move feels different. Instead of robotic arms locked in cages, the company is now using humanoid robots that move through factories more like people. After a successful pilot in Spartanburg, South Carolina, BMW is bringing that same idea into its Leipzig, Germany, factory, where it is testing robots in real production environments. This time, it is partnering with Hexagon Robotics to introduce a new generation of AI-powered machines. Unlike many robot demos you see online, this one is already being tested inside a real production environment.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; &lt;strong&gt;- &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Plus, you'll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/chinese-robot-breaks-human-world-record-beijing-half-marathon" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;CHINESE ROBOT BREAKS HUMAN WORLD RECORD IN BEIJING HALF-MARATHON&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How BMW's humanoid robot pilot built over 30,000 vehicles&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;BMW's earlier pilot used &lt;a href="https://www.foxnews.com/tech/humanoid-robot-gets-work-bmw-assembly-plant"&gt;&lt;u&gt;Figure 02 humanoid robots &lt;/u&gt;&lt;/a&gt;for a very specific task. They handled the precise positioning of sheet metal for welding on the BMW X3 production line. That task may seem small, but it plays a key role in keeping production moving smoothly. Precision work like this can easily slow things down or create bottlenecks. According to BMW, those robots helped contribute to building more than 30,000 vehicles. Because of that success, the company now feels confident about expanding the concept. Instead of limiting testing to one plant, BMW is moving forward with its iFACTORY initiative in Leipzig, where EV production is already a major focus.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;BMW's new AI humanoid robots for EV factories&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The new robots, called AEON, come from Hexagon Robotics. They are designed to work inside active factory environments without constant human direction. They rely on AI-based motion control, which helps them move through complex spaces. At the same time, built-in sensors allow them to understand their surroundings in real time. Because of that, they can adjust their actions on the fly instead of following fixed instructions. Hexagon refers to this as "Physical AI." In simple terms, the robot can make decisions based on what it sees around it. As a result, the robot does not stop when something unexpected happens. Instead, it adapts and keeps working. That marks a clear shift from traditional factory automation.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why BMW is investing in humanoid robots now&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;BMW executives have made it clear that this is not about replacing people overnight. Instead, the goal is to test what actually works in real production environments. Michael Nikolaides, who oversees &lt;a href="https://www.foxnews.com/auto" target="_blank" rel="noopener"&gt;BMW's production&lt;/a&gt; network, says these pilot programs help the company refine how AI-powered robots learn on the job. He goes on to point to a broader vision, saying: "Digitalization improves the competitiveness of our production, here in Europe and worldwide. The symbiosis of engineering expertise and artificial intelligence opens up entirely new possibilities in production." There is also a practical reason for the humanoid design. Factories are already built for human workers. Because of that, a robot that can use the same spaces and tools is much easier to integrate than one that requires a complete redesign.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/humanoid-robots-hit-mass-production-china" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;HUMANOID ROBOTS HIT MASS PRODUCTION IN CHINA&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How humanoid robots could transform factory work&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;For years, humanoid robots felt more like something you saw in those social media demo videos than something you would trust on a real factory floor. Yes, they looked impressive, but they struggled in real environments. That is starting to change. Factories are still unpredictable. Parts do not always arrive in the exact same position. Workers move around constantly, and tools and materials shift throughout the day. Because of this, traditional robots often struggle since they rely on tightly controlled conditions. AI-powered humanoid robots can handle that kind of variability. They move around people and equipment without stopping. They adjust when parts are slightly off, and they work in spaces built for human workers.  That level of flexibility is what sets this new wave of AI-powered robotics apart from earlier forms of automation.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What this means to you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Even if you never step inside a factory, this shift still matters. For one, it could change how cars are built, whether they are electric or gas. When production speeds up, costs can come down over time, which could affect what you pay for your next vehicle. At the same time, factory jobs are likely to change. Some repetitive or physically demanding work may move to robots. In many cases, that means people shift into roles focused on oversight, maintenance or more skilled tasks. Step back for a second, and you can see this is a sign of &lt;a href="https://www.foxnews.com/category/tech/artificial-intelligence" target="_blank" rel="noopener"&gt;where AI is headed next.&lt;/a&gt; It is no longer limited to apps on your phone or software on your computer. Now, it is starting to show up in the physical world in ways you can actually see and interact with.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;   &lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/home-robot-cooks-cleans-organizes-your-life" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;HOME ROBOT COOKS, CLEANS AND ORGANIZES YOUR LIFE&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;BMW is not the only company testing humanoid robots, but it is one of the first to bring them into real production environments. That is a big shift from the testing phase most of us are used to seeing. The fact that these robots are already helping build tens of thousands of vehicles shows that this is moving beyond early trials. It is starting to become part of how factories actually run. Where this goes next is still an open question. If &lt;a href="https://www.foxnews.com/category/tech/technologies" target="_blank" rel="noopener"&gt;the technology&lt;/a&gt; keeps improving, you could see more of these robots show up in factories and warehouses over time.&lt;/p&gt;&lt;p&gt;So here is the bigger question. How do you feel about humanoid robots working alongside people in factories? Would you trust them to help build the car you drive? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; &lt;strong&gt;- &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join. &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;i&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/i&gt;&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/humanoid-robot-photo-1.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">ad419149-b795-5d5c-8c0e-7d295e4ec4d1</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/robots</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/innovation</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Mon, 20 Apr 2026 07:26:20 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/iphone-samsung-flashlight-tricks-know</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/iphone-samsung-flashlight-tricks-know</guid>
            <title>iPhone and Samsung flashlight tricks you should know</title>
            <description>Hidden flashlight features that change how you use your phone daily</description>
            <content:encoded>&lt;p&gt;Most people treat their &lt;a href="https://www.foxnews.com/category/tech/technologies/smartphones" target="_blank" rel="noopener"&gt;phone flashlight&lt;/a&gt; like a basic on and off switch. You tap it when you drop something under the couch or walk through a dark parking lot. That's it.&lt;/p&gt;&lt;p&gt;But with the latest software updates, both iPhone and &lt;a href="https://www.foxnews.com/category/tech/companies/samsung" target="_blank" rel="noopener"&gt;Samsung phones&lt;/a&gt; have quietly turned the flashlight into something much more useful. You can control how bright it is. On some devices, you can even change how wide the beam spreads.&lt;/p&gt;&lt;p&gt;Once you know where to look, it feels like you just upgraded your phone without spending a dollar.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/10-ios-26-tricks-help-you-get-more-out-your-iphone" target="_blank" rel="noopener"&gt;&lt;strong&gt;10 IOS 26 TRICKS THAT HELP YOU GET MORE OUT OF YOUR IPHONE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;iPhone flashlight features you're probably missing&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Your iPhone flashlight does more than turn on and off, and a few hidden controls can completely change how you use it.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;How to adjust iPhone flashlight brightness&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;On almost all iPhones:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Swipe down&lt;/strong&gt; from the top right to open Control Center&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Press and hold&lt;/strong&gt; the flashlight icon&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Drag the vertical slider&lt;/strong&gt; up to increase brightness or down to lower it&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This has been around for years, but many people still tap instead of holding. That's where the real control lives.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;How to change iPhone flashlight beam width (Pro models)&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;This is the feature most people have never seen. On &lt;a href="https://www.foxnews.com/category/tech/technologies/iphone" target="_blank" rel="noopener"&gt;newer Pro iPhones&lt;/a&gt; running the latest software:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Swipe down&lt;/strong&gt; to open Control Center&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Press and hold&lt;/strong&gt; the flashlight icon&lt;/li&gt;&lt;li&gt;When the flashlight control appears at the top of the screen, &lt;strong&gt;swipe left or right&lt;/strong&gt; to adjust the beam width&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You can go from a narrow, focused beam to a wide flood of light.&lt;/p&gt;&lt;p&gt;That means:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Narrow beam&lt;/strong&gt; = better for seeing farther ahead&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Wide beam&lt;/strong&gt; = better for lighting up a full area&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This feature was introduced in iOS 18 and is still available in iOS 26.4, but it only works on iPhone 14 Pro and newer Pro models, including iPhone 15 Pro and later versions. You won't see it on standard models.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;How to turn on iPhone flashlight from the Lock Screen&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;You don't even need to unlock your phone:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Press and hold the &lt;strong&gt;flashlight icon&lt;/strong&gt; on the Lock Screen&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;It turns on instantly, which is faster than digging through menus.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;How to use Siri to control your iPhone flashlight&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;You can say:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;"Hey Siri, turn on the flashlight."&lt;/li&gt;&lt;li&gt;"Set flashlight to 50 percent."&lt;/li&gt;&lt;li&gt;"Hey Siri, turn off the flashlight."&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;It's one of the fastest hands-free options when your hands are full.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Bonus: Use iPhone flashlight for alerts and notifications&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Your iPhone can use the flashlight as a visual alert:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Go to &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Accessibility&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Audio/Visual&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Scroll down and turn on &lt;strong&gt;Flash for Alerts&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Your flashlight will blink for calls and notifications, which helps if your phone is on silent or in a noisy place.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Samsung flashlight features you should know&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Samsung takes a different approach and, in some ways, gives you more flexibility right out of the box.&lt;/p&gt;&lt;p&gt;&lt;i&gt;Note: Settings may vary depending on your Samsung device model and One UI version.&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;How to adjust Samsung flashlight brightness&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;On most Samsung Galaxy phones:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Swipe down&lt;/strong&gt; to open&lt;strong&gt; Quick Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Press and hold&lt;/strong&gt; the &lt;strong&gt;flashlight icon&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Use the &lt;strong&gt;brightness slider &lt;/strong&gt;(labeled "Brightness") to adjust the light level&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Many people miss this because a quick tap only turns the flashlight on or off. The brightness controls appear after you press and hold, giving you more control depending on your situation.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;How to turn on the Samsung flashlight with your voice&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If you use &lt;a href="https://www.foxnews.com/category/tech/companies/google" target="_blank" rel="noopener"&gt;Google Assistant&lt;/a&gt;:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;"Hey Google, turn on the flashlight."