<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<rss xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
    <channel>
        <title>Technology News Articles on Fox News</title>
        <link>https://www.foxnews.com/tech</link>
        <description>Explore all the news happening in the technology industry with Fox News. Check out the latest tech launches and computer tech updates going on today.</description>
        <copyright>Copyright 2026 FOX News Network</copyright>
        <language>en-us</language>
        <pubDate>Thu, 16 Apr 2026 15:30:56 -0400</pubDate>
        <image>
            <url>https://global.fncstatic.com/static/orion/styles/img/fox-news/logos/fox-news-desktop.png</url>
            <title>Technology News Articles on Fox News</title>
            <link>https://www.foxnews.com/tech</link>
        </image>
        <atom:link rel="self" href="https://moxie.foxnews.com/google-publisher/tech.xml" type="application/rss+xml"/>
        <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/" xmlns:atom="http://www.w3.org/2005/Atom" />
        
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/meta-employee-accused-accessing-private-images</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/meta-employee-accused-accessing-private-images</guid>
                        <title>Meta employee accused of accessing private images</title>

                        <description>A former Meta employee is accused of accessing around 30,000 private Facebook photos by allegedly bypassing internal security systems. What to know now.</description>
                        
                        
                            <content:encoded>&lt;p&gt;When you upload a photo to Facebook, you expect it to stay private unless you decide otherwise. That expectation just took a hit after a former employee of Meta was accused of accessing &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;thousands of private images.&lt;/a&gt;&lt;/p&gt;&lt;p&gt;According to details confirmed by the company, the London-based employee allegedly created a program to bypass internal safeguards. Investigators say this may have allowed access to about 30,000 &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;private Facebook images&lt;/a&gt; that were not meant to be viewed.&lt;/p&gt;&lt;p&gt;The individual is now under criminal investigation and is out on bail as authorities continue to review the case. Here&apos;s how investigators say the access may have happened.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/meta-smart-glasses-privacy-concerns-grow&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;META SMART GLASSES PRIVACY CONCERNS GROW&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;Authorities believe the employee may have written a script to get around Meta&apos;s internal detection systems. In simple terms, the system that should flag unusual behavior may not have caught the activity right away. This detail matters because large tech platforms rely on monitoring tools to detect suspicious access patterns. When those checks are bypassed, it raises questions about how internal access is controlled. &lt;/p&gt;&lt;p&gt;The investigation is being handled by the &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;cybercrime unit&lt;/a&gt; of the Metropolitan Police in London. At the same time, security experts often point out that insider threats are difficult to eliminate. Even strong systems can be tested when someone inside the company misuses access.&lt;/p&gt;&lt;p&gt;Meta says it discovered the improper access more than a year ago and took action after identifying the issue. &lt;/p&gt;&lt;p&gt;&quot;Protecting user data is our top priority,&quot; a Meta spokesperson told CyberGuy. &quot;After discovering improper access by an employee over a year ago, we immediately terminated the individual, notified users, referred the matter to law enforcement and enhanced our security measures. We are cooperating with the ongoing investigation.&quot;&lt;/p&gt;&lt;p&gt;Data protection experts say cases like this often come down to both intent and safeguards. If an employee accesses personal data without authorization, that can lead to criminal charges under data protection and computer misuse laws. However, the company&apos;s responsibility depends on the protections it had in place. If proper safeguards existed, the focus usually remains on the individual. &lt;/p&gt;&lt;p&gt;If not, regulators may consider penalties or legal claims against the company. The Information Commissioner&apos;s Office, the U.K.&apos;s data privacy watchdog, has acknowledged the incident. The agency stressed that social media users should be able to trust how their personal information is handled. &lt;/p&gt;&lt;p&gt;This case is unfolding at a time when scrutiny of major tech platforms is already high. Recent &lt;a href=&quot;https://www.foxnews.com/politics/landmark-trial-accuses-meta-google-addicting-children-what-know&quot;&gt;&lt;u&gt;legal challenges&lt;/u&gt;&lt;/a&gt; have raised broader concerns about how companies protect users and manage risk. That context adds weight to this investigation. It reflects a larger conversation about privacy and accountability in the tech industry. As more people rely on digital platforms, expectations of data protection continue to rise. Incidents like this tend to reinforce those concerns.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/media/meta-reportedly-building-ai-version-mark-zuckerberg-interact-company-employees&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;META REPORTEDLY BUILDING AN AI VERSION OF MARK ZUCKERBERG TO INTERACT WITH COMPANY EMPLOYEES&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Even though this case involves an insider, there are still simple steps you can take to better &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;protect your photos&lt;/a&gt; and limit who can see them.&lt;/p&gt;&lt;p&gt;You cannot control what happens inside a company, but you can limit how much of your personal content is exposed. Start by reviewing your Facebook privacy settings.&lt;/p&gt;&lt;p&gt;&lt;i&gt;(Settings may vary depending on device and app version)&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Mobile (iPhone/Android):&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;strong&gt;Facebook:&lt;/strong&gt; &lt;strong&gt;Menu&lt;/strong&gt; &amp;gt; &lt;strong&gt;Settings &amp;amp; privacy&lt;/strong&gt; &amp;gt;&lt;strong&gt; Settings&lt;/strong&gt; &amp;gt;&lt;strong&gt; Audience and visibility&lt;/strong&gt; &amp;gt; &lt;strong&gt;Posts&lt;/strong&gt; &amp;gt; &lt;strong&gt;Who can see your future posts&lt;/strong&gt; &amp;gt; select&lt;strong&gt; Friends (or a custom audience&lt;/strong&gt;) &amp;gt; &lt;strong&gt;Save&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Desktop (Mac/PC):&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;strong&gt;Facebook:&lt;/strong&gt; &lt;strong&gt;Profile picture&lt;/strong&gt; (top right) &amp;gt; &lt;strong&gt;Settings &amp;amp; privacy&lt;/strong&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Audience and visibility &lt;/strong&gt;section &amp;gt; &lt;strong&gt;Posts&lt;/strong&gt; &amp;gt; &lt;strong&gt;Who can see your future posts&lt;/strong&gt; &amp;gt; select &lt;strong&gt;Friends (or a custom audience) &amp;gt; Done&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Next, go through older photos and albums. Many people forget that photos shared years ago may still be visible under outdated settings.&lt;/p&gt;&lt;p&gt;&lt;i&gt;(Settings may vary depending on device and app version)&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Mobile (iPhone/Android):&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;strong&gt;Facebook:&lt;/strong&gt; &lt;strong&gt;Menu&lt;/strong&gt; &amp;gt; &lt;strong&gt;Settings &amp;amp; privacy&lt;/strong&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Audience and visibility&lt;/strong&gt; &amp;gt; &lt;strong&gt;Posts&lt;/strong&gt; &amp;gt; &lt;strong&gt;Limit who can see past posts&lt;/strong&gt; &amp;gt; &lt;strong&gt;Limit who can see past posts&lt;/strong&gt; &amp;gt; &lt;strong&gt;Limit past post&lt;/strong&gt;s &amp;gt; &lt;strong&gt;confirm&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Desktop (Mac/PC):&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;strong&gt;Facebook:&lt;/strong&gt; &lt;strong&gt;Profile picture&lt;/strong&gt; &amp;gt; &lt;strong&gt;Settings &amp;amp; privacy&lt;/strong&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Audience and visibility&lt;/strong&gt;  section &amp;gt; &lt;strong&gt;Posts&lt;/strong&gt; &amp;gt;&lt;strong&gt; Limit who can see past posts &amp;gt; Limit past posts&lt;/strong&gt; &amp;gt;&lt;strong&gt; confirm&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;And check individual albums:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Mobile (iPhone/Android):&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;strong&gt;Facebook:&lt;/strong&gt; Go to your &lt;strong&gt;profile&lt;/strong&gt; &amp;gt; &lt;strong&gt;Photos&lt;/strong&gt; &amp;gt; &lt;strong&gt;Albums&lt;/strong&gt; &amp;gt; select &lt;strong&gt;an album&lt;/strong&gt; &amp;gt; tap &lt;strong&gt;Edit&lt;/strong&gt; (top right) &amp;gt; &lt;strong&gt;Who can see this?&lt;/strong&gt; &amp;gt; choose &lt;strong&gt;who can see it &amp;gt; Done&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Desktop (Mac/PC):&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;strong&gt;Facebook: &lt;/strong&gt;click &lt;strong&gt;your name on the left &amp;gt; Photos &amp;gt; Albums &amp;gt; select an album &amp;gt; click the three dots &amp;gt; Edit album &amp;gt; choose who can see it &amp;gt; Done&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;Not all albums can be changed, and some system albums have limited privacy options.&lt;/i&gt; &lt;/p&gt;&lt;p&gt;It also helps to &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/smart-and-safe-tech&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;limit what you upload&lt;/a&gt; in the first place. Sensitive images, documents or anything you would not want widely seen may be better kept off social platforms entirely.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/meta-ai-edits-your-camera-roll-better-facebook-posts&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;META AI EDITS YOUR CAMERA ROLL FOR BETTER FACEBOOK POSTS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;You can also enable alerts for unusual account activity. While this case involves an insider, account alerts still help you spot unauthorized access to your own profile. You can also turn on two-factor authentication (&lt;a href=&quot;https://www.foxnews.com/tech/what-two-factor-authentication-should-enable-it&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;2FA&lt;/u&gt;&lt;/a&gt;) to add another layer of protection to your account.&lt;/p&gt;&lt;p&gt;&lt;i&gt;(Settings may vary depending on device and app version)&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Mobile (iPhone/Android):&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;strong&gt;Facebook&lt;/strong&gt;: &lt;strong&gt;Menu&lt;/strong&gt; &amp;gt; &lt;strong&gt;Settings &amp;amp; privacy&lt;/strong&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Accounts Center&lt;/strong&gt; &amp;gt; &lt;strong&gt;Password and security&lt;/strong&gt; &amp;gt; &lt;strong&gt;Security Checkup&lt;/strong&gt; &amp;gt; &lt;strong&gt;review and complete recommended security steps&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Desktop (Mac/PC):&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;strong&gt;Facebook:&lt;/strong&gt; &lt;strong&gt;Profile picture&lt;/strong&gt; (top right) &amp;gt; &lt;strong&gt;Settings &amp;amp; privacy&lt;/strong&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Accounts Center&lt;/strong&gt; &amp;gt; &lt;strong&gt;Password and security&lt;/strong&gt; &amp;gt;&lt;strong&gt; Security Checkup&lt;/strong&gt; &amp;gt; &lt;strong&gt;review and complete recommended security steps&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;(Settings may vary depending on device and app version)&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Mobile (iPhone/Android):&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;strong&gt;Facebook: Menu&lt;/strong&gt; &amp;gt; &lt;strong&gt;Settings &amp;amp; privacy&lt;/strong&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Password and security&lt;/strong&gt; &amp;gt; &lt;strong&gt;Two-factor authentication&lt;/strong&gt; &amp;gt; choose&lt;strong&gt; text message or authentication app&lt;/strong&gt; &amp;gt; &lt;strong&gt;follow prompts&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Desktop (Mac/PC):&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;strong&gt;Facebook:&lt;/strong&gt; &lt;strong&gt;Profile picture&lt;/strong&gt; &amp;gt; &lt;strong&gt;Settings &amp;amp; privacy&lt;/strong&gt; &amp;gt;&lt;strong&gt; Settings&lt;/strong&gt; &amp;gt;&lt;strong&gt; Password and security&lt;/strong&gt; &amp;gt; &lt;strong&gt;Two-factor authentication&lt;/strong&gt; &amp;gt; choose &lt;strong&gt;text message or authentication app&lt;/strong&gt; &amp;gt; &lt;strong&gt;follow prompts&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Take a few minutes to review &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/apps&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;which apps have access&lt;/a&gt; to your Facebook account. Third-party apps can sometimes hold more access than you expect.&lt;/p&gt;&lt;p&gt;&lt;i&gt;(Settings may vary depending on device and app version)&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Mobile (iPhone/Android):&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;strong&gt;Facebook:&lt;/strong&gt; &lt;strong&gt;Menu&lt;/strong&gt; &amp;gt; &lt;strong&gt;Settings &amp;amp; privacy&lt;/strong&gt; &amp;gt;&lt;strong&gt; Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Apps and websites&lt;/strong&gt; &amp;gt; &lt;strong&gt;Active&lt;/strong&gt; &amp;gt; tap an &lt;strong&gt;app&lt;/strong&gt; &amp;gt;&lt;strong&gt; Remove&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;u&gt;Desktop (Mac/PC):&lt;/u&gt;&lt;/strong&gt;&lt;br&gt;&lt;strong&gt;Facebook:&lt;/strong&gt; &lt;strong&gt;Profile picture&lt;/strong&gt; (top right) &amp;gt; &lt;strong&gt;Settings &amp;amp; privacy&lt;/strong&gt; &amp;gt; &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Apps and websites&lt;/strong&gt; &amp;gt; &lt;strong&gt;Active&lt;/strong&gt; &amp;gt; click an &lt;strong&gt;app&lt;/strong&gt; &amp;gt; &lt;strong&gt;Remove&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;If you don&apos;t see any apps listed or options like &quot;Active,&quot; it likely means you don&apos;t have any connected apps to review.&lt;/p&gt;&lt;p&gt;If you use Facebook or similar platforms, this situation highlights something many people overlook. Even with strong safeguards, insider access still exists. Employees often need certain permissions to keep systems running. That creates a level of trust between users and the company. &lt;/p&gt;&lt;p&gt;When that trust is broken, it can feel personal. At the same time, there are still steps you can take on your end. Reviewing your privacy settings, limiting what you share and enabling security features can reduce how much of your content is exposed. It also shows why detection and response matter. &lt;/p&gt;&lt;p&gt;In this case, Meta says it identified the issue, removed the employee and notified users. Those steps can limit damage, but they do not erase the concern. The bigger takeaway is that privacy depends on both &lt;a href=&quot;https://www.foxnews.com/tech&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;technology and human behavior.&lt;/a&gt; Systems can reduce risk, but they cannot remove it completely.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;    &lt;/p&gt;&lt;p&gt;This case is still under investigation, and no final legal outcome has been announced. Even so, it highlights a risk many people rarely think about. Most privacy conversations focus on hackers. This situation is different. It shows how access from inside a company can create its own set of risks. Meta says it acted quickly by removing the employee, notifying users and strengthening its systems. Those steps matter, but they also show how much trust users place in the platforms they use every day. The reality is simple. Once you upload something online, you are trusting more than just the technology behind it.&lt;/p&gt;&lt;p&gt;If someone inside a company can access private data, how much control do you really have over what you share online? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved. &lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/11/931/523/woman-looks-at-android-phone.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">6550e732-5524-503b-8c83-e716e0a1d290</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/facebook</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Thu, 16 Apr 2026 15:30:56 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/new-fbi-warning-reveals-phishing-attacks-hitting-private-chats</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/new-fbi-warning-reveals-phishing-attacks-hitting-private-chats</guid>
                        <title>New FBI warning reveals phishing attacks hitting private chats</title>