&lt;/li&gt;&lt;li&gt;"Hey Google, turn off the flashlight."&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;It works well when your hands are full or when you need quick access.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/10-incredibly-iphone-android-tricks-life-easier" target="_blank" rel="noopener"&gt;&lt;strong&gt;10 INCREDIBLY USEFUL IPHONE AND ANDROID TRICKS THAT MAKE YOUR LIFE EASIER&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;How to customize Samsung flashlight access&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Samsung gives you a few ways to keep the flashlight within easy reach. To keep it in your main Quick Settings panel:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Swipe down from the top of the screen&lt;/strong&gt; to open &lt;strong&gt;Quick Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;If you do not see the flashlight icon in the main panel, tap the &lt;strong&gt;pencil icon&lt;/strong&gt; to edit&lt;/li&gt;&lt;li&gt;Tap&lt;strong&gt; Edit &lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Find &lt;strong&gt;Flashlight&lt;/strong&gt; in the available buttons&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Hold and drag the flashlight icon &lt;/strong&gt; into the main Quick Settings area&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Done&lt;/strong&gt; or&lt;strong&gt; Save&lt;/strong&gt; if prompted&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;&lt;strong&gt;Bonus: Use the Samsung flashlight for alerts and notifications&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Samsung phones can also use the flashlight for visual alerts:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Go to &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Accessibility&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Advanced settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Flash notifications&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Turn on &lt;strong&gt;Camera flash notification&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You can also turn on &lt;strong&gt;Screen flash notification&lt;/strong&gt; if you want your display to light up instead.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;When iPhone and Samsung flashlight features actually matter&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This is where it becomes practical:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Walking at night:&lt;/strong&gt; a narrow beam helps you see farther ahead&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Power outage:&lt;/strong&gt; a wide beam lights up more of the room&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Looking for something nearby:&lt;/strong&gt; lower brightness avoids harsh glare&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Emergency situations:&lt;/strong&gt; faster access can save time&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Once you start adjusting the light instead of just turning it on, it becomes far more useful.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;   &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The flashlight is one of the most used features on your phone, yet most people never go beyond the basics. Apple improved control with hardware and software, while Samsung focused on flexibility and customization. Both approaches make a simple tool far more capable.&lt;/p&gt;&lt;p&gt;Have you ever discovered a hidden feature on your phone that made you wonder what else you've been missing? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com &lt;/u&gt;&lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved. &lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/darksword-leak-iphone-hack-2.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">3934948a-3ab0-5bdb-bc03-e172008927be</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/smartphones</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/iphone</category>
            <category domain="foxnews.com/taxonomy">fox-news/columns/how-to-tech</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/samsung</category>
            <category domain="foxnews.com/taxonomy">fox-news/auto/how-to</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Sun, 19 Apr 2026 13:00:45 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/dont-need-ssn-open-credit-card-scammers-know</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/dont-need-ssn-open-credit-card-scammers-know</guid>
            <title>You don’t need an SSN to open a credit card: Scammers know that</title>
            <description>Identity theft risk rises as credit card applications no longer require SSNs, enabling scams with stolen personal information</description>
            <content:encoded>&lt;p&gt;Some credit card issuers now approve applicants without a Social Security number. Instead, they accept an Individual Taxpayer Identification Number, a passport or proof of income.&lt;/p&gt;&lt;p&gt;That makes it easier for more people to access credit, but it also changes how lenders verify identity. Instead of relying on one number, they now review a mix of personal details.&lt;/p&gt;&lt;p&gt;The &lt;a href="https://www.foxnews.com/category/tech/topics/fbi" target="_blank" rel="noopener"&gt;Federal Bureau of Investigation&lt;/a&gt; says they received 1,008,597 internet crime complaints in 2025. Phishing and spoofing ranked among the most common. These scams collect small pieces of your personal information over time, including your name, address or date of birth.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/debit-card-fraud-without-using-your-card" target="_blank" rel="noopener"&gt;&lt;strong&gt;HOW DEBIT CARD FRAUD CAN HAPPEN WITHOUT USING THE CARD&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Each detail may seem harmless on its own. But scammers combine them to build a profile that looks real. That profile can pass basic checks and lead to accounts opened in your name.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot &lt;a href="https://www.foxnews.com/category/tech/topics/cybercrime" target="_blank" rel="noopener"&gt;scams early&lt;/a&gt; and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Plus, you'll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How lenders verify identity without an SSN&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Lenders check new credit applications against credit bureau records. These records include your name, date of birth and address history.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/category/special/sponsored/experian" target="_blank" rel="noopener"&gt;Experian says&lt;/a&gt; it can use these details to find or build a &lt;a href="https://www.foxnews.com/category/finance" target="_blank" rel="noopener"&gt;credit file&lt;/a&gt; when an SSN is not available. Lenders also look for an existing credit file and recent activity.&lt;/p&gt;&lt;p&gt;If the details match what is already on file, lenders may approve the application. The decision depends on whether the profile looks consistent and believable. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How scammers gather your information&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Scammers rely on phishing and impersonation tactics to collect data over time. The FBI reports more than 190,000 phishing and spoofing cases in 2025.&lt;/p&gt;&lt;p&gt;A message may ask you to confirm your name or address. Another message may request part of an account number. Each interaction adds another piece.&lt;/p&gt;&lt;p&gt;Alone, the information does not seem useful. Together, it creates a complete profile. These are the same details lenders use to verify identity. Scammers then combine everything and &lt;a href="https://www.foxnews.com/tech/why-scammers-open-bank-accounts-your-name" target="_blank" rel="noopener"&gt;apply for credit in one&lt;/a&gt; step.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why fraudulent applications still get approved&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Lenders approve applications by matching the details to existing records. They do not trace where that information came from. They focus on consistency. Many systems process applications automatically using credit bureau data. Each application usually creates a hard inquiry on your credit file.&lt;/p&gt;&lt;p&gt;If the details match and a credit file already exists, lenders may treat the application as legitimate. No step confirms that the person applying actually owns that identity. The Federal Trade Commission receives more than 1 million identity theft reports each year. Credit card fraud remains one of the most common types. Many cases involve new accounts opened with information that passed basic checks.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How you might find out&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;You cannot see credit applications in real time. Most people only notice activity when it shows up on their &lt;a href="https://www.foxnews.com/category/finance" target="_blank" rel="noopener"&gt;credit report&lt;/a&gt;.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;A &lt;strong&gt;hard inquiry&lt;/strong&gt; appears when someone applies for credit. But you will only see it if you check your credit regularly.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;New accounts&lt;/strong&gt; usually appear after they are reported to credit bureaus. This often takes 30 to 60 days, depending on the issuer.&lt;/li&gt;&lt;li&gt;Sometimes, the first sign is a &lt;strong&gt;piece of mail.&lt;/strong&gt; A credit card or welcome letter may be sent to the address on the application. If a scammer changed the address, you may never see it.&lt;/li&gt;&lt;li&gt;Others discover the issue when their &lt;strong&gt;credit score drops&lt;/strong&gt;, or a &lt;strong&gt;new account appears&lt;/strong&gt; on their report.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/do-you-know-true-cost-identity-theft" target="_blank" rel="noopener"&gt;&lt;strong&gt;DO YOU KNOW THE TRUE COST OF IDENTITY THEFT?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why timing works against you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;By the time you see these changes, the account is already open. That gives scammers time to apply for more credit or start spending.&lt;/p&gt;&lt;p&gt;That delay is what makes this type of fraud so difficult to catch early. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Here's how to catch fraudulent accounts early&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The only way to see this type of fraud early is to keep an eye on your credit file. These include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;New credit accounts&lt;/li&gt;&lt;li&gt;Hard inquiries from applications&lt;/li&gt;&lt;li&gt;New authorized users added&lt;/li&gt;&lt;li&gt;Changes to your name or address&lt;/li&gt;&lt;li&gt;New collections or delinquent accounts&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Most people don't check their credit regularly. &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;Bank alerts&lt;/a&gt; can flag activity on existing accounts, but they don't show new credit cards opened at a different bank. Those only appear once they are reported to the credit bureaus. You can also &lt;a href="https://www.foxnews.com/tech/why-credit-freeze-isnt-end-identity-theft" target="_blank" rel="noopener"&gt;place a free credit freeze&lt;/a&gt; with Equifax, Experian and TransUnion, which can block new credit accounts from being opened in your name. A fraud alert is another option that tells lenders to take extra steps to verify your identity before approving new credit.&lt;/p&gt;&lt;p&gt;Credit monitoring services can track activity across all three bureaus and alert you when something changes. That gives you time to respond by freezing your credit, disputing the account or contacting the lender.&lt;/p&gt;&lt;p&gt;See my tips and best picks on Best Identity Theft Protection at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;More lenders now approve credit cards without a Social Security number. That makes credit easier to access. But it also changes how identity gets verified. Lenders now match multiple pieces of personal information instead of relying on one number. That gives scammers more ways in. They can collect small details over time and use them together. This is why identity theft is harder to spot. You may not notice anything until a new account shows up on your credit report. By then, the damage may already be done. The takeaway is simple. Check your credit regularly. Set up alerts and limit what you share online. Fraud is no longer just about stolen numbers. It is about stolen identities built piece by piece.&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Is enough being done to stop scammers from using your personal information to open accounts, or is the system making it too easy for them to slip through? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt;&lt;strong&gt; &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/online-game-gift-card-scam-1.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">ced582c6-9990-5a98-b192-435f2953a9ea</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/politics/executive/social-security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fbi</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/special/sponsored/experian</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Sun, 19 Apr 2026 10:01:39 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/chinese-robot-breaks-human-world-record-beijing-half-marathon</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/chinese-robot-breaks-human-world-record-beijing-half-marathon</guid>
            <title>Chinese robot breaks human world record in Beijing half-marathon</title>
            <description>Dozens of humanoid robots competed alongside 12,000 human runners, though some stumbled at the start or veered into barriers</description>