                        <description>A joint CISA and FBI warning reveals Russian-linked cyber actors are phishing messaging app users to bypass encryption and access private conversations.</description>
                        
                        
                            <content:encoded>&lt;p&gt;You probably think your messages are safe. After all, apps like WhatsApp, Signal and Telegram promote &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;strong encryption.&lt;/a&gt;&lt;/p&gt;&lt;p&gt;But a new warning from the Cybersecurity and Infrastructure Security Agency and the &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/fbi&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Federal Bureau of Investigation&lt;/a&gt; shows that attackers do not need to break encryption at all.&lt;/p&gt;&lt;p&gt;Instead, they are going after you.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/fbi-warns-about-foreign-apps-your-data&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;FBI WARNS ABOUT FOREIGN APPS AND YOUR DATA&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;According to the joint advisory, cyber actors tied to Russian intelligence are running large-scale &lt;a href=&quot;https://www.foxnews.com/tech/dont-click-that-link-how-to-spot-prevent-phishing-attacks-in-your-inbox&quot;&gt;&lt;u&gt;phishing campaigns&lt;/u&gt;&lt;/a&gt; targeting messaging apps.&lt;/p&gt;&lt;p&gt;These attacks are not random. They have focused on high-value targets like government officials, military personnel and journalists. However, the tactics can easily spread to everyday users.&lt;/p&gt;&lt;p&gt;Here is the key takeaway: Hackers are not cracking the apps themselves. They are tricking people into giving up access. &lt;/p&gt;&lt;p&gt;This is where it gets interesting and a bit unsettling. Instead of breaking encryption, attackers use phishing to gain control of individual accounts. Once inside, they can:&lt;/p&gt;&lt;p&gt;It becomes a chain reaction. One compromised account can quickly lead to many more. In some cases, &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/hackers&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;attackers impersonate trusted contacts.&lt;/a&gt; That makes the scam feel real and urgent.&lt;/p&gt;&lt;p&gt;Encryption still matters. It protects messages as they travel between devices. But here is the problem. If someone logs into your account, they see everything just like you do.&lt;/p&gt;&lt;p&gt;That means even the most secure app cannot protect you if your login gets compromised. This is a shift in how cyberattacks work. The weakest link is no longer the technology. It is human behavior.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/ai-now-powering-cyberattacks-microsoft-warns&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;AI IS NOW POWERING CYBERATTACKS, MICROSOFT WARNS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;While the advisory highlights high-profile targets, the tactics are not limited to them.&lt;/p&gt;&lt;p&gt;If you use messaging apps for:&lt;/p&gt;&lt;p&gt;You are a potential target. Phishing works because it relies on simple mistakes. A quick tap on the wrong link is often all it takes. &lt;/p&gt;&lt;p&gt;This warning highlights a bigger trend. Cyberattacks are becoming more personal. Instead of attacking systems, hackers are &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;targeting people directly.&lt;/a&gt; That makes awareness your strongest defense. The more you understand how these scams work, the harder it becomes for attackers to succeed.&lt;/p&gt;&lt;p&gt;You do not need to be a cybersecurity expert to protect yourself. You just need to slow things down and follow a few smart habits.&lt;/p&gt;&lt;p&gt;If a message feels urgent or out of place, pause. Even if it looks like it came from someone you know.&lt;/p&gt;&lt;p&gt;Avoid links sent through messages unless you can verify them independently. Strong antivirus software can help detect suspicious behavior after a compromise. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp;amp; iOS devices at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Two-factor authentication (&lt;a href=&quot;https://www.foxnews.com/tech/what-two-factor-authentication-should-enable-it&quot;&gt;&lt;u&gt;2FA&lt;/u&gt;&lt;/a&gt;) adds a second layer of protection even if your password gets exposed.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/tech-giants-unite-fight-online-scams&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;TECH GIANTS UNITE TO FIGHT ONLINE SCAMS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;Many apps notify you when a new device signs in. Do not ignore these warnings.&lt;/p&gt;&lt;p&gt;If a contact asks for something unusual, call them or confirm through another channel.&lt;/p&gt;&lt;p&gt;Limit how much of your &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;personal information&lt;/a&gt; is available online. Data removal services work to delete your data from broker sites, making it harder for scammers to target you with convincing phishing messages. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Install updates regularly. Security patches fix vulnerabilities that attackers can exploit after gaining access.&lt;/p&gt;&lt;p&gt;Messaging apps feel private. They feel secure. That sense of comfort is exactly what attackers are counting on. The technology is still strong. The real question is whether your habits are keeping up. So the next time a message pops up that feels slightly off, trust that instinct and take a second look.&lt;/p&gt;&lt;p&gt;Have you ever received a suspicious message that made you stop and question if it was real? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/man-worried-using-smartphone.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">23327e75-f6ab-50ec-bd10-2083ee3fd6ab</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fbi</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Thu, 16 Apr 2026 11:23:38 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/5-worrisome-privacy-clauses-hidden-smart-home-devices</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/5-worrisome-privacy-clauses-hidden-smart-home-devices</guid>
                        <title>5 worrisome privacy clauses hidden in smart home devices</title>