            <content:encoded>&lt;p&gt;A Chinese-built &lt;a href="https://www.foxnews.com/category/tech/technologies/robots" target="_blank" rel="noopener"&gt;humanoid robot&lt;/a&gt; beat the human half-marathon world record in Beijing on Sunday, marking a breakthrough moment in a high-stakes global race for technological dominance.&lt;/p&gt;&lt;p&gt;A robot developed by Chinese smartphone maker Honor completed the 21-kilometer (13-mile) race in 50 minutes and 26 seconds, beating the human record of about 57 minutes set by Uganda’s Jacob Kiplimo last month.&lt;/p&gt;&lt;p&gt;The performance marked a dramatic improvement from last year’s inaugural event, when the top robot finished in more than 2 hours and 40 minutes.&lt;/p&gt;&lt;p&gt;Dozens of humanoid robots competed alongside about 12,000 human runners, navigating a parallel course to avoid collisions.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/chinas-compact-humanoid-robot-shows-off-balance-flips" target="_blank" rel="noopener"&gt;&lt;strong&gt;CHINA'S COMPACT HUMANOID ROBOT SHOWS OFF BALANCE AND FLIPS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Nearly half of the robots ran using autonomous navigation, while others relied on remote control, organizers said.&lt;/p&gt;&lt;p&gt;Despite the breakthrough, the race still saw glitches, with some robots stumbling at the start or veering into barriers.&lt;/p&gt;&lt;p&gt;Engineers said the winning robot was designed to mimic elite athletes, featuring long legs of about 37 inches and &lt;a href="https://www.foxnews.com/category/tech/topics/innovation" target="_blank" rel="noopener"&gt;advanced cooling systems&lt;/a&gt; to sustain performance.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/us-targets-chinese-robots-over-security-fears" target="_blank" rel="noopener"&gt;&lt;strong&gt;US TARGETS CHINESE ROBOTS OVER SECURITY FEARS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;"Looking ahead, some of these technologies might be transferred to other areas," said Du Xiaodi, an engineer with the Honor team. "For example, structural reliability and liquid-cooling technology could be applied in future industrial scenarios."&lt;/p&gt;&lt;p&gt;Spectators reacted with a mix of amazement and unease at the machines’ rapid progress.&lt;/p&gt;&lt;p&gt;"It’s the first time robots have surpassed humans, and that’s something I never imagined," Sun Zhigang, who attended the event with his son, told The Associated Press.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/humanoid-robots-hit-mass-production-china" target="_blank" rel="noopener"&gt;&lt;strong&gt;HUMANOID ROBOTS HIT MASS PRODUCTION IN CHINA&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;"The robots' speed far exceeds that of humans," spectator Wang Wen told the outlet. "This may signal the arrival of sort of a new era."&lt;/p&gt;&lt;p&gt;Experts say the race highlights China’s accelerating push to dominate robotics and artificial intelligence, even as widespread commercial use of humanoid robots remains limited, according to Reuters. The experts said Chinese robotics firms are still working to develop the AI software needed for humanoids to match the efficiency of human factory workers.&lt;/p&gt;&lt;p&gt;"The future will definitely be an &lt;a href="https://www.foxnews.com/category/tech/artificial-intelligence" target="_blank" rel="noopener"&gt;AI era&lt;/a&gt;," engineering student Chu Tianqi told Reuters. "If people don't know how to use AI now… they will definitely become obsolete."&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The competition underscores a broader technological race &lt;a href="https://www.foxnews.com/category/world/world-regions/china" target="_blank" rel="noopener"&gt;between China and the United States&lt;/a&gt;, as Beijing invests heavily in advanced robotics as part of its long-term economic strategy.&lt;/p&gt;&lt;p&gt;&lt;i&gt;The Associated Press and Reuters contributed to this report.&lt;/i&gt;&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/robot-marathon-beijing-fox-news-006.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">211e778b-3563-53d2-bac8-44297c66fef9</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/robots</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
            <category domain="foxnews.com/taxonomy">fox-news/world/world-regions/china</category>
            <category domain="foxnews.com/taxonomy">fox-news/sports/running</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
            <category domain="foxnews.com/taxonomy">fox-news/science</category>
            <category domain="foxnews.com/taxonomy">fox-news/world</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Sun, 19 Apr 2026 07:44:25 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/one-thing-scammers-check-targeting-online</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/one-thing-scammers-check-targeting-online</guid>
            <title>The one thing scammers check before targeting you online</title>
            <description>Scammers don’t hack you first; they look you up using public records and data broker sites</description>
            <content:encoded>&lt;p&gt;Most people assume scammers need to &lt;a href="https://www.foxnews.com/category/tech/topics/cybercrime" target="_blank" rel="noopener"&gt;hack something&lt;/a&gt;. A database. A password. A bank system. They don't.&lt;/p&gt;&lt;p&gt;In most cases, everything a scammer needs to target you is already sitting online, publicly available, completely legal to access and surprisingly easy to find.&lt;/p&gt;&lt;p&gt;Here's what they're actually looking at before they ever pick up the phone.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com,&lt;/u&gt;&lt;/strong&gt;&lt;strong&gt; &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;&lt;strong&gt;Your personal profile is already out there, and it's more complete than you think&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;There's an entire industry built around collecting and selling your personal information. It's called &lt;a href="https://www.foxnews.com/category/us/personal-freedoms/privacy" target="_blank" rel="noopener"&gt;data brokering&lt;/a&gt;, and most people have never heard of it.&lt;/p&gt;&lt;p&gt;Right now, without your knowledge or consent, your details are being published by dozens of websites, including:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;People search sites&lt;/strong&gt; (like Whitepages, Spokeo and BeenVerified): your full name, current address, phone numbers and age.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Address lookup tools&lt;/strong&gt;: your current and past home addresses, sometimes going back decades.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Relatives databases&lt;/strong&gt;: the names and contact information of your family members, automatically linked to your profile.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Property records&lt;/strong&gt;: whether you own your home, what it's worth and when you bought it.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;None of this requires a hack. It's all pulled from public records, voter registrations, court filings, real estate transactions, marriage and divorce records and assembled into a profile that anyone can search for a few dollars or sometimes for free.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;They're not guessing; they're researching&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;In 2024, federal prosecutors indicted a network of scam call centers operating out of Montreal that had defrauded hundreds of elderly Americans out of more than $21 million. What made the scheme so effective wasn't sophisticated technology. It was a spreadsheet.&lt;/p&gt;&lt;p&gt;The scammers were working from lists of potential victims that included names, ages and household income information pulled from commercial databases. They used those lists to identify targets, then called them pretending to be grandchildren in trouble. The calls were convincing enough that victims handed over thousands of dollars, sometimes in cash picked up at the door.&lt;/p&gt;&lt;p&gt;They didn't hack anyone. They just did their research first.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/why-widows-divorced-women-targets-retirement-scams" target="_blank" rel="noopener"&gt;&lt;strong&gt;WHY WIDOWS AND DIVORCED WOMEN ARE TARGETS FOR RETIREMENT SCAMS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Three ways scammers turn your public data into a weapon&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Scammers use your publicly available data to make their attacks more personal, believable and harder to detect. Here are three ways they do it.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Impersonating your bank&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;A scammer calls and says, "Hi, this is fraud prevention at [your bank]. We're seeing suspicious activity on your account ending in 4721."&lt;/p&gt;&lt;p&gt;They already know your bank, your name and possibly your address. That's enough to sound legitimate. From there, they walk you through "confirming your identity," which is really just you handing over the information they need to access your account.&lt;/p&gt;&lt;p&gt;This kind of scam starts with a simple people search lookup. Your name and address lead to property records. Property records suggest your income range.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) The family emergency call&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Imagine getting a call:&lt;i&gt; &lt;/i&gt;"Meemaw, it's me. I'm in trouble. Please don't tell Mom."&lt;i&gt; &lt;/i&gt;Scammers don't guess. Instead, they research your family first. They use relatives' databases to find your children's names, ages and connections.&lt;/p&gt;&lt;p&gt;With that information, they build a story that sounds real. For example, they know to call you "Meemaw." They also know which grandchild to impersonate. In some cases, they even mention a sibling's name to make the story more convincing.&lt;/p&gt;&lt;p&gt;As a result, the call feels personal and urgent. However, none of it is random. It's all based on information that was publicly available the entire time.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Targeted phishing with your own details&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;A &lt;a href="https://www.foxnews.com/category/tech/technologies/email" target="_blank" rel="noopener"&gt;phishing email&lt;/a&gt; that says &lt;i&gt;"&lt;/i&gt;Dear Customer" is easy to ignore. One that says "Dear [your full name], we noticed unusual activity on your account registered to [your home address]" is a lot harder to dismiss.&lt;/p&gt;&lt;p&gt;Scammers use publicly available data to personalize attacks, adding your real name, city or even a reference to your neighborhood to make a fake email or text look authentic. The more specific the details, the more likely you are to believe it.&lt;/p&gt;&lt;p&gt;"But I'm not on social media."&lt;i&gt; &lt;/i&gt;This is the most common objection, and it misses the point entirely.&lt;/p&gt;&lt;p&gt;You don't have to be on social media for your information to be online. Data brokers pull from public records, not your Facebook profile. Your information is likely already listed on dozens of sites because of:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Your home purchase&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.foxnews.com/category/us/economy/public-sector" target="_blank" rel="noopener"&gt;Voter registration records&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Court or property tax filings.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The less they think they've shared, the more surprised people usually are when they search for themselves on a people search site for the first time.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/data-brokers-accused-hiding-opt-out-pages-from-google" target="_blank" rel="noopener"&gt;&lt;strong&gt;DATA BROKERS ACCUSED OF HIDING OPT-OUT PAGES FROM GOOGLE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How to reduce your exposure&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;You don't have to accept this as permanent. A few practical steps can help:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Search your full name&lt;/strong&gt; on Whitepages, Spokeo, FastPeopleSearch and other &lt;a href="https://www.foxnews.com/tech/how-remove-your-personal-info-from-people-search-sites" target="_blank" rel="noopener"&gt;people search sites&lt;/a&gt; and submit opt-out requests.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Look up your address directly, &lt;/strong&gt;not just your name, since many listings are organized by location.&lt;/li&gt;&lt;li&gt;Ask elderly family members to &lt;strong&gt;search for themselves,&lt;/strong&gt; too, since older adults are disproportionately targeted.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Be skeptical&lt;/strong&gt; of any call that opens with personal details, as it can be a sign that someone researched you first.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;&lt;strong&gt;How to remove your personal data and stop scammers from finding you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The challenge is that there are hundreds of data broker sites, each with its own removal process. Manually opting out of all of them can take hours, and your information often reappears weeks later when brokers refresh their databases.&lt;/p&gt;&lt;p&gt;That's why ongoing automated removal is the only approach that actually works. That's why I recommend using a trusted data removal service.&lt;/p&gt;&lt;p&gt;These services automatically contact data brokers on your behalf and request the removal of your personal information. They also continue monitoring those sites and submit new removal requests if your data reappears.&lt;/p&gt;&lt;p&gt;Many services remove personal data from hundreds of data broker and people search websites, and some plans allow you to request removals from additional sites as needed.&lt;/p&gt;&lt;p&gt;Some have also received third-party assurance from independent firms, helping validate their claims.&lt;/p&gt;&lt;p&gt;The goal is simple: make it much harder for strangers, scammers and cybercriminals to find your personal information online.&lt;/p&gt;&lt;p&gt;These services often include a money-back guarantee, so you can try them risk-free and see how much of your information is exposed online.&lt;/p&gt;&lt;p&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Get a free scan to find out if your personal information is already out on the web: &lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Most scams don't start with a breach. They start with a search. Your name, address, relatives and even income clues are already out there, quietly fueling more convincing and more dangerous attacks. That's what makes this so unsettling. You can do everything "right" online and still be exposed because the system itself is built to share your information. &lt;/p&gt;&lt;p&gt;The good news is you're not powerless. Once you understand how scammers build their playbook, you can start disrupting it. Removing your data, limiting exposure and staying skeptical of anyone who knows a little too much about you can dramatically reduce your risk. The goal isn't to disappear completely. It's to make yourself a much harder target.&lt;/p&gt;&lt;p&gt;What should be done to stop scammers from using your publicly available data against you in the first place? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt;&lt;strong&gt; &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/person-typing-on-computer-001.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">fcc0b9d5-b5a0-52c1-bc76-1b7932f5e48e</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/websites</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
            <category domain="foxnews.com/taxonomy">fox-news/lifestyle/real-estate</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Sat, 18 Apr 2026 14:45:23 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/mexicos-climate-supercomputer-could-change-forecasting</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/mexicos-climate-supercomputer-could-change-forecasting</guid>
            <title>Mexico’s climate supercomputer could change forecasting</title>
            <description>A powerful new system aims to predict extreme weather faster and more accurately</description>
            <content:encoded>&lt;p&gt;&lt;a href="https://www.foxnews.com/category/weather" target="_blank" rel="noopener"&gt;Weather forecasts&lt;/a&gt; often feel like educated guesses. One day calls for rain, the next update walks that back. That gap between prediction and reality is something researchers have been trying to fix for years.&lt;/p&gt;&lt;p&gt;Mexico is now investing in a national climate supercomputer designed to process enormous amounts of data. The goal sounds simple but carries huge implications: deliver earlier warnings and sharper forecasts before dangerous weather hits.&lt;/p&gt;&lt;p&gt;If the plan works, communities gain more time to prepare and respond.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/ai-needs-more-power-offices-could-answer" target="_blank" rel="noopener"&gt;&lt;strong&gt;AI NEEDS MORE POWER: OFFICES COULD BE THE ANSWER&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What makes Mexico's climate supercomputer different?&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The project is being led by Claudia Sheinbaum, who serves as Mexico's president and brings a background in &lt;a href="https://www.foxnews.com/category/science/planet-earth/climate" target="_blank" rel="noopener"&gt;climate science and energy engineering&lt;/a&gt;. That experience helps explain why this initiative is getting serious attention both inside and outside the country.&lt;/p&gt;&lt;p&gt;Known as the &lt;a href="https://www.foxnews.com/category/tech/topics/computers" target="_blank" rel="noopener"&gt;Coatlicue supercomputer&lt;/a&gt;, the system goes far beyond a routine tech upgrade. Engineers designed the platform to handle a scale of computation rarely seen in public infrastructure projects across the region.&lt;/p&gt;&lt;p&gt;At peak performance, the machine will process hundreds of thousands of trillions of operations per second. That level of power mirrors hundreds of thousands of everyday computers running at the same time.&lt;/p&gt;&lt;p&gt;Officials say the system will deliver about 314 petaflops of computing power, making it the most powerful supercomputer in Latin America and more than seven times stronger than Brazil's Pegaso supercomputer.&lt;/p&gt;&lt;p&gt;Leaders also describe Coatlicue as a public supercomputer designed to support scientific research, &lt;a href="https://www.foxnews.com/category/tech/artificial-intelligence" target="_blank" rel="noopener"&gt;artificial intelligence&lt;/a&gt; and even entrepreneurial projects.&lt;/p&gt;&lt;p&gt;Researchers are feeding decades of weather records into the system, including data collected since 1950. Gaps in older records will be filled using advanced interpolation methods, allowing scientists to rebuild a more complete climate picture. Teams will test several modeling approaches and select the one with the lowest margin of error.&lt;/p&gt;&lt;p&gt;Early work will focus on densely populated regions such as Mexico City, Monterrey and Guadalajara, where more accurate forecasts can help protect millions of people.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why climate modeling needs a supercomputer&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Modern weather prediction depends on massive data analysis. Temperature, pressure, humidity and wind patterns all interact in complex ways. Small changes can lead to very different outcomes.&lt;/p&gt;&lt;p&gt;That is why Mexico partnered with the Barcelona Supercomputing Center. Researchers there are helping standardize Mexico's weather data so models produce consistent and reliable results.&lt;/p&gt;&lt;p&gt;Clean, aligned data allows forecasts to improve faster. Once programming begins, early results could arrive within weeks, offering quicker insights ahead of seasonal storms.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/trump-unveils-national-ai-policy-framework" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;TRUMP UNVEILS NATIONAL AI POLICY FRAMEWORK&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How Mexico's climate supercomputer could go beyond weather&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Climate forecasting may be the headline, but the long-term strategy reaches further. Government planners expect the system to support &lt;a href="https://www.foxnews.com/category/energy" target="_blank" rel="noopener"&gt;energy management&lt;/a&gt;, agricultural planning and artificial intelligence research.&lt;/p&gt;&lt;p&gt;According to Mexico's government, the Coatlicue system is designed to push the country deeper into artificial intelligence and large-scale data processing.&lt;/p&gt;&lt;p&gt;Officials say the system is also designed to push Mexico deeper into artificial intelligence and large-scale data processing, expanding far beyond &lt;a href="https://www.foxnews.com/category/climate-change" target="_blank" rel="noopener"&gt;weather forecasting&lt;/a&gt; into areas like energy use, agriculture and national data analysis.&lt;/p&gt;&lt;p&gt;The platform is also expected to help analyze large datasets tied to public systems, including efforts aimed at improving transparency and reducing corruption and tax evasion.&lt;/p&gt;&lt;p&gt;Data analysis at this scale can also improve how institutions track patterns across large systems, including areas where transparency matters most. That broader vision turns the project into a foundation for digital decision-making across multiple sectors.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why timing matters for Mexico's climate supercomputer&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Construction of the full system will take time. The government plans to invest about 6 billion pesos in the project, which is being built near Mexico City and is expected to take at least two years to complete.&lt;/p&gt;&lt;p&gt;Meanwhile, extreme weather continues to increase in frequency and intensity. That urgency is pushing researchers to begin modeling work now with international support rather than waiting for the final system to come online. Early progress could still make a difference in the upcoming rainy seasons.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What this means for you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Advances like this rarely stay confined to one country. Weather systems cross borders, and forecasting improvements often spread through shared research and global models.&lt;/p&gt;&lt;p&gt;More accurate predictions can translate into earlier alerts before severe storms arrive. Stronger data can help cities prepare for flooding or extreme heat. Faster analysis can reduce damage to homes, infrastructure and crops.&lt;/p&gt;&lt;p&gt;Over time, improvements in one region often influence the tools and forecasts used elsewhere. That means better information could eventually reach your phone when severe weather approaches.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;   &lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This project signals a shift in how governments approach major challenges. Climate forecasting may be the starting point, but the bigger story is how data and computing power are becoming tools for everything from energy planning to public accountability. More data and faster processing can lead to smarter decisions, but only if leaders act on what the data shows. Technology can point the way, yet it cannot make the call.&lt;/p&gt;&lt;p&gt;That leaves one question worth asking: If governments had clearer answers powered by data, would they actually move faster or just understand the problem better?  Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/mexico-supercomputer-001.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">b2e939f7-9ee9-5e1d-9481-8e908d65bdb8</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/weather</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/computers</category>
            <category domain="foxnews.com/taxonomy">fox-news/science/planet-earth/climate</category>
            <category domain="foxnews.com/taxonomy">fox-news/climate-change</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Sat, 18 Apr 2026 14:43:39 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/scammers-target-grieving-victims-online-games</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/scammers-target-grieving-victims-online-games</guid>
            <title>How scammers target grieving victims through online games</title>
            <description>The gift card scam spreading through Words With Friends and other apps</description>
            <content:encoded>&lt;p&gt;For many people, games like Words With Friends are a relaxing way to pass the time. You play a few rounds, chat with opponents and enjoy a little mental exercise. But scammers have quietly turned these &lt;a href="https://www.foxnews.com/category/tech/topics/cybercrime" target="_blank" rel="noopener"&gt;casual games into hunting grounds.&lt;/a&gt;&lt;/p&gt;&lt;p&gt;They look for players who appear friendly, are older, or &lt;a href="https://www.foxnews.com/tech/why-widows-divorced-women-targets-retirement-scams" target="_blank" rel="noopener"&gt;are recently widowed&lt;/a&gt;. Then they start a conversation. At first, it feels harmless. A compliment. A friendly message. A question about where you live.&lt;/p&gt;&lt;p&gt;Weeks later, the conversation often shifts to money. Angela from Lake Mary, MN, recently wrote to us about a situation that has her entire family worried.&lt;/p&gt;&lt;p&gt;Angela's situation is heartbreaking. Sadly, it is also very common. Authorities consider these romance scams. They cost victims billions each year. According to the Federal Trade Commission, &lt;a href="https://www.foxnews.com/tech/2026-valentines-romance-scams-how-avoid-them" target="_blank" rel="noopener"&gt;romance scams remain&lt;/a&gt; one of the most expensive fraud categories reported by consumers.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/new-fbi-warning-reveals-phishing-attacks-hitting-private-chats" target="_blank" rel="noopener"&gt;&lt;strong&gt;NEW FBI WARNING REVEALS PHISHING ATTACKS HITTING PRIVATE CHATS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How the Words With Friends scam usually begins&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Scammers often start inside casual apps where conversation feels natural. Games like Words With Friends allow players to chat during matches. That simple feature creates the perfect entry point for criminals.&lt;/p&gt;&lt;p&gt;The pattern often follows the same steps. First, the scammer begins a friendly conversation during a game. Next, they ask to &lt;a href="https://www.foxnews.com/category/tech/technologies/email" target="_blank" rel="noopener"&gt;move the conversation to email&lt;/a&gt;, text or a messaging app. Then they begin building emotional trust. Many claim to be widowed, traveling for work or working overseas.&lt;/p&gt;&lt;p&gt;Eventually, a crisis appears. They claim they need help paying a bill, fixing a problem or buying supplies. Finally, they ask for money through gift cards. Once the gift card numbers are sent, the money is usually gone.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why gift cards are a major warning sign&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Gift cards are one of the biggest red flags in scams. Criminals prefer them because they are fast and difficult to trace. Once someone shares the numbers on the back of the card, the scammer can redeem the balance immediately.&lt;/p&gt;&lt;p&gt;There is almost no way to recover the money after that. Legitimate people do not ask strangers or online acquaintances for gift cards. If someone you met online asks for them, treat it as a serious warning sign.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Can you find where the emails or texts are coming from?&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Angela asked whether it is possible to trace the messages. Sometimes it is. Often it is difficult. Scammers work hard to &lt;a href="https://www.foxnews.com/category/tech/topics/hackers" target="_blank" rel="noopener"&gt;hide their identity and location.&lt;/a&gt;&lt;/p&gt;&lt;p&gt;They often use:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;VoIP numbers such as Google Voice&lt;/li&gt;&lt;li&gt;Email accounts created specifically for scams&lt;/li&gt;&lt;li&gt;VPN services that hide their true location&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Because of this, a message may appear to come from the United States even if the scammer is overseas. Still, there are a few steps that can sometimes uncover clues.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Check the full email headers for clues&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;If the communication is happening by email, the full email header may reveal the route the message traveled. Headers sometimes contain the originating IP address. That address may show the country where the email began its journey.