                        <description>Smart TVs, voice assistants and connected cars collect detailed behavioral data through privacy clauses most users never read. Learn to protect yourself.</description>
                        
                        
                            <content:encoded>&lt;p&gt;Many of the apps and devices we use every day contain privacy terms most people never read. Yet those clauses often allow extensive data harvesting, behavioral tracking and long-term storage of personal information. Some even allow companies to access recordings or share data with partners.&lt;/p&gt;&lt;p&gt;The reality is simple. Smart devices inside your home and car can build detailed profiles about your daily life. Your schedule. Your habits. Even your conversations. One way I explain this to people is simple. Your phone knows where you go. Your smart home knows what you do when you get there. I unpack how this works in everyday life on my Beyond Connected podcast at &lt;i&gt;&lt;strong&gt;getbeyondconnected.com&lt;/strong&gt;&lt;/i&gt;. In many cases, these devices are not just reacting to you. They are actively logging, analyzing, and storing your behavior by default, often without you realizing it.&lt;/p&gt;&lt;p&gt;Let&apos;s walk through five &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;privacy clauses&lt;/a&gt; that surprise most people. We will start with number five and count down to the most unsettling one.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/your-phone-shares-data-night-heres-how-stop&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;YOUR PHONE SHARES DATA AT NIGHT: HERE&apos;S HOW TO STOP IT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Plus, you&apos;ll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/p&gt;&lt;p&gt;Today&apos;s vehicles are no longer just transportation. Many now operate as connected computers on wheels. Connected vehicle platforms and systems, such as Android Automotive OS, collect large amounts of telemetry data.&lt;/p&gt;&lt;p&gt;That can include:&lt;/p&gt;&lt;p&gt;Researchers have found that vehicles may gather dozens or even hundreds of data points during normal driving. In some cases, researchers found that vehicle speed can be logged as frequently as 25 times per second, creating a highly detailed record of how you drive.&lt;/p&gt;&lt;p&gt;Your car may know:&lt;/p&gt;&lt;p&gt;That data can be used to infer stops, turns, and even risky driving behavior. In some cases, it may also be shared with third parties for advertising, insurance, or financing purposes. In other words, your vehicle can create a detailed picture of your driving behavior and routines. Many drivers never realize how much information their car collects.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/entertainment/tv&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Your television&lt;/a&gt; may be one of the most active data collectors in your home. Many smart TVs from brands like Samsung, LG, and Roku use a technology called Automatic Content Recognition, often shortened to ACR.&lt;/p&gt;&lt;p&gt;ACR can analyze what appears on your screen across:&lt;/p&gt;&lt;p&gt;This technology works in real time, identifying what you are watching and reporting that information back to the company. Some policies even state that snippets of audio or video may be shared with third parties to match ads to your viewing. Some lawsuits have alleged that certain TVs capture screenshots extremely frequently to identify content.&lt;/p&gt;&lt;p&gt;Your TV can learn:&lt;/p&gt;&lt;p&gt;That means the show you binge, the time you watch it, and even how long you stay engaged can be packaged and sold to advertisers almost instantly. That viewing data may then be shared with advertising partners to build detailed marketing profiles.&lt;/p&gt;&lt;p&gt;Video doorbells are designed to increase home security. Yet they can also gather large amounts of behavioral data. Devices like the Ring Video Doorbell may automatically collect information such as:&lt;/p&gt;&lt;p&gt;Privacy disclosures also show that these devices can collect geolocation data, IP addresses, and details about the devices connected to your network.&lt;/p&gt;&lt;p&gt;Over time, a doorbell camera can build a timeline that shows:&lt;/p&gt;&lt;p&gt;Put together, this creates a detailed map of your daily routine, including when you are home, when you are away, and how your household operates. Individually, these signals seem harmless. Together, they can reveal detailed patterns about your household. If an account is ever compromised, that data can act as a blueprint of your life, not just a camera feed.&lt;/p&gt;&lt;p&gt;Some smart devices store recordings that help improve voice recognition and AI systems. Devices that may store recordings include:&lt;/p&gt;&lt;p&gt;Past regulatory findings have raised concerns about how companies manage that stored data. In some cases, recordings may be accessed by:&lt;/p&gt;&lt;p&gt;Some company disclosures state that a small number of recordings may be reviewed by research and development teams to improve products and services.&lt;/p&gt;&lt;p&gt;The goal of human review is often to improve voice assistants or detect errors. Still, many users never realize that recordings captured inside their homes may be reviewed by people. That means a conversation in your living room or a clip from your front door could be seen or heard by someone you have never met. Transparency about how this process works remains an ongoing discussion across the tech industry.&lt;/p&gt;&lt;p&gt;Voice assistants sit quietly in kitchens, bedrooms, and living rooms waiting for their wake word. Devices like the Amazon Echo process voice commands in the cloud.&lt;/p&gt;&lt;p&gt;According to company disclosures, voice interactions can include:&lt;/p&gt;&lt;p&gt;In many cases, these recordings are saved by default and can remain stored indefinitely unless you manually delete them or change your settings.&lt;/p&gt;&lt;p&gt;Over time, your voice assistant may accumulate years of audio interactions. That can include everything from grocery lists and song requests to conversations you did not even realize were captured. That history can reveal daily routines, requests, shopping habits, and personal questions. Most people never review or delete those recordings.&lt;/p&gt;&lt;p&gt;Each individual device collects only part of the picture. Together, they can reveal an astonishing amount of detail about your life. Smart devices inside your home and vehicle may capture:&lt;/p&gt;&lt;p&gt;Combined, this data allows companies to build extremely detailed behavioral profiles. That is why privacy experts call connected homes a data multiplier. In many cases, the value of that data is part of the business model, helping offset the cost of the devices themselves.&lt;/p&gt;&lt;p&gt;The good news is you still have ways to reduce how much information your devices collect. Here are a few practical steps that can make a big difference. &lt;/p&gt;&lt;p&gt;Start by reviewing what access your apps have to your devices. If you use smart home apps like Ring, also check in-app privacy settings such as Control Center and turn off sharing with third parties where available.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On iPhone&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Whenever possible, set location access to &lt;strong&gt;While Using the App&lt;/strong&gt; rather than &lt;strong&gt;Always&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On Android&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;S&lt;i&gt;ettings may vary depending on your &lt;/i&gt;&lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/android&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Android phone’s manufacturer&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/data-brokers-accused-hiding-opt-out-pages-from-google&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;DATA BROKERS ACCUSED OF HIDING OPT-OUT PAGES FROM GOOGLE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Whenever possible, set location access to &lt;strong&gt;Allow only while using the app&lt;/strong&gt; rather than &lt;strong&gt;Allow all the time&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Removing unnecessary permissions helps limit background tracking.&lt;/p&gt;&lt;p&gt;Most TVs include a setting that controls content tracking.&lt;/p&gt;&lt;p&gt;Look for options such as:&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On Roku, &lt;/strong&gt;go to &lt;strong&gt;Settings → Privacy → Smart TV Experience&lt;/strong&gt; and &lt;strong&gt;disable it. On Samsung, &lt;/strong&gt;look for&lt;strong&gt; Viewing Information Services &lt;/strong&gt;and turn it &lt;strong&gt;off.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Turn these features off in the privacy or advertising section of your TV settings. &lt;/p&gt;&lt;p&gt;Smart home devices often connect to important accounts. If attackers access those accounts, they may control cameras, speakers, or home automation systems. Use strong, unique passwords and enable two-factor authentication (2FA)  whenever available. A password manager can help generate and store secure passwords.&lt;/p&gt;&lt;p&gt;Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see &lt;strong&gt;Cyberguy.com&lt;/strong&gt;) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.&lt;/p&gt;&lt;p&gt;Check out the best expert-reviewed password managers of 2026 at &lt;i&gt;&lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/5-tech-terms-shape-your-online-privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;5 TECH TERMS THAT SHAPE YOUR ONLINE PRIVACY&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Dormant apps and forgotten services often keep your personal information for years.&lt;/p&gt;&lt;p&gt;Take time to:&lt;/p&gt;&lt;p&gt;Cleaning up digital clutter reduces your data footprint.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On iPhone (iOS 18 and newer)&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;You can also remove apps through storage settings:&lt;/p&gt;&lt;p&gt;Deleting the app removes it from your device and frees up storage space.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On Android (Android 14 and newer)&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;S&lt;i&gt;ettings may vary depending on your Android phone’s manufacturer.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;You can also remove apps through settings:&lt;/p&gt;&lt;p&gt;Removing unused apps helps reduce the amount of data stored on your device.&lt;/p&gt;&lt;p&gt;Some apps continue accessing your camera, microphone or location even when you rarely use them.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On iPhone&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;You can also control tracking:&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/5-myths-about-identity-theft-put-your-data-risk&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On Android&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;S&lt;i&gt;ettings may vary depending on your Android phone’s manufacturer&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Android groups permissions by type so you can quickly see which apps access sensitive features.&lt;/p&gt;&lt;p&gt;Today&apos;s phones may automatically remove permissions from apps you have not used for a long time, but many apps still retain data tied to your account. Reviewing them manually helps reduce tracking and background data collection.&lt;/p&gt;&lt;p&gt;Smart speakers constantly wait for wake words like &quot;Alexa&quot; or &quot;Hey Google.&quot; That means the microphone stays active so the device can detect commands. If you rarely use these features, limiting them can reduce how much audio data leaves your home. Here are some simple ways to reduce always-listening devices.&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Most smart speakers include a physical microphone mute button.&lt;/p&gt;&lt;p&gt;Press the &lt;strong&gt;mic mute button&lt;/strong&gt; on devices like:&lt;/p&gt;&lt;p&gt;When muted, the device stops listening for wake words. &lt;/p&gt;&lt;p&gt;Bedrooms and home offices are common places where people prefer extra privacy. If a speaker or smart display is rarely used in those rooms, unplugging it removes the microphone entirely.&lt;/p&gt;&lt;p&gt;Many voice assistants store past interactions. You can review and delete recordings inside the companion apps, such as:&lt;/p&gt;&lt;p&gt;Set recordings to auto-delete or choose not to save them at all, where that option exists. Removing stored recordings prevents them from accumulating over time.&lt;/p&gt;&lt;p&gt;Some smart TVs, phones and tablets include voice assistants. Look in device settings for options such as:&lt;/p&gt;&lt;p&gt;Turning those features off stops devices from constantly listening. Even though devices listen only for wake words, the microphones remain active. Limiting where these devices operate helps reduce the amount of audio data collected inside your home. &lt;/p&gt;&lt;p&gt;Smart devices make daily life easier. They play music, answer questions, show visitors at the door and control lights with a voice command. But convenience often comes with hidden trade-offs. Many privacy clauses are buried deep in policies that most people never read. Over time, those permissions allow companies to gather enormous amounts of behavioral data. That does not mean you need to abandon smart technology. It simply means understanding what your devices collect and deciding what level of access you are comfortable with. Many of these settings are enabled by default, not because you chose them, but because you never knew they were there. A quick privacy audit today can prevent years of unnecessary data collection tomorrow. Oh, and if you want a deeper dive into how these hidden data practices affect your daily life, check out the latest episode of my &lt;i&gt;&lt;strong&gt;Beyond Connected&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; &lt;/strong&gt;podcast at &lt;i&gt;&lt;strong&gt;&lt;u&gt;getbeyondconnected.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;, where we break it down.&lt;/p&gt;&lt;p&gt;Here is a question worth asking yourself: If every smart device in your home combined its data into one timeline of your life, how comfortable would you feel with someone seeing it? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.  &lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/woman-on-phone-with-smart-speaker-device.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">27002746-9b77-5c6f-9dcf-14268b9b101c</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/smart-and-safe-tech</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/gps</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/cameras</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Wed, 15 Apr 2026 12:30:41 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/roblox-adds-age-based-accounts-kids-teens</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/roblox-adds-age-based-accounts-kids-teens</guid>
                        <title>Roblox adds age-based accounts for kids and teens</title>

                        <description>Roblox is rolling out Kids and Select account types in early June, building separate environments for different age groups with built-in safety controls.</description>
                        
                        
                            <content:encoded>&lt;p&gt;If your child &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/video-games&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;plays Roblox&lt;/a&gt;, they are part of a massive global audience. Roblox has reported more than 144 million daily active users, with a large share made up of kids and teens who log in to play games, create content and connect with friends. That reach is exactly why a new change rolling out in early June matters.&lt;/p&gt;&lt;p&gt;Roblox is introducing two new account types designed to better match what kids play and who they can talk to based on age. The shift centers on structure. Instead of one shared experience with layered controls, Roblox is building separate environments for different age groups. As a result, content, chat and parental controls will adjust automatically as a child grows.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/openai-tightens-ai-rules-teens-concerns-remain&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;OPENAI TIGHTENS AI RULES FOR TEENS BUT CONCERNS REMAIN&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Roblox is dividing younger users into two groups, each with its own rules and experience.&lt;/p&gt;&lt;p&gt;This is the most restricted environment. It is designed for &lt;a href=&quot;https://www.foxnews.com/category/entertainment/genres/kids&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;younger children&lt;/a&gt; who need tighter guardrails.&lt;/p&gt;&lt;p&gt;The idea here is simple. Kids see a limited version of Roblox that removes riskier content and disables communication.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/world/australia-removes-4-7m-kids-from-social-media-platforms-first-month-historic-ban&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;AUSTRALIA REMOVES 4.7M KIDS FROM SOCIAL MEDIA PLATFORMS IN FIRST MONTH OF HISTORIC BAN&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;This group gets more flexibility, but still within limits.&lt;/p&gt;&lt;p&gt;At this stage, Roblox assumes users can handle a broader range of experiences, but still keeps filters in place.&lt;/p&gt;&lt;p&gt;Not every game makes the cut. Roblox is adding a continuous evaluation system that runs behind the scenes. Here&apos;s how it works:&lt;/p&gt;&lt;p&gt;Creators must verify their identity, enable two-step security and maintain a Roblox Plus subscription.&lt;/p&gt;&lt;p&gt;Older users, age 16 and up, effectively test new games first. Roblox studies how they interact and reviews reports before exposing those games to younger players.&lt;/p&gt;&lt;p&gt;Games receive maturity ratings such as Minimal, Mild or Moderate. Certain categories, like social hangouts or free-form drawing, are excluded by default for younger users. This layered approach combines &lt;a href=&quot;https://www.foxnews.com/tech/roblox-changing-online-safety-ai&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;AI moderation, human review&lt;/a&gt; and real-world gameplay signals.&lt;/p&gt;&lt;p&gt;Roblox is expanding the same age-check system it introduced earlier this year for chat.&lt;/p&gt;&lt;p&gt;If a user does not complete an age check, they face stricter limits. They can only access lower-rated games and cannot use chat. Once verified, the system automatically moves them into the correct account type.&lt;/p&gt;&lt;p&gt;There is no need to manually switch settings over time.&lt;/p&gt;&lt;p&gt;This automatic progression is designed to simplify things for families while keeping protections in place at each stage.&lt;/p&gt;&lt;p&gt;Roblox is also expanding what &lt;a href=&quot;https://www.foxnews.com/category/us/education/parents&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;parents can do&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;These tools give parents more direct control instead of relying only on broad content filters.&lt;/p&gt;&lt;p&gt;Later this year, Roblox plans to align with the International Age Rating Coalition framework. That includes familiar systems like ESRB in the U.S. and PEGI in Europe. The goal is to make ratings clearer and more consistent across regions. &lt;/p&gt;&lt;p&gt;This update changes how Roblox works at a fundamental level. Instead of asking parents to constantly adjust settings, the platform builds age-appropriate experiences from the start. It also reflects a broader shift in tech. Platforms are under pressure to design safety into the product, not tack it on later.&lt;/p&gt;&lt;p&gt;As Larry Magid, CEO of ConnectSafely, an organization focused on helping families navigate digital safety, put it:&lt;/p&gt;&lt;p&gt;&quot;By combining age assurance, stronger creator accountability, and parental controls, Roblox is helping set a higher standard for how platforms can better protect younger users while preserving positive online experiences.&quot;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;.&lt;/p&gt;&lt;p&gt;Roblox is not removing risk entirely. No platform can. What it is doing is tightening the structure around how kids interact with content and other players. For parents, this could make things simpler. For kids, the experience will feel more tailored to where they are in life. The bigger question is whether this becomes the norm across gaming and social platforms.&lt;/p&gt;&lt;p&gt;If platforms start shaping experiences based on age by default, does that improve safety or limit how kids explore and learn online? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.  &lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/roblox-online-safety-ai.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">dbb7207e-20c2-5680-a3f8-0145e9db611a</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/smart-and-safe-tech</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/video-games</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/entertainment/genres/kids</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/us/education/parents</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/lifestyle/parenting</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Wed, 15 Apr 2026 08:02:29 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/why-your-home-wi-fi-needs-more-than-just-strong-password</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/why-your-home-wi-fi-needs-more-than-just-strong-password</guid>
                        <title>Why your home Wi-Fi needs more than just a strong password</title>