&lt;/p&gt;&lt;p&gt;Free tools such as &lt;a href="https://www.foxnews.com/category/tech/companies/google" target="_blank" rel="noopener"&gt;Google's Messageheader&lt;/a&gt; analyzer, MXToolbox and Microsoft's Message Header Analyzer can break down email headers and show the path a message traveled across mail servers. &lt;/p&gt;&lt;p&gt;While this information will not usually reveal the scammer's true identity, it can sometimes indicate the network or country where the email originated. &lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/apple-pay-text-scam-almost-cost-15000" target="_blank" rel="noopener"&gt;&lt;strong&gt;APPLE PAY TEXT SCAM ALMOST COST HER $15,000&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Reverse search the photos&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/ai-deepfake-romance-scam-steals-womans-home-life-savings" target="_blank" rel="noopener noreferrer nofollow"&gt;&lt;u&gt;Romance scammers&lt;/u&gt;&lt;/a&gt; almost always steal photos from real people. Those photos often come from social media profiles or professional websites. You can upload the images to reverse search tools such as Google Images.&lt;/p&gt;&lt;p&gt;If the same photo appears under multiple names or accounts, that is strong evidence of a scam. Showing that proof sometimes helps victims reconsider what is happening.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Search the phone number or username&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Another simple step is searching for the contact information online. Enter the phone number, email address or username along with words like scam or romance scam.&lt;/p&gt;&lt;p&gt;Many scammers reuse the same identity across multiple victims. In some cases, other people have already reported the same name or number. Finding those reports can help reveal the pattern.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Report the account inside the game&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;If the conversation began on &lt;a href="https://www.foxnews.com/category/tech/technologies/apps" target="_blank" rel="noopener"&gt;Words With Friends,&lt;/a&gt; the account can be reported directly through the game. Companies investigate reports and often remove accounts involved in fraud.&lt;/p&gt;&lt;p&gt;That action will not always stop the scammer completely. However, it can prevent them from targeting additional players.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The hardest part of these scams&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The emotional connection can be stronger than the evidence. Scammers spend weeks building trust. They learn about the victim's life, their losses and their fears. Then they present themselves as someone who understands.&lt;/p&gt;&lt;p&gt;For someone who is grieving or lonely, that connection can feel very real. Experts often recommend approaching the situation carefully.&lt;/p&gt;&lt;p&gt;Avoid accusations or heated arguments. Instead, focus on protecting finances and calmly presenting evidence. &lt;/p&gt;&lt;p&gt;Family members may also help by monitoring financial activity or encouraging a pause before sending money.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/google-search-led-costly-scam-call" target="_blank" rel="noopener"&gt;&lt;strong&gt;GOOGLE SEARCH LED TO A COSTLY SCAM CALL&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How to stay safe from Words With Friends and romance scams&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/category/lifestyle/relationships" target="_blank" rel="noopener"&gt;Romance scams&lt;/a&gt; continue to grow. A few practical steps can help reduce the risk.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Be cautious with strangers in online games&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Friendly chat inside games can easily become manipulation. Be careful when strangers try to move the conversation elsewhere.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Never send gift cards to someone you met online&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Gift cards are one of the most common tools used in scams. Treat any request for them as a warning sign.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Reverse search profile photos&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Running a quick image search can reveal stolen photos used by scammers. &lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Talk to family before sending money&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;A second opinion can stop a scam before it becomes expensive. &lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Report scams to authorities&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If you suspect fraud, report it to the Federal Trade Commission at https://reportfraud.ftc.gov.&lt;/p&gt;&lt;p&gt;Reports help investigators track organized criminal networks.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) Keep conversations inside the game platform&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scammers almost always try to move the conversation to text, email or messaging apps. Staying inside the game platform makes it easier to report suspicious behavior.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Monitor credit and financial accounts&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Some scammers eventually ask victims for personal details such as bank information or identification documents. Monitoring your credit reports and financial accounts can help detect suspicious activity early. See my tips and best picks on Best Identity Theft Protection at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;8) Reduce how much personal information appears online&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scammers often research potential victims through people-search websites and public records. Limiting the personal details that appear online can make it harder for criminals to target you. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;9) Watch for sudden emergencies or travel stories&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Romance scammers often claim they are working overseas, stuck on an oil rig or deployed in the military. These stories are designed to explain why they cannot meet in person.  &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Angela's story shows how easily these scams can begin. They often start in places that feel harmless. A simple word game. A friendly chat. A conversation that slowly becomes personal. By the time money enters the picture, the emotional bond may already feel strong. That is why families must focus on patience and protection. Helping someone step back from a scam can take time, but support and evidence can make a difference.&lt;/p&gt;&lt;p&gt;If a friendly opponent in a simple word game started messaging you every day, would you recognize the moment when the conversation turns into a scam? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/apps-products?pid=AppArticleLink" target="_blank" rel="noopener noreferrer nofollow"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO GET THE FOX NEWS APP&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/online-game-gift-card-scam-1.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">b2c1fc3b-0946-5eb6-b9bf-8e1d695cf43c</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/email</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/apps</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Fri, 17 Apr 2026 12:30:10 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/ai-newsletter-tech-company-cuts-1000-jobs-ai-driven-restructuring</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/ai-newsletter-tech-company-cuts-1000-jobs-ai-driven-restructuring</guid>
            <title>Fox News AI Newsletter: Tech company cuts 1,000 jobs in AI-driven restructuring</title>
            <description>Stay up to date on the latest AI technology advancements, and learn about the challenges and opportunities AI presents</description>
            <content:encoded>&lt;h2&gt;Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;IN TODAY’S NEWSLETTER:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;- Snapchat parent company cuts 1,000 jobs in major AI-driven workforce restructuring &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;- The AI you use every day is biased — and it's quietly shaping your worldview, new report says&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;- First-ever moratorium on AI data centers passes Maine legislature&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;TECH SHAKE-UP:&lt;/strong&gt; &lt;strong&gt;Snapchat parent company cuts 1,000 jobs in major AI-driven workforce restructuring &lt;/strong&gt;&lt;i&gt;–&lt;/i&gt;&lt;strong&gt; &lt;/strong&gt;&lt;i&gt;Snapchat's parent company, Snap, announced it is &lt;/i&gt;&lt;a href="https://www.foxbusiness.com/markets/snapchat-parent-company-cuts-1000-jobs-major-ai-driven-workforce-restructuring" target="_blank" rel="noopener"&gt;&lt;i&gt;laying off approximately 1,000 employees &lt;/i&gt;&lt;/a&gt;&lt;i&gt;— about 16% of its full-time workforce — as part of a major restructuring effort driven by the integration of artificial intelligence. The tech firm expects the cuts and AI-driven workflow efficiencies to yield over $500 million in annualized savings after pressure from an activist investor to streamline operations and rein in costs.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;CODED INFLUENCE: The AI you use every day is biased — and it's quietly shaping your worldview, new report says&lt;/strong&gt; &lt;i&gt;– A new report from the America First Policy Institute reveals that popular artificial intelligence systems &lt;/i&gt;&lt;a href="https://www.foxnews.com/politics/ai-you-use-every-day-biased-its-quietly-shaping-your-worldview-new-report-says" target="_blank" rel="noopener"&gt;&lt;i&gt;consistently lean left&lt;/i&gt;&lt;/a&gt;&lt;i&gt; and possess a subtle ideological bias that can quietly shape users' worldviews. The findings suggest that these hidden design choices not only reflect ideological assumptions but can actively persuade and influence public opinion on key political and social issues, raising transparency concerns over AI's growing role in daily life.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;TECH BOOM BRAKES: First-ever moratorium on AI data centers passes Maine legislature &lt;/strong&gt;&lt;i&gt;–&lt;/i&gt; &lt;i&gt;Maine is poised to become the &lt;/i&gt;&lt;a href="https://www.foxnews.com/politics/first-ever-moratorium-ai-data-centers-passes-maine-legislature" target="_blank" rel="noopener"&gt;&lt;i&gt;first state to impose a moratorium&lt;/i&gt;&lt;/a&gt;&lt;i&gt; on large artificial intelligence data centers, advancing legislation that would pause approvals for hyperscale centers requiring over 20 megawatts of power until October 2027. The move, which reflects growing national backlash over power grid strain and environmental impacts, will serve as a major test case for how states balance the massive energy demands of Big Tech with local economic and ecological concerns.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;COPYCAT RISK: Molotov cocktail attack on Sam Altman's home sparks fears of copycat strikes against tech executives &lt;/strong&gt;&lt;i&gt;– After a predawn &lt;/i&gt;&lt;a href="https://www.foxnews.com/us/molotov-cocktail-attack-sam-altman-home-sparks-fears-copycat-strikes-tech-executives" target="_blank" rel="noopener"&gt;&lt;i&gt;Molotov cocktail attack&lt;/i&gt;&lt;/a&gt;&lt;i&gt; on OpenAI CEO Sam Altman's San Francisco home, federal authorities are on high alert for copycat strikes against other high-profile tech executives. The suspect, Daniel Moreno-Gama, was motivated by anti-AI extremism and allegedly carried a manifesto listing additional AI executives and their addresses, prompting San Francisco District Attorney Brooke Jenkins to pursue aggressive prosecution amid escalating rhetoric surrounding artificial intelligence.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;EVOLVED HACKING: AI is now powering cyberattacks, Microsoft warns &lt;/strong&gt;&lt;i&gt;–&lt;/i&gt; &lt;i&gt;According to a &lt;/i&gt;&lt;a href="https://www.foxnews.com/tech/ai-now-powering-cyberattacks-microsoft-warns" target="_blank" rel="noopener"&gt;&lt;i&gt;new report&lt;/i&gt;&lt;/a&gt;&lt;i&gt; from Microsoft Threat Intelligence, cybercriminals and nation-state actors are increasingly utilizing artificial intelligence to accelerate and scale their cyberattacks. Hackers are using generative AI to write convincing phishing emails, build malicious infrastructure and dynamically generate malware, significantly lowering the technical barrier to entry for cybercrime and prompting calls for stronger digital security measures.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;WATCH OUT: Is Mark Zuckerberg's Meta AI getting too smart? &lt;/strong&gt;&lt;i&gt;–&lt;/i&gt; &lt;i&gt;Meta has unveiled its foundational AI model, Muse Spark, equipping its Meta AI assistant with &lt;/i&gt;&lt;a href="https://www.foxnews.com/tech/mark-zuckerbergs-meta-ai-getting-smart" target="_blank" rel="noopener"&gt;&lt;i&gt;advanced multimodal capabilities&lt;/i&gt;&lt;/a&gt;&lt;i&gt; like image comprehension and parallel task handling across apps like WhatsApp, Instagram and Facebook. Fox News Digital details that the upgrade is part of Mark Zuckerberg's aggressive push toward a "personal superintelligence," allowing the AI to seamlessly analyze photos, answer complex health queries and simultaneously execute multistep planning tasks.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;OPINION: SEN BERNIE SANDERS: Artificial intelligence is coming for the working class. We must fight back &lt;/strong&gt;&lt;i&gt;–&lt;/i&gt; &lt;i&gt;Sen. Bernie Sanders is calling for a &lt;/i&gt;&lt;a href="https://www.foxnews.com/opinion/sen-bernie-sanders-artificial-intelligence-coming-working-class-must-fight-back-" target="_blank" rel="noopener"&gt;&lt;i&gt;federal moratorium&lt;/i&gt;&lt;/a&gt;&lt;i&gt; on new artificial intelligence data centers until strong safeguards are enacted to protect the working class from widespread job displacement. Sen. Sanders warns that AI oligarchs are deploying revolutionary technologies to replace human workers entirely, urging Congress to rethink the American social contract and ensure the AI boom benefits everyday citizens rather than just billionaires.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;COSTLY CONVENIENCE: OPINION: AI tax filing sounds easy — until it leaves you owing the IRS thousands of dollars&lt;/strong&gt; &lt;i&gt;– While using AI chatbots like ChatGPT to file taxes may seem like a convenient shortcut, relying on them can lead to costly errors and &lt;/i&gt;&lt;a href="https://www.foxnews.com/opinion/ai-tax-filing-sounds-easy-leaves-owing-irs-thousands-dollars" target="_blank" rel="noopener"&gt;&lt;i&gt;severe IRS penalties&lt;/i&gt;&lt;/a&gt;&lt;i&gt; due to the tools' inability to accurately apply complex tax codes. Expert Hemant Bhargava cautions taxpayers to treat AI as a translator rather than a decision-maker, emphasizing that consumer AI systems frequently miscalculate liabilities and fail to securely handle highly sensitive financial data.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;DIGITAL DOPPELGANGER: Meta reportedly building an AI version of Mark Zuckerberg to interact with company employees &lt;/strong&gt;&lt;i&gt;–&lt;/i&gt; &lt;i&gt;Meta is reportedly developing a photorealistic, &lt;/i&gt;&lt;a href="https://www.foxnews.com/media/meta-reportedly-building-ai-version-mark-zuckerberg-interact-company-employees" target="_blank" rel="noopener"&gt;&lt;i&gt;artificial intelligence-powered version&lt;/i&gt;&lt;/a&gt;&lt;i&gt; of CEO Mark Zuckerberg to interact directly with company employees, according to a recent report. Zuckerberg has been actively training the AI character on his own mannerisms and strategies to foster stronger internal connections, a move that aligns with the tech giant's broader ambition to integrate "personal superintelligence" across its platforms.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;MAJOR REVAMP: Allbirds drops sneakers, reinvents itself as an AI infrastructure company &lt;/strong&gt;&lt;i&gt;–&lt;/i&gt; &lt;i&gt;San Francisco-based footwear brand Allbirds is &lt;/i&gt;&lt;a href="https://www.foxbusiness.com/markets/allbirds-drops-sneakers-reinvents-itself-ai-infrastructure-company" target="_blank" rel="noopener"&gt;&lt;i&gt;abandoning its sneaker business&lt;/i&gt;&lt;/a&gt;&lt;i&gt; to reinvent itself as an artificial intelligence infrastructure company called NewBird AI. The stunning pivot involves a $50 million convertible financing agreement to acquire high-performance graphics processing units (GPUs), aiming to meet the massive, unmet demand for AI cloud computing capacity among enterprise developers.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;'KEEP UP': Reese Witherspoon warns AI is three times more likely to replace women &lt;/strong&gt;&lt;i&gt;–&lt;/i&gt; &lt;i&gt;Actress Reese Witherspoon took to Instagram to urge women to &lt;/i&gt;&lt;a href="https://www.foxnews.com/media/reese-witherspoon-warns-ai-three-times-likely-replace-women" target="_blank" rel="noopener"&gt;&lt;i&gt;embrace artificial intelligence,&lt;/i&gt;&lt;/a&gt;&lt;i&gt; warning that jobs traditionally held by women are three times more likely to be automated by the emerging technology. Witherspoon's concerns align with a recent U.N. study, and the Hollywood star is encouraging her followers to actively learn about AI so they aren't left behind in a rapidly evolving digital landscape.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;LATTE UPGRADE: Starbucks uses ChatGPT to suggest drinks based on mood as expert warns of hidden downsides &lt;/strong&gt;&lt;i&gt;–&lt;/i&gt; &lt;i&gt;Starbucks has launched a beta integration with ChatGPT, allowing customers to receive &lt;/i&gt;&lt;a href="https://www.foxnews.com/food-drink/starbucks-uses-chatgpt-suggest-drinks-based-mood-expert-warns-hidden-downsides" target="_blank" rel="noopener"&gt;&lt;i&gt;customized beverage recommendations&lt;/i&gt;&lt;/a&gt;&lt;i&gt; tailored to their mood, taste and even the weather. Fox News Digital reports that while the AI tool offers a fun and highly personalized ordering experience, experts warn it could quietly manipulate consumer behavior by consistently nudging users toward sweeter, higher-calorie drinks that satisfy impulsive emotional cravings.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;SPOT ON: AI could be coming for your wine as experts turn to technology for industry overhaul&lt;/strong&gt; &lt;i&gt;– Scientists have developed an AI-powered handheld &lt;/i&gt;&lt;a href="https://www.foxnews.com/food-drink/ai-could-coming-your-wine-experts-turn-tech-industry-overhaul" target="_blank" rel="noopener"&gt;&lt;i&gt;sensor called RipenAI&lt;/i&gt;&lt;/a&gt;&lt;i&gt; that uses machine learning and optical technology to instantly determine the ripeness of grapes directly on the vine. This revolutionary, non-destructive tool could transform the winemaking industry by optimizing harvest timing and improving the overall quality and efficiency of wine production.&lt;/i&gt;&lt;/p&gt;&lt;h2&gt;&lt;a href="https://www.foxnews.com/newsletters" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/h2&gt;&lt;h3&gt;&lt;strong&gt;FOLLOW FOX NEWS ON SOCIAL MEDIA&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;&lt;a href="https://www.facebook.com/FoxNews" target="_blank" rel="nofollow noopener"&gt;&lt;u&gt;Facebook&lt;/u&gt;&lt;/a&gt;&lt;br&gt;&lt;a href="https://www.instagram.com/foxnews/" target="_blank" rel="nofollow noopener"&gt;&lt;u&gt;Instagram&lt;/u&gt;&lt;/a&gt;&lt;br&gt;&lt;a href="https://www.youtube.com/c/FoxNews/featured" target="_blank" rel="nofollow noopener"&gt;&lt;u&gt;YouTube&lt;/u&gt;&lt;/a&gt;&lt;br&gt;&lt;a href="https://x.com/FoxNews" target="_blank" rel="nofollow noopener"&gt;&lt;u&gt;X&lt;/u&gt;&lt;/a&gt;&lt;br&gt;&lt;a href="https://www.linkedin.com/company/fox-news-channel/" target="_blank" rel="noopener"&gt;&lt;u&gt;LinkedIn&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;a href="https://www.linkedin.com/company/fox-news-channel/" target="_blank" rel="nofollow noopener"&gt;&lt;strong&gt;SIGN UP FOR OUR OTHER NEWSLETTERS&lt;/strong&gt;&lt;/a&gt;&lt;/h3&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/newsletters" target="_blank" rel="noopener"&gt;&lt;u&gt;Fox News First&lt;/u&gt;&lt;/a&gt;&lt;br&gt;&lt;a href="https://www.foxnews.com/newsletters" target="_blank" rel="noopener"&gt;&lt;u&gt;Fox News Opinion&lt;/u&gt;&lt;/a&gt;&lt;br&gt;&lt;a href="https://www.foxnews.com/newsletters" target="_blank" rel="noopener"&gt;&lt;u&gt;Fox News Lifestyle&lt;/u&gt;&lt;/a&gt;&lt;br&gt;&lt;a href="https://www.foxnews.com/newsletters" target="_blank" rel="noopener"&gt;&lt;u&gt;Fox News Health&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;DOWNLOAD OUR APPS&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/apps-products?pid=AppArticleLink" target="_blank" rel="noopener"&gt;&lt;u&gt;Fox News&lt;/u&gt;&lt;/a&gt;&lt;br&gt;&lt;a href="https://www.foxbusiness.com/apps-products" target="_blank" rel="noopener"&gt;&lt;u&gt;Fox Business&lt;/u&gt;&lt;/a&gt;&lt;br&gt;&lt;a href="https://www.foxweather.com/app" target="_blank" rel="noopener"&gt;&lt;u&gt;Fox Weather&lt;/u&gt;&lt;/a&gt;&lt;br&gt;&lt;a href="https://www.foxsports.com/mobile" target="_blank" rel="noopener"&gt;&lt;u&gt;Fox Sports&lt;/u&gt;&lt;/a&gt;&lt;br&gt;&lt;a href="https://tubitv.com/" target="_blank" rel="noopener"&gt;&lt;u&gt;Tubi&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;WATCH FOX NEWS ONLINE&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/go" target="_blank" rel="noopener"&gt;&lt;u&gt;Fox News Go&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;STREAM FOX NATION&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;&lt;a href="https://nation.foxnews.com/" target="_blank" rel="noopener"&gt;&lt;u&gt;Fox Nation&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Stay up to date on the latest AI technology advancements, and learn about the challenges and opportunities AI presents now and for the future with Fox News &lt;a href="https://www.foxnews.com/category/tech/artificial-intelligence" target="_blank" rel="noopener"&gt;&lt;u&gt;here&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/snapchat-layoffs.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">5585e16b-c988-5804-a340-09d0f24ecebd</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
            <category domain="foxnews.com/taxonomy">fox-news/columns/artificial-intelligence-newsletter</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Fri, 17 Apr 2026 12:09:27 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/mark-zuckerbergs-meta-ai-getting-smart</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/mark-zuckerbergs-meta-ai-getting-smart</guid>
            <title>Is Mark Zuckerberg's Meta AI getting too smart?</title>
            <description>Meta’s new AI model, Muse Spark, powers smarter, faster, more personal experiences across the apps you already use</description>
            <content:encoded>&lt;p&gt;If you've ever wished your phone could just see what you're dealing with instead of making you type it all out, Meta heard you. The company just launched its new AI model, &lt;a href="https://www.foxnews.com/category/tech/artificial-intelligence" target="_blank" rel="noopener"&gt;Muse Spark&lt;/a&gt;, now powering the Meta AI assistant, and it's rolling out across the Meta AI app, WhatsApp, Instagram, Facebook, Messenger and even its AI glasses in the coming weeks.&lt;/p&gt;&lt;p&gt;It's the first major release from Meta Superintelligence Labs, a division &lt;a href="https://www.foxnews.com/category/person/mark-zuckerberg" target="_blank" rel="noopener"&gt;Mark Zuckerberg&lt;/a&gt; founded nine months ago with one stated goal: putting "personal superintelligence" in everyone's hands.&lt;/p&gt;&lt;p&gt;That's a big promise. So let's look at what's actually here right now.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/media/reese-witherspoon-warns-ai-three-times-likely-replace-women" target="_blank" rel="noopener"&gt;&lt;strong&gt;REESE WITHERSPOON WARNS AI IS THREE TIMES MORE LIKELY TO REPLACE WOMEN&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt; &lt;/h2&gt;&lt;h2&gt;&lt;strong&gt;What is Meta's Muse Spark AI model?&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Muse Spark is Meta's foundational AI model, the first in a deliberate scaling series where each version validates and builds on the last before Meta goes bigger. The team rebuilt its AI stack from the ground up over the past nine months, making this one of the fastest development cycles the company has ever run.&lt;/p&gt;&lt;p&gt;The model is described as small and fast by design, yet capable enough to reason through complex questions in science, math and health. Think of it as a strong foundation rather than the ceiling. Meta has already confirmed the next generation is in development.&lt;/p&gt;&lt;p&gt;Right now, Muse Spark powers the Meta AI assistant across the Meta AI app and meta.ai. That's your entry point if you want to try it today.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How Meta AI's new modes actually work&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The upgraded Meta AI now runs in two modes: Instant and Thinking. Instant handles quick questions. Thinking digs into more complex problems that need stronger reasoning. You switch between them, depending on what you need.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/media/meta-reportedly-building-ai-version-mark-zuckerberg-interact-company-employees" target="_blank" rel="noopener"&gt;&lt;strong&gt;META REPORTEDLY BUILDING AN AI VERSION OF MARK ZUCKERBERG TO INTERACT WITH COMPANY EMPLOYEES&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;What's genuinely new is how it handles both at the same time. Meta AI can now &lt;a href="https://www.foxnews.com/tech" target="_blank" rel="noopener"&gt;launch multiple subagents&lt;/a&gt; in parallel. Planning a family trip to Florida? One agent drafts the itinerary, another compares Orlando to the Keys, and a third pulls up kid-friendly activities, all at the same time. You get a better, more complete answer in less time.&lt;/p&gt;&lt;p&gt;That's a real shift. Most AI assistants work through tasks one at a time. Running them in parallel is closer to how a capable human research team actually operates, and honestly, it's about time.&lt;/p&gt;&lt;p&gt;As Mark Zuckerberg wrote in a recent Facebook post, "We are building products that don't just answer your questions but act as agents that do things for you."  &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Meta AI can now see what you see&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This is one of the most practical changes in Muse Spark. Meta built strong multimodal perception into the model, which means Meta AI can look at images rather than just read text you type.&lt;/p&gt;&lt;p&gt;Snap a photo of an airport snack shelf and ask which options have the most protein. Scan a product and ask how it stacks up against alternatives. The AI works with what you're seeing, which cuts out the whole "let me describe what's in front of me" step that makes most AI assistants feel clunky in real life.&lt;/p&gt;&lt;p&gt;When Muse Spark rolls out to &lt;a href="https://www.foxnews.com/category/tech/technologies/wearable-tech" target="_blank" rel="noopener"&gt;Meta's AI glasses&lt;/a&gt;, this capability becomes especially interesting. The assistant will be able to see and understand your environment in real time, without you having to hold up a phone at all.  &lt;/p&gt;&lt;h2&gt; &lt;/h2&gt;&lt;h2&gt;&lt;strong&gt;How Meta AI answers health questions differently&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Health is one of the top reasons people turn to AI, and Meta addressed that directly. Meta AI can now &lt;a href="https://www.foxnews.com/health" target="_blank" rel="noopener"&gt;handle health questions&lt;/a&gt; with more detailed responses, including questions that involve images and charts.&lt;/p&gt;&lt;p&gt;The company worked with a team of physicians to develop the model's ability to respond to common health questions and concerns. That doesn't replace your doctor. But it does mean you can show Meta AI a chart from your lab results or a diagram from a health website and get a meaningful, informed response rather than a wall of disclaimers.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/opinion/sen-bernie-sanders-artificial-intelligence-coming-working-class-must-fight-back-" target="_blank" rel="noopener"&gt;&lt;strong&gt;OPINION: SEN BERNIE SANDERS: ARTIFICIAL INTELLIGENCE IS COMING FOR THE WORKING CLASS. WE MUST FIGHT BACK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;That's actually useful. Most people have been there, squinting at a chart from their physician's portal with zero context. Having something that can look at it with you changes the experience.