                        <description>A strong Wi-Fi password is not enough to keep your online activity private. Learn why a VPN is essential to encrypt your connection and block ISP tracking.</description>
                        
                        
                            <content:encoded>&lt;p&gt;If you&apos;ve locked down your &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/wifi&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;home Wi-Fi&lt;/a&gt; with a strong password, you&apos;re already ahead of the game. But here&apos;s the reality: a password alone isn&apos;t enough to keep your online activity private.&lt;/p&gt;&lt;p&gt;Most people think of Wi-Fi security as simply keeping strangers off their network. And while that matters, it&apos;s only part of the picture. Even with a secure password, your internet activity can still be visible to others in ways you might not expect.&lt;/p&gt;&lt;p&gt;A Wi-Fi password keeps people out, but it does not &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;hide what happens inside your connection.&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/do-you-need-vpn-home-here-10-reasons-you-do&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;DO YOU NEED A VPN AT HOME? HERE ARE 10 REASONS YOU DO&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;When you connect to the internet at home, your internet service provider (ISP) can see a surprising amount of what you do online. That can include the websites you visit, how long you spend on them and sometimes even more detailed activity.&lt;/p&gt;&lt;p&gt;In some cases, that data can be:&lt;/p&gt;&lt;p&gt;And it&apos;s not just your ISP. Websites, apps, big tech companies, governments and data brokers are constantly collecting information about your behavior, often without you realizing it. Think of it this way: your password locks the front door, but once your data leaves your house, it can still be exposed along the way. That&apos;s where a VPN comes in.&lt;/p&gt;&lt;p&gt;A &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;virtual private network (VPN)&lt;/a&gt; creates a secure, encrypted tunnel between your device and the internet. That means your data is scrambled before it leaves your home network, making it much harder for anyone to see what you&apos;re doing online. &lt;/p&gt;&lt;p&gt;In addition, connecting to a VPN server gives you a new IP address, so your online activity can&apos;t be easily traced back to you. This makes it harder for advertisers, social networks and scammers to construct behavioral profiles, which can be used to target you with things like phishing attacks.&lt;/p&gt;&lt;p&gt;With a VPN:&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/spring-clean-your-digital-footprint-why-retirees-scam-targets&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;SPRING CLEAN YOUR DIGITAL FOOTPRINT: WHY RETIREES ARE SCAM TARGETS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Many VPN services are popular for their speed, simplicity and overall feature sets. This becomes even more important if you ever use public Wi-Fi, where your data is far more exposed.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What does this mean in practice?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;For starters, most VPN services are easy to use. They offer apps for nearly every device imaginable, including options that work directly with routers. These apps are straightforward to set up and configure.&lt;/p&gt;&lt;p&gt;Once running, a single click or tap is all it takes to change your virtual location, mask your IP address and &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;encrypt your connection&lt;/a&gt;. High-speed servers mean they don&apos;t fall into the trap of slowing you down. In many cases, using a VPN can even provide more consistent, reliable speeds.&lt;/p&gt;&lt;p&gt;With a more anonymous IP address, your ISP is also less able to throttle (cap) your connection speeds, as some providers do.&lt;/p&gt;&lt;p&gt;Setting up a VPN on your router protects every device in your home automatically, including smart TVs, gaming consoles and other connected devices.&lt;/p&gt;&lt;p&gt;Many VPN providers now go beyond basic protection and offer additional privacy tools. These can include password managers, email protection, identity monitoring and even private AI tools designed to keep your data more secure.&lt;/p&gt;&lt;p&gt;In short, it&apos;s no longer just about securing your connection. It&apos;s about protecting your entire digital footprint.&lt;/p&gt;&lt;p&gt;Your home Wi-Fi is the gateway to everything you do: online banking, shopping, working and staying connected. Relying on just a password is like locking your door but leaving the curtains wide open.&lt;/p&gt;&lt;p&gt;Adding a VPN gives you an extra layer of privacy that works quietly in the background while enhancing every corner of your digital life.&lt;/p&gt;&lt;p&gt;It&apos;s about being prepared, sure. But it&apos;s also about peace of mind.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/5-simple-tech-tips-improve-digital-privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;5 SIMPLE TECH TIPS TO IMPROVE DIGITAL PRIVACY&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;For the best &lt;strong&gt;VPN software&lt;/strong&gt;, see my expert review of the best VPNs for browsing the web privately on your &lt;strong&gt;Windows, Mac, Android and iOS devices&lt;/strong&gt; at &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;A strong password is a smart first step, but it only protects who gets onto your network, not what happens to your data after it leaves. Your internet activity still passes through systems designed to track, analyze and sometimes profit from it. Adding a VPN shifts the balance back in your favor by encrypting your connection and limiting how much others can see. It is a simple upgrade that turns basic security into real privacy, without changing how you use the internet day to day.&lt;/p&gt;&lt;p&gt;Where should we draw the line between staying connected and staying private? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 &lt;a href=&quot;http://CyberGuy.com&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;CyberGuy.com&lt;/a&gt;. All rights reserved.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/wifi-data-privacy-1.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">bcb4f670-e0db-5e73-8bac-e09c1ce396c2</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/wifi</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/smart-and-safe-tech</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Tue, 14 Apr 2026 12:30:21 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/phone-free-restaurants-trending-across-us</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/phone-free-restaurants-trending-across-us</guid>
                        <title>Phone-free restaurants are trending across the US</title>

                        <description>Phone-free restaurants are growing across the U.S., with bars and eateries asking diners to put devices away. Gen Z is driving the shift, per a 2025 survey.</description>
                        