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Meta AI shopping mode changes how you find products&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Starting today in the U.S., the Meta AI app has a dedicated Shopping mode. It helps users figure out what to wear, style a room or find a gift for someone specific.&lt;/p&gt;&lt;p&gt;Rather than pulling from a generic product database, Shopping mode surfaces ideas from creators and communities already active on Facebook, Instagram and Threads. The result feels more like getting a recommendation from someone with a good eye than navigating a department store website.&lt;/p&gt;&lt;p&gt;That's a meaningfully different approach, and it's one Meta is uniquely positioned to pull off, given the content ecosystem it already owns.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What this means for you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;If &lt;a href="https://www.foxnews.com/category/tech/companies/facebook" target="_blank" rel="noopener"&gt;you use Facebook,&lt;/a&gt; Instagram or WhatsApp regularly, Meta AI powered by Muse Spark is already on its way to you. You will not need to download anything new or hunt for it. It will show up inside the apps you already use. So what actually changes day to day?&lt;/p&gt;&lt;p&gt;First, you spend less time explaining things. If you have ever tried to describe a label, a chart or something confusing in front of you, this will feel like a big upgrade. Just snap a photo, ask your question, and move on. No long explanations. No back and forth.&lt;/p&gt;&lt;p&gt;Next, planning gets easier. Trips, events or even simple decisions often mean jumping between tabs and comparing options. Meta AI now handles multiple parts of that process at once. You get a clearer answer faster, without doing five separate searches.&lt;/p&gt;&lt;p&gt;Shopping also starts to feel different. Right now, the new shopping mode is only available in the U.S. But it pulls ideas from real posts, creators and communities across Meta's apps. That gives you suggestions that feel more like recommendations from people, not just search results.&lt;/p&gt;&lt;p&gt;And then there is what comes next. If &lt;a href="https://www.foxnews.com/tech/meta-smart-glasses-privacy-concerns-grow" target="_blank" rel="noopener noreferrer nofollow"&gt;&lt;u&gt;Meta's AI glasses&lt;/u&gt;&lt;/a&gt; have felt easy to ignore so far, that may change. When the AI can see what you see in real time, without you pulling out your phone, it starts to feel less like a feature and more like something built into your day. That is where this begins to stand out.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaway&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Meta is moving quickly, and Muse Spark is the first real sign that Meta Superintelligence Labs is building something that could stick. What stands out is how practical this feels. The ability to understand images, handle multiple tasks at once and respond to health questions are not features designed to just dazzle in a demo. They are built for the messy, visual, fast-moving reality of everyday life. This is not the final version. Meta already has the next generation in the works. API access is coming to select partners, and open-source models are part of the plan. Think of this as the starting point. And based on how fast Meta is moving, it may not stay "early" for long.&lt;/p&gt;&lt;p&gt;If an AI starts planning your trips, guiding your choices and handling tasks for you, where do you draw the line? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;CyberGuy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/apps-products?pid=AppArticleLink" target="_blank" rel="noopener noreferrer nofollow"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO GET THE FOX NEWS APP&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;CyberGuy.com&lt;/strong&gt; trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/meta-ai-muse-spark-1.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">47d27a2a-1340-52c5-b467-9bbff361c1b8</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/wearable-tech</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/facebook</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/instagram</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Fri, 17 Apr 2026 08:40:01 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/5-worrisome-privacy-clauses-hidden-smart-home-devices</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/5-worrisome-privacy-clauses-hidden-smart-home-devices</guid>
            <title>5 worrisome privacy clauses hidden in smart home devices</title>
            <description>Your TV, car and voice assistants may be collecting more data than you think</description>
            <content:encoded>&lt;p&gt;Many of the apps and devices we use every day contain privacy terms most people never read. Yet those clauses often allow extensive data harvesting, behavioral tracking and long-term storage of personal information. Some even allow companies to access recordings or share data with partners.&lt;/p&gt;&lt;p&gt;The reality is simple. Smart devices inside your home and car can build detailed profiles about your daily life. Your schedule. Your habits. Even your conversations. One way I explain this to people is simple. Your phone knows where you go. Your smart home knows what you do when you get there. I unpack how this works in everyday life on my Beyond Connected podcast at &lt;i&gt;&lt;strong&gt;getbeyondconnected.com&lt;/strong&gt;&lt;/i&gt;. In many cases, these devices are not just reacting to you. They are actively logging, analyzing, and storing your behavior by default, often without you realizing it.&lt;/p&gt;&lt;p&gt;Let's walk through five &lt;a href="https://www.foxnews.com/category/tech/topics/privacy" target="_blank" rel="noopener"&gt;privacy clauses&lt;/a&gt; that surprise most people. We will start with number five and count down to the most unsettling one.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/your-phone-shares-data-night-heres-how-stop" target="_blank" rel="noopener"&gt;&lt;strong&gt;YOUR PHONE SHARES DATA AT NIGHT: HERE'S HOW TO STOP IT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Clause No. 5: 'We log and share your driving data'&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Today's vehicles are no longer just transportation. Many now operate as connected computers on wheels. Connected vehicle platforms and systems, such as Android Automotive OS, collect large amounts of telemetry data.&lt;/p&gt;&lt;p&gt;That can include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Vehicle speed&lt;/li&gt;&lt;li&gt;Seat usage&lt;/li&gt;&lt;li&gt;Climate controls&lt;/li&gt;&lt;li&gt;Location and trip data&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Researchers have found that vehicles may gather dozens or even hundreds of data points during normal driving. In some cases, researchers found that vehicle speed can be logged as frequently as 25 times per second, creating a highly detailed record of how you drive.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;What this means for drivers&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Your car may know:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Where you drive&lt;/li&gt;&lt;li&gt;When you drive&lt;/li&gt;&lt;li&gt;How aggressively you accelerate or brake&lt;/li&gt;&lt;li&gt;Which seats are occupied&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;That data can be used to infer stops, turns, and even risky driving behavior. In some cases, it may also be shared with third parties for advertising, insurance, or financing purposes. In other words, your vehicle can create a detailed picture of your driving behavior and routines. Many drivers never realize how much information their car collects.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Clause No. 4: 'We track what you watch'&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/category/entertainment/tv" target="_blank" rel="noopener"&gt;Your television&lt;/a&gt; may be one of the most active data collectors in your home. Many smart TVs from brands like Samsung, LG, and Roku use a technology called Automatic Content Recognition, often shortened to ACR.&lt;/p&gt;&lt;p&gt;ACR can analyze what appears on your screen across:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Streaming apps&lt;/li&gt;&lt;li&gt;Cable television&lt;/li&gt;&lt;li&gt;Gaming consoles&lt;/li&gt;&lt;li&gt;HDMI devices&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This technology works in real time, identifying what you are watching and reporting that information back to the company. Some policies even state that snippets of audio or video may be shared with third parties to match ads to your viewing. Some lawsuits have alleged that certain TVs capture screenshots extremely frequently to identify content.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Why this matters&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Your TV can learn:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What shows you watch&lt;/li&gt;&lt;li&gt;When you watch them&lt;/li&gt;&lt;li&gt;How long you stay on each program&lt;/li&gt;&lt;li&gt;Which devices you connect to the TV&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;That means the show you binge, the time you watch it, and even how long you stay engaged can be packaged and sold to advertisers almost instantly. That viewing data may then be shared with advertising partners to build detailed marketing profiles.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Clause No. 3: 'We track your behavior and location'&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Video doorbells are designed to increase home security. Yet they can also gather large amounts of behavioral data. Devices like the Ring Video Doorbell may automatically collect information such as:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Device identifiers&lt;/li&gt;&lt;li&gt;Browsing activity&lt;/li&gt;&lt;li&gt;Usage patterns&lt;/li&gt;&lt;li&gt;Timestamps&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Privacy disclosures also show that these devices can collect geolocation data, IP addresses, and details about the devices connected to your network.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;What that data can reveal&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Over time, a doorbell camera can build a timeline that shows:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;When you leave home&lt;/li&gt;&lt;li&gt;When deliveries arrive&lt;/li&gt;&lt;li&gt;How often visitors come&lt;/li&gt;&lt;li&gt;Which devices connect to your network&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Put together, this creates a detailed map of your daily routine, including when you are home, when you are away, and how your household operates. Individually, these signals seem harmless. Together, they can reveal detailed patterns about your household. If an account is ever compromised, that data can act as a blueprint of your life, not just a camera feed.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Clause No. 2: 'Humans may review your recordings'&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Some smart devices store recordings that help improve voice recognition and AI systems. Devices that may store recordings include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://www.foxnews.com/category/tech/companies/amazon" target="_blank" rel="noopener"&gt;Amazon Echo&lt;/a&gt; smart speakers&lt;/li&gt;&lt;li&gt;Ring video doorbells&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Past regulatory findings have raised concerns about how companies manage that stored data. In some cases, recordings may be accessed by:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Human reviewers&lt;/li&gt;&lt;li&gt;Contractors&lt;/li&gt;&lt;li&gt;Internal teams that are training AI systems&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Some company disclosures state that a small number of recordings may be reviewed by research and development teams to improve products and services.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Why this clause raises eyebrows&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;The goal of human review is often to improve voice assistants or detect errors. Still, many users never realize that recordings captured inside their homes may be reviewed by people. That means a conversation in your living room or a clip from your front door could be seen or heard by someone you have never met. Transparency about how this process works remains an ongoing discussion across the tech industry.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Clause No. 1: 'We store your voice indefinitely'&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Voice assistants sit quietly in kitchens, bedrooms, and living rooms waiting for their wake word. Devices like the Amazon Echo process voice commands in the cloud.&lt;/p&gt;&lt;p&gt;According to company disclosures, voice interactions can include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Audio recordings sent to cloud servers&lt;/li&gt;&lt;li&gt;Transcripts stored in your account&lt;/li&gt;&lt;li&gt;Voice data used to improve services&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;In many cases, these recordings are saved by default and can remain stored indefinitely unless you manually delete them or change your settings.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Why this is the most surprising clause&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Over time, your voice assistant may accumulate years of audio interactions. That can include everything from grocery lists and song requests to conversations you did not even realize were captured. That history can reveal daily routines, requests, shopping habits, and personal questions. Most people never review or delete those recordings.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Why smart devices are a privacy multiplier&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Each individual device collects only part of the picture. Together, they can reveal an astonishing amount of detail about your life. Smart devices inside your home and vehicle may capture:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Conversations&lt;/li&gt;&lt;li&gt;Daily schedules&lt;/li&gt;&lt;li&gt;Viewing habits&lt;/li&gt;&lt;li&gt;Location history&lt;/li&gt;&lt;li&gt;Visitor patterns&lt;/li&gt;&lt;li&gt;Voice biometrics&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Combined, this data allows companies to build extremely detailed behavioral profiles. That is why privacy experts call connected homes a data multiplier. In many cases, the value of that data is part of the business model, helping offset the cost of the devices themselves.