                        
                            <content:encoded>&lt;p&gt;You sit down &lt;a href=&quot;https://www.foxnews.com/category/food-drink/recipes/meals/dinner&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;for dinner.&lt;/a&gt; The menus arrive. And instead of everyone reaching for their phones, something different happens. People actually start talking. That is the whole point. Across the U.S., a growing number of bars and restaurants are asking customers to put their phones away. Some offer incentives. Others go further and lock devices in pouches. The goal stays the same. Create a space where people actually connect. This is not happening by accident. It reflects a broader shift in how people think about screens, attention and time together.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/food-drink/cowboy-chef-says-phones-screens-dinner-tearing-american-families-apart&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;&lt;u&gt;COWBOY CHEF SAYS PHONES AND SCREENS AT DINNER ARE TEARING AMERICAN FAMILIES APART&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The push toward phone-free spaces reflects a bigger change in how people think about technology. Research continues to link &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/smartphones&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;heavy smartphone use&lt;/a&gt; with lower attention spans, weaker memory and reduced social connection. As a result, schools, governments and businesses are rethinking when phones belong in the room. At the same time, daily habits show just how attached people have become. Recent data from Consumer Affairs shows Americans check their phones about 144 times a day and spend roughly 4.5 hours on them. That kind of constant interruption adds up. It changes how we experience meals, conversations and even live events. So people are starting to push back.&lt;/p&gt;&lt;p&gt;You might expect older generations to lead this shift. The opposite is happening. Gen Z is driving much of the change. A December 2025 survey from Talker Research found 63% of Gen Z say they intentionally disconnect from devices. Millennials follow at 57%. Generation X comes in at 42%, while baby boomers trail at 29%. That matters because Gen Z shapes culture, especially when it comes to social habits. When they decide something feels better offline, businesses notice. And businesses are adapting quickly.&lt;/p&gt;&lt;p&gt;Phone-free policies are no longer rare. At least 11 states now have restaurants or bars experimenting with restrictions or incentives. Washington, D.C., leads with several venues, while others appear in Arizona, California, Illinois, Massachusetts, Tennessee, North Carolina, New York and Texas. Some places keep it simple. Put your phone away and enjoy the meal. Others take a stronger approach.&lt;/p&gt;&lt;p&gt;At a Charlotte &lt;a href=&quot;https://www.foxnews.com/category/food-drink/drinks/bars&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;cocktail bar&lt;/a&gt; called Antagonist, guests place their phones in locked pouches for about two hours. The idea is to remove the option entirely so people can focus on each other.&lt;/p&gt;&lt;p&gt;Meanwhile, upscale chain Delilah enforces a strict no phones, no posting policy across locations in cities like Dallas, Las Vegas, Los Angeles and Miami. The goal is privacy and atmosphere.&lt;/p&gt;&lt;p&gt;Even fast food is testing the concept. A Chick-fil-A location in Towson Place, Maryland, offers free ice cream to families who keep their phones off the table. Different approaches, same idea. Less screen time, more presence. &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/food-drink/solo-dining-surges-52-americans-embrace-me-me-me-economy-shared-meals&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;&lt;u&gt;SOLO DINING SURGES 52% AS AMERICANS EMBRACE &apos;ME-ME-ME ECONOMY&apos; OVER SHARED MEALS&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Something subtle shifts when phones are out of reach. People stay in conversations longer. Meals feel more intentional. Even simple activities like playing a game or sharing a story take on more weight. One diner described the experience as rare. No notifications, no pressure to document the moment, no distraction. Just time with another person. Food experts say phones can pull attention away from the dining experience itself. When that distraction disappears, people often leave feeling like something meaningful actually happened. That feeling is what keeps customers coming back.&lt;/p&gt;&lt;p&gt;You do not need to visit a phone-free bar to feel what this shift is about. It is already showing up in our everyday lives. Think about the last time you sat down for dinner. You check your phone for a second. Then a message pops up. Before you know it, the conversation pauses and the moment slips away. That is exactly what many people are starting to notice and question. Try putting your phone away for &lt;a href=&quot;https://www.foxnews.com/food-drink&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;a meal,&lt;/a&gt; even at home. You may find the conversation lasts longer. Things feel a little slower in a good way. You walk away feeling like you were actually there, not half distracted. This is likely just the beginning. More places may start limiting phone use, especially where the experience matters most.&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/ai-dating-cafes-now-real-thing&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;&lt;u&gt;AI DATING CAFES ARE NOW A REAL THING&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;For years, phones have quietly taken over shared spaces. &lt;a href=&quot;https://www.foxnews.com/category/food-drink/food/restaurants&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Restaurants&lt;/a&gt;, concerts and even small gatherings started to revolve around screens. Now the pendulum is swinging back. People are realizing that putting the phone down can change how a moment feels. It does not require a full digital detox. Sometimes it is just one meal, one conversation, one evening without distractions. That small shift can feel bigger than expected.&lt;/p&gt;&lt;p&gt;So here is the real question. When was the last time you had a meal where no one reached for their phone? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/restaurant-eating-photo-1.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">2150f873-54d3-51ff-a2dc-fca552f30700</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/smartphones</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/food-drink/food/restaurants</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/lifestyle</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Tue, 14 Apr 2026 07:18:53 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/ai-now-powering-cyberattacks-microsoft-warns</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/ai-now-powering-cyberattacks-microsoft-warns</guid>
                        <title>AI is now powering cyberattacks, Microsoft warns</title>

                        <description>Microsoft Threat Intelligence says cybercriminals are using AI across nearly every stage of a cyberattack to move faster and scale their operations.</description>
                        
                        
                            <content:encoded>&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Artificial intelligence&lt;/a&gt; promised to make life easier. Write emails faster. Build software quicker. Analyze huge datasets in seconds. Unfortunately, cybercriminals noticed those benefits too.&lt;/p&gt;&lt;p&gt;A new report from &lt;a href=&quot;https://www.foxnews.com/category/tech/companies/microsoft&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Microsoft Threat Intelligence&lt;/a&gt; reveals that attackers are now using AI across nearly every stage of a cyberattack. The technology helps them move faster, scale operations and lower the technical skill required to launch attacks. In simple terms, AI has become a powerful assistant for hackers.&lt;/p&gt;&lt;p&gt;Instead of replacing cybercriminals, it gives them tools that make their work easier.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/5-myths-about-identity-theft-put-your-data-risk&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;Cyberattacks usually involve many steps. Attackers scout victims, craft phishing messages, build infrastructure and write malicious code. According to Microsoft researchers, generative AI tools now help speed up many of those tasks.&lt;/p&gt;&lt;p&gt;Attackers are using AI to:&lt;/p&gt;&lt;p&gt;AI also helps threat actors move more quickly between stages of an attack. Tasks that once took hours or days may now take minutes. Microsoft describes AI as a &quot;force multiplier&quot; that reduces friction for attackers while humans remain in control of targets and strategy.&lt;/p&gt;&lt;p&gt;Some of the most advanced cyber groups are already experimenting with artificial intelligence. Microsoft says North Korean hacking groups known as Jasper Sleet and Coral Sleet have incorporated AI into their operations.&lt;/p&gt;&lt;p&gt;One tactic involves fake remote workers. &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/hackers&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Attackers generate realistic identities,&lt;/a&gt; resumes and communications using AI. They apply for jobs at Western companies and gain legitimate access to internal systems once hired.&lt;/p&gt;&lt;p&gt;In some cases, AI even helps generate culturally appropriate names or email formats that match specific identities. For example, attackers may prompt AI tools to produce lists of names or create realistic email address formats for a fake employee profile. Once inside a company, that access can become extremely valuable.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/how-to-opt-out-ai-data-collection-popular-apps&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HOW TO OPT OUT OF AI DATA COLLECTION IN POPULAR APPS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;Researchers also observed threat actors using AI coding tools to assist with malware development.&lt;/p&gt;&lt;p&gt;Generative AI can help attackers:&lt;/p&gt;&lt;p&gt;In some experiments, malware appeared capable of dynamically generating scripts or changing behavior while running. Meanwhile, attackers can use AI to build phishing websites or attack infrastructure more quickly. Microsoft also observed groups using AI to generate fake company websites that support social engineering campaigns.&lt;/p&gt;&lt;p&gt;AI companies have placed guardrails on their systems to prevent misuse. However, attackers are already experimenting with ways to bypass those safeguards. One tactic is called &lt;a href=&quot;https://www.foxnews.com/tech/spyware-can-hijack-your-phone-seconds&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;&lt;u&gt;jailbreaking&lt;/u&gt;&lt;/a&gt;. It involves manipulating prompts so that an AI system generates content it would normally refuse to produce. Researchers are also watching early experiments with agentic AI, which can perform tasks autonomously and adapt to results.&lt;/p&gt;&lt;p&gt;For now, Microsoft says AI mainly assists human operators rather than running attacks on its own. Still, the technology is evolving quickly.&lt;/p&gt;&lt;p&gt;One of the biggest concerns in the Microsoft report is accessibility. Years ago, launching sophisticated cyberattacks required advanced technical skills. AI tools now help automate parts of that process. Someone with limited programming knowledge can ask AI to generate scripts, troubleshoot code or translate scams into multiple languages.&lt;/p&gt;&lt;p&gt;That shift could expand the number of people capable of launching cyberattacks. At the same time, AI also gives defenders new tools for detecting threats. Security teams are now using AI to analyze behavior, detect anomalies and respond to attacks more quickly. The technology is fueling both sides of the cybersecurity arms race.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/inside-microsofts-ai-content-verification-plan&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;INSIDE MICROSOFT&apos;S AI CONTENT VERIFICATION PLAN&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;Microsoft says its &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;security teams&lt;/a&gt; are working to detect and disrupt AI-enabled cybercrime as it emerges. The company uses threat intelligence systems to monitor attacker activity, identify new tactics and share findings with organizations around the world.&lt;/p&gt;&lt;p&gt;Microsoft also integrates AI into its own security tools to help detect suspicious behavior, phishing campaigns and unusual account activity faster. These systems analyze patterns across billions of signals each day to identify threats before they spread widely.&lt;/p&gt;&lt;p&gt;The company says organizations should strengthen identity protections, monitor unusual credential use and treat suspicious remote worker activity as a potential insider risk.&lt;/p&gt;&lt;p&gt;The rise of AI-powered cyberattacks can sound alarming. The good news is that many proven security habits still work. A few simple steps can dramatically reduce your risk.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/media/scammers-using-ai-meet-match-openai-tech-industry-fight-back&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;AI-generated phishing emails&lt;/a&gt; are becoming more convincing. Always verify requests for passwords, payments or sensitive information before clicking links or downloading files. Also, use strong antivirus protection on all your devices. Strong antivirus software can detect malware, block suspicious downloads and warn you about dangerous websites before they load. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at &lt;i&gt;&lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;A password manager can generate and store complex passwords for every account. This prevents attackers from accessing multiple accounts if one password is exposed. Check out the best expert-reviewed password managers of 2026 at &lt;i&gt;&lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Even if someone steals your password, &lt;a href=&quot;https://www.foxnews.com/tech/top-multi-factor-authentication-apps-protect-your-accounts&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;&lt;u&gt;multi-factor authentication&lt;/u&gt;&lt;/a&gt; adds a second layer of protection and can stop many account takeovers.&lt;/p&gt;&lt;p&gt;Security updates patch vulnerabilities that attackers often exploit. Turn on automatic updates whenever possible.&lt;/p&gt;&lt;p&gt;Cybercriminals often gather &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;personal information&lt;/a&gt; from data broker sites before launching scams. Using a data removal service can help reduce the amount of personal information attackers can find about you online.&lt;/p&gt;&lt;p&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Unexpected login alerts, password reset messages, or unfamiliar devices connected to your accounts may signal a breach. Act quickly if something looks suspicious. &lt;/p&gt;&lt;p&gt;Artificial intelligence is transforming almost every industry. Cybercrime is no exception. Hackers now use AI to craft phishing messages, build malware and scale attacks faster than ever before. The technology lowers technical barriers and speeds up operations while human attackers remain in control. Security experts expect the use of AI in cyberattacks to grow as tools become more powerful and widely available. That makes awareness and strong digital habits more important than ever. Because the next phishing email you receive may not have been written by a person at all.&lt;/p&gt;&lt;p&gt;If AI can now help hackers launch attacks faster and at a larger scale, are tech companies moving quickly enough to protect you? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/ai-powered-cybercrime-3.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">e0e474c9-e120-55fc-9222-e1fc90065b09</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Mon, 13 Apr 2026 11:07:45 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/smart-travel-safety-tips-before-your-next-trip</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/smart-travel-safety-tips-before-your-next-trip</guid>
                        <title>Smart travel safety tips before your next trip</title>

                        <description>Heading abroad? Lock down your phone security, avoid public Wi-Fi risks and prevent surprise charges with these essential international travel tech tips.</description>
                        
                        
                            <content:encoded>&lt;p&gt;You booked the flights. You&apos;re picturing great food, new sights and a break from your routine. Travel should feel easy. But here&apos;s what most people don&apos;t think about until it&apos;s too late. The biggest problems today often come from your &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/smart-and-safe-tech&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;phone, your data and your accounts.&lt;/a&gt; Before we get into the essentials, here&apos;s the question from Chuck V, from Georgia, that sparked this article:&lt;/p&gt;&lt;p&gt;&lt;i&gt;&quot;My wife and I will be flying to Florence, Italy, next week and are wondering if there are any special tips we should be aware of before we leave.&quot;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Chuck, you&apos;re asking the right question at the right time. A few &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;smart moves&lt;/a&gt; before you leave can save you from frozen credit cards, locked accounts or a phone nightmare overseas. Let&apos;s walk through what actually matters.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/how-minimize-your-digital-footprint-when-you-travel&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HOW TO MINIMIZE YOUR DIGITAL FOOTPRINT WHEN YOU TRAVEL&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;Your phone holds your banking apps, email, travel confirmations and personal photos. That makes it more valuable than your passport to the wrong person. Start with updates. Install the latest version of your operating system and update your apps. Security patches close known gaps that attackers look for, especially on public networks.&lt;/p&gt;&lt;p&gt;Next, turn on built-in protections:&lt;/p&gt;&lt;p&gt;A lot of travelers assume their phone plan will work automatically overseas. Sometimes it does. Sometimes it leads to a shocking bill. Here are your main options:&lt;/p&gt;&lt;p&gt;Easy to activate but often expensive if you use a lot of data.&lt;/p&gt;&lt;p&gt;This is usually the best mix of price and convenience. You can install it before your trip and switch it on when you land.&lt;/p&gt;&lt;p&gt;Often cheap but requires swapping your physical SIM and dealing with local setup.&lt;/p&gt;&lt;p&gt;Before choosing, make sure your phone is unlocked. If it is tied to your carrier, some options will not work. Also, turn off automatic data roaming until you need it. That one setting alone can prevent surprise charges. &lt;/p&gt;&lt;p&gt;Want a deeper breakdown of which option is best for you? Read this guide on &lt;a href=&quot;https://www.foxnews.com/tech/how-stay-connected-your-phone-traveling-abroad&quot;&gt;&lt;u&gt;how to stay connected while traveling.&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/travel/popular-travel-scams-safety-warnings-you-need-know-before-taking-vacation&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;POPULAR TRAVEL SCAMS AND SAFETY WARNINGS YOU NEED TO KNOW BEFORE TAKING VACATION&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;Airports, hotels and cafés offer&lt;a href=&quot;https://www.foxnews.com/tech/temptations-risks-free-wi-fi&quot;&gt;&lt;u&gt; free public Wi-Fi &lt;/u&gt;&lt;/a&gt;everywhere. It feels harmless. It is not always safe. Public networks can expose your data if they are not secured. That includes logins, credit card details and emails. Using a &lt;a href=&quot;https://www.foxnews.com/tech/top-4-reasons-you-might-still-need-vpn-cellular-service&quot;&gt;&lt;u&gt;virtual private network (VPN)&lt;/u&gt;&lt;/a&gt; adds a layer of encryption between your device and the internet. It helps protect your activity and reduces the risk of someone intercepting your data. Even with protection, avoid logging into sensitive accounts on public Wi-Fi when possible. Wait until you are on a trusted network or use your mobile data.&lt;/p&gt;&lt;p&gt;Tourist areas attract more than travelers. They attract scammers.&lt;/p&gt;&lt;p&gt;Keep your setup simple:&lt;/p&gt;&lt;p&gt;When you need cash, use ATMs attached to banks. Standalone machines in busy areas are more likely to be tampered with. Pay attention to your surroundings when entering your PIN. Distraction tactics are common in crowded areas. Also, notify your bank before you leave. That reduces the chance of your card being flagged and declined mid-trip. If you want more ways to protect your cards while traveling, read &lt;a href=&quot;https://www.foxnews.com/tech/7-simple-ways-protect-your-credit-cards-while-traveling?msockid=086095bac80461a1261a82a0c9c56080&quot;&gt;&lt;u&gt;this guide&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Your phone can make the entire experience smoother if you use it right. Translation apps help you understand menus, signs and conversations in real time. Camera features can translate text instantly, which is incredibly useful in unfamiliar places. Maps can be downloaded offline, so you are not stuck without directions when your signal drops. Location sharing adds peace of mind. Let a trusted contact see where you are during your trip. These &lt;a href=&quot;https://www.foxnews.com/tech/5-ways-your-iphone-can-make-international-travel-easier-safer&quot;&gt;&lt;u&gt;small features &lt;/u&gt;&lt;/a&gt;make things easier and help you stay focused on the experience instead of logistics.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/us/state-department-reveals-worlds-most-dangerous-countries-americans&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;STATE DEPARTMENT REVEALS WORLD&apos;S MOST DANGEROUS COUNTRIES FOR AMERICANS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;It is tempting to post your location in real time. That can expose more than you intend. Sharing that you are away from home can signal an empty house. Posting your exact location while you are still there can also create unnecessary risk. Instead, share photos after you leave a location or after you return home. It is a simple shift that &lt;a href=&quot;https://www.foxnews.com/tech/how-minimize-your-digital-footprint-when-you-travel&quot;&gt;&lt;u&gt;protects your privacy.&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Before you head to the airport, run through this:&lt;/p&gt;&lt;p&gt;These take minutes but can save hours of frustration later.&lt;/p&gt;&lt;p&gt;Travel today is as much digital as it is physical. Your phone connects everything from your boarding pass to your hotel room. If you protect that one device, you reduce most of the common travel risks. You avoid surprise charges. You lower the chance of account lockouts. You keep &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;your personal data&lt;/a&gt; from being exposed. It also makes your trip smoother. You spend less time troubleshooting and more time enjoying where you are.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Travel should feel exciting, not stressful. Most problems people run into are preventable with a little preparation. Take a few minutes before you leave to lock things down. It is one of the easiest ways to protect your trip.&lt;/p&gt;&lt;p&gt;What other travel questions do you have when it comes to your tech?  Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/travel-tech-safety-tips-2.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">433dbac3-7256-5153-a8e1-cacf55b9fecc</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/travel/general/travel-tips</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/smart-and-safe-tech</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/travel/general/travel-safety</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Mon, 13 Apr 2026 06:49:11 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/identity-theft-losses-surge-70-older-americans</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/identity-theft-losses-surge-70-older-americans</guid>
                        <title>Identity theft losses surge 70% for older Americans</title>

                        <description>Identity theft losses among Americans 60 and older surged 70%, reaching $48.5 million according to the FBI&amp;apos;s latest internet crime report.</description>
                        