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;5 privacy moves to take back control of your tech&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The good news is you still have ways to reduce how much information your devices collect. Here are a few practical steps that can make a big difference. &lt;/p&gt;&lt;h2&gt; &lt;/h2&gt;&lt;h2&gt;&lt;strong&gt;No. 5: Audit your app permissions&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Start by reviewing what access your apps have to your devices. If you use smart home apps like Ring, also check in-app privacy settings such as Control Center and turn off sharing with third parties where available.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On iPhone&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Privacy &amp; Security&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select &lt;strong&gt;Location Services&lt;/strong&gt;, &lt;strong&gt;Microphone&lt;/strong&gt; or &lt;strong&gt;Camera&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Review &lt;strong&gt;which apps&lt;/strong&gt; have access&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Whenever possible, set location access to &lt;strong&gt;While Using the App&lt;/strong&gt; rather than &lt;strong&gt;Always&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On Android&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;S&lt;i&gt;ettings may vary depending on your &lt;/i&gt;&lt;a href="https://www.foxnews.com/category/tech/technologies/android" target="_blank" rel="noopener"&gt;Android phone’s manufacturer&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/data-brokers-accused-hiding-opt-out-pages-from-google" target="_blank" rel="noopener"&gt;&lt;strong&gt;DATA BROKERS ACCUSED OF HIDING OPT-OUT PAGES FROM GOOGLE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Security and Privacy&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;More privacy settings &lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select &lt;strong&gt;Permission Manager&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Review &lt;strong&gt;Location&lt;/strong&gt;, &lt;strong&gt;Microphone&lt;/strong&gt;, and&lt;strong&gt; Camera&lt;/strong&gt; permissions&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Whenever possible, set location access to &lt;strong&gt;Allow only while using the app&lt;/strong&gt; rather than &lt;strong&gt;Allow all the time&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Removing unnecessary permissions helps limit background tracking.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;No. 4: Turn off smart TV tracking&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Most TVs include a setting that controls content tracking.&lt;/p&gt;&lt;p&gt;Look for options such as:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;ACR&lt;/li&gt;&lt;li&gt;Viewing Data&lt;/li&gt;&lt;li&gt;Interest-Based Ads&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;On Roku, &lt;/strong&gt;go to &lt;strong&gt;Settings → Privacy → Smart TV Experience&lt;/strong&gt; and &lt;strong&gt;disable it. On Samsung, &lt;/strong&gt;look for&lt;strong&gt; Viewing Information Services &lt;/strong&gt;and turn it &lt;strong&gt;off.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Turn these features off in the privacy or advertising section of your TV settings. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;No. 3: Use stronger passwords&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Smart home devices often connect to important accounts. If attackers access those accounts, they may control cameras, speakers, or home automation systems. Use strong, unique passwords and enable two-factor authentication (2FA)  whenever available. A password manager can help generate and store secure passwords.&lt;/p&gt;&lt;p&gt;Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see &lt;strong&gt;Cyberguy.com&lt;/strong&gt;) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.&lt;/p&gt;&lt;p&gt;Check out the best expert-reviewed password managers of 2026 at &lt;i&gt;&lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/5-tech-terms-shape-your-online-privacy" target="_blank" rel="noopener"&gt;&lt;strong&gt;5 TECH TERMS THAT SHAPE YOUR ONLINE PRIVACY&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;No. 2: Delete old apps and accounts&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Dormant apps and forgotten services often keep your personal information for years.&lt;/p&gt;&lt;p&gt;Take time to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Remove apps you no longer use&lt;/li&gt;&lt;li&gt;Close accounts tied to old services&lt;/li&gt;&lt;li&gt;Revoke unused permissions&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Cleaning up digital clutter reduces your data footprint.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Remove apps you no longer use&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;&lt;strong&gt;On iPhone (iOS 18 and newer)&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Find the app on your &lt;strong&gt;Home Screen&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Press and hold&lt;/strong&gt; the app icon&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Remove App&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Delete App&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Delete&lt;/strong&gt; to confirm&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You can also remove apps through storage settings:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;General&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;iPhone Storage&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.foxnews.com/category/tech/technologies/apps" target="_blank" rel="noopener"&gt;&lt;strong&gt;Select the app&lt;/strong&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Delete App&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Delete&lt;/strong&gt; to confirm&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Deleting the app removes it from your device and frees up storage space.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On Android (Android 14 and newer)&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;S&lt;i&gt;ettings may vary depending on your Android phone’s manufacturer.&lt;/i&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Find the app on your &lt;strong&gt;Home Screen or App Drawer&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Press and hold&lt;/strong&gt; the app icon&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Uninstall&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;OK&lt;/strong&gt; or &lt;strong&gt;Uninstall&lt;/strong&gt; to confirm&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You can also remove apps through settings:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Apps&lt;/strong&gt; or &lt;strong&gt;Apps &amp; notifications&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select the &lt;strong&gt;app you want to remove&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Uninstall&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;OK&lt;/strong&gt; or &lt;strong&gt;Uninstall&lt;/strong&gt; to confirm&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Removing unused apps helps reduce the amount of data stored on your device.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Revoke unused permissions&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Some apps continue accessing your camera, microphone or location even when you rarely use them.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On iPhone&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Privacy &amp; Security&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select a category such as &lt;strong&gt;Location Services&lt;/strong&gt;, &lt;strong&gt;Microphone&lt;/strong&gt; or &lt;strong&gt;Camera&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Review the apps listed&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Turn off access&lt;/strong&gt; for apps that do not need it&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You can also control tracking:&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/5-myths-about-identity-theft-put-your-data-risk" target="_blank" rel="noopener"&gt;&lt;strong&gt;5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Go to &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Privacy &amp; Security&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Tracking&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Turn off tracking&lt;/strong&gt; for apps you do not trust.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;On Android&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;S&lt;i&gt;ettings may vary depending on your Android phone’s manufacturer&lt;/i&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Security &amp; Privacy&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Privacy &lt;/strong&gt;or&lt;strong&gt; More privacy settings &lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Permission Manager&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select &lt;strong&gt;Location&lt;/strong&gt;, &lt;strong&gt;Camera&lt;/strong&gt; or &lt;strong&gt;Microphone&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Review the apps listed and &lt;strong&gt;remove access&lt;/strong&gt; if needed&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Android groups permissions by type so you can quickly see which apps access sensitive features.&lt;/p&gt;&lt;p&gt;Today's phones may automatically remove permissions from apps you have not used for a long time, but many apps still retain data tied to your account. Reviewing them manually helps reduce tracking and background data collection.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;No. 1: Limit always-listening devices&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Smart speakers constantly wait for wake words like "Alexa" or "Hey Google." That means the microphone stays active so the device can detect commands. If you rarely use these features, limiting them can reduce how much audio data leaves your home. Here are some simple ways to reduce always-listening devices.&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Mute the microphone on smart speakers&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Most smart speakers include a physical microphone mute button.&lt;/p&gt;&lt;p&gt;Press the &lt;strong&gt;mic mute button&lt;/strong&gt; on devices like:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Amazon Echo&lt;/li&gt;&lt;li&gt;Google Nest speakers&lt;/li&gt;&lt;li&gt;Apple HomePod&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;When muted, the device stops listening for wake words. &lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Unplug devices in private spaces&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Bedrooms and home offices are common places where people prefer extra privacy. If a speaker or smart display is rarely used in those rooms, unplugging it removes the microphone entirely.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Review voice recordings in your account&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Many voice assistants store past interactions. You can review and delete recordings inside the companion apps, such as:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Alexa app&lt;/li&gt;&lt;li&gt;Google Home app&lt;/li&gt;&lt;li&gt;Apple Home app&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Set recordings to auto-delete or choose not to save them at all, where that option exists. Removing stored recordings prevents them from accumulating over time.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Disable voice activation on some devices&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Some smart TVs, phones and tablets include voice assistants. Look in device settings for options such as:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Voice assistant&lt;/li&gt;&lt;li&gt;Voice wake word&lt;/li&gt;&lt;li&gt;Hands-free voice control&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Turning those features off stops devices from constantly listening. Even though devices listen only for wake words, the microphones remain active. Limiting where these devices operate helps reduce the amount of audio data collected inside your home. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Smart devices make daily life easier. They play music, answer questions, show visitors at the door and control lights with a voice command. But convenience often comes with hidden trade-offs. Many privacy clauses are buried deep in policies that most people never read. Over time, those permissions allow companies to gather enormous amounts of behavioral data. That does not mean you need to abandon smart technology. It simply means understanding what your devices collect and deciding what level of access you are comfortable with. Many of these settings are enabled by default, not because you chose them, but because you never knew they were there. A quick privacy audit today can prevent years of unnecessary data collection tomorrow. Oh, and if you want a deeper dive into how these hidden data practices affect your daily life, check out the latest episode of my &lt;i&gt;&lt;strong&gt;Beyond Connected&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; &lt;/strong&gt;podcast at &lt;i&gt;&lt;strong&gt;&lt;u&gt;getbeyondconnected.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;, where we break it down.&lt;/p&gt;&lt;p&gt;Here is a question worth asking yourself: If every smart device in your home combined its data into one timeline of your life, how comfortable would you feel with someone seeing it? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.  &lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/woman-on-phone-with-smart-speaker-device.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">27002746-9b77-5c6f-9dcf-14268b9b101c</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/smart-and-safe-tech</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/gps</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/cameras</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Wed, 15 Apr 2026 12:30:41 -0400</pubDate>
        </item>
    </channel>
</rss>