                        
                            <content:encoded>&lt;p&gt;The FBI has just released its latest annual &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;internet crime report&lt;/a&gt;, and the numbers are staggering: Americans filed 1,008,597 complaints with the Internet Crime Complaint Center (IC3) last year, with losses nearing $20.9 billion.&lt;/p&gt;&lt;p&gt;Buried in the new data is an eerily familiar trend getting more expensive for older adults. Identity theft complaints involving Americans 60 and older totaled 5,359 complaints and $48.5 million in reported losses in 2025, a steep jump from the year before.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/do-you-know-true-cost-identity-theft&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;DO YOU KNOW THE TRUE COST OF IDENTITY THEFT?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The report shows a clear fault line by age. Americans 60 and older filed more than 200,000 complaints in 2025, with reported losses reaching $7.7 billion, the highest total of any age group. By comparison, people in their 30s and 40s submitted more complaints overall, but reported lower total losses. Complaints from older adults more often involve bank accounts, retirement funds, and investment portfolios, where a single identity fraud incident can result in a large withdrawal or transfer.&lt;/p&gt;&lt;p&gt;IC3 data is based on self-reported complaints submitted by victims and businesses throughout the year. Each report includes details such as transaction type, payment method, and estimated losses. The FBI aggregates these submissions to identify where money is moving and which groups are being affected.&lt;/p&gt;&lt;p&gt;Identity theft appears within this data as one of several fraud types. Identity theft prompts fewer complaints than categories such as investment or tech support scams. In many cases, it&apos;s used to get access to existing accounts, where stolen personal details can pass verification checks and move funds.&lt;/p&gt;&lt;p&gt;Investment scams led all categories in 2025, with reported losses of more than $4.5 billion. Business email compromise followed, with losses exceeding $2.9 billion, while tech support scams accounted for more than $1 billion. These categories make up a large share of the $7.7 billion in total losses mentioned earlier.&lt;/p&gt;&lt;p&gt;Identity theft sits below those totals, though it remains part of how some of these cases unfold. Among victims age 60 and older, identity theft complaints added up to $48.5 million in reported losses last year. That&apos;s a roughly 70% increase from 2024.&lt;/p&gt;&lt;p&gt;Other federal data shows how common identity theft remains. The Federal Trade Commission (FTC) receives more than a million identity theft reports each year, placing it among the most frequently reported consumer issues, even as total losses remain lower than other fraud types.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/5-myths-about-identity-theft-put-your-data-risk&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Complaints from &lt;a href=&quot;https://www.foxnews.com/tech/spring-clean-your-digital-footprint-why-retirees-scam-targets&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;older Americans span&lt;/a&gt; a wide range of fraud types, with a few categories appearing consistently across IC3 reports.&lt;/p&gt;&lt;p&gt;With losses climbing, knowing how these scams work and how to spot them early can make all the difference.&lt;/p&gt;&lt;p&gt;Be cautious when asked for Social Security numbers or account credentials. Government agencies, banks, and tech companies do not request this information through unsolicited calls, emails, or messages.&lt;/p&gt;&lt;p&gt;Scams that lead to the largest losses often involve urgency. Requests to &lt;a href=&quot;https://www.foxnews.com/category/finance&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;move money quickly&lt;/a&gt; – especially through wire transfers, cryptocurrency, or gift cards – should be treated with caution. Taking time to verify the request can prevent large losses.&lt;/p&gt;&lt;p&gt;If a message claims to be from a bank or government agency, use a known phone number or official website to confirm. Do not rely on contact details provided in the message itself.&lt;/p&gt;&lt;p&gt;Regularly review bank and &lt;a href=&quot;https://www.foxnews.com/category/finance&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;investment accounts&lt;/a&gt; for unfamiliar transactions. Small or unexpected changes can be an early sign of unwanted access.&lt;/p&gt;&lt;p&gt;Enable two-factor authentication and account alerts where possible. These tools can help flag or block unauthorized access attempts.&lt;/p&gt;&lt;p&gt;When &lt;a href=&quot;https://www.foxnews.com/tech/do-you-know-true-cost-identity-theft&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;identity theft happens&lt;/a&gt;, the first sign could be a new account or a transaction the account holder didn&apos;t authorize. Credit monitoring and identity protection services can track activity across credit files and financial accounts, alerting users when new accounts are opened or when personal information appears in known data breaches.&lt;/p&gt;&lt;p&gt;That can give victims a window to act, such as freezing credit, locking accounts, or disputing fraudulent activity, before they lose money. Many services also offer identity theft insurance and fraud resolution support, helping cover certain losses and guiding victims through the recovery process.&lt;/p&gt;&lt;p&gt;If fraud does happen, that support can include working directly with banks, credit bureaus, and creditors to restore accounts and remove fraudulent activity.&lt;/p&gt;&lt;p&gt;For older Americans, where accounts often hold larger balances, timing can mean the difference between a small loss and a much larger one, and how quickly accounts are restored.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/microsoft-important-mail-email-scam-how-spot&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;MICROSOFT &apos;IMPORTANT MAIL&apos; EMAIL IS A SCAM: HOW TO SPOT IT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;No service can prevent every kind of identity theft. However, monitoring tools and guided recovery support can make it easier to detect suspicious activity early and respond quickly.&lt;/p&gt;&lt;p&gt;See my tips and best picks on Best Identity Theft Protection at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;The numbers tell a clear story. While identity theft may not top the list of total losses, it plays a critical role in how many of the biggest scams succeed. For older Americans, the stakes are higher because the accounts being targeted often hold decades of savings. What stands out isn&apos;t just the increase in complaints. It&apos;s how fraud is evolving. Scammers are combining tactics, using identity theft to unlock accounts, then moving money through investment scams, impersonation schemes or social engineering attacks. Once they get in, the damage can escalate quickly. The takeaway is simple. Slowing down, verifying requests and adding basic protections like alerts and two-factor authentication can make a real difference. Catching suspicious activity early often determines whether a loss stays small or becomes life-changing.&lt;/p&gt;&lt;p&gt;If scammers only need one piece of your personal information to get started, how confident are you that yours isn&apos;t already out there? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Plus, you&apos;ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;&lt;i&gt;Copyright 2026 CyberGuy.com.  All rights reserved.  &lt;/i&gt;&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/old-woman-laptop-phone-1.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">7e129ffb-ee20-58d5-b486-aed8932b0add</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/us/economy/investment</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/us/immigration/demographics</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fbi</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/us/crime/robbery-theft</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Sun, 12 Apr 2026 11:54:01 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/toyota-joins-hydrogen-truck-alliance-push</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/toyota-joins-hydrogen-truck-alliance-push</guid>
                        <title>Toyota joins hydrogen truck alliance push</title>

                        <description>Toyota teams up with Daimler Truck and Volvo Group to scale hydrogen fuel-cell technology for heavy-duty trucks through the Cellcentric partnership.</description>
                        
                        
                            <content:encoded>&lt;p&gt;For years, the conversation around clean transportation has leaned heavily toward batteries. Longer range, faster charging, more EVs on the road. That&apos;s been the story. So when &lt;a href=&quot;https://www.foxnews.com/category/auto/make/toyota&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Toyota Motor Corporation&lt;/a&gt; decided to team up with Daimler Truck and Volvo Group, it raised a fair question: Why double down on hydrogen now? The three companies plan to become equal partners in Cellcentric, a venture focused on fuel-cell systems for heavy-duty trucks and industrial vehicles. The goal is straightforward. Build better hydrogen systems, scale production, and make zero-emissions trucking more realistic. But under the surface, there&apos;s a bigger shift happening.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Plus, you&apos;ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/auto/toyota-using-ai-design-cars-better-faster&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;TOYOTA IS USING AI TO DESIGN BETTER CARS FASTER&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Most people think the future of clean vehicles is all battery-powered. That&apos;s partly true, especially for cars. Heavy-duty trucking is a different story. Battery-electric trucks work well for shorter routes. However, long-haul freight brings different challenges. Bigger batteries add weight. Charging takes time. Payload capacity can take a hit. Hydrogen offers a different tradeoff. Fuel-cell trucks can refuel faster and travel longer distances without carrying massive battery packs. That makes them appealing for long-distance shipping, where every minute off the road matters. That&apos;s exactly why this partnership exists. As Daimler Truck&apos;s leadership has emphasized, hydrogen is meant to complement battery-electric systems, not replace them.&lt;/p&gt;&lt;p&gt;This move might feel sudden, but Toyota has been laying the groundwork since the early 1990s. The company launched the Toyota Mirai in 2014, one of the first mass-produced hydrogen cars. On paper, it looked like a glimpse into the future. In practice, it struggled to catch on. Sales have been limited, and the biggest issue has not been the car itself. It&apos;s the lack of hydrogen refueling infrastructure. In the U.S., you are mostly limited to California if you want to drive one regularly. Still, Toyota didn&apos;t walk away. Instead, it expanded into trucks. It tested hydrogen-powered heavy-duty vehicles in Europe, partnered with manufacturers, and integrated fuel-cell systems into commercial platforms. That experience is now feeding directly into this new partnership.&lt;/p&gt;&lt;p&gt;Building hydrogen technology is expensive. Building the infrastructure is even harder. That&apos;s where this alliance comes in. By combining strengths, each company fills a gap. Toyota brings decades of fuel-cell research and manufacturing experience. Daimler Truck contributes deep knowledge of commercial vehicles and logistics. Volvo Group adds global scale and operational reach. Together, they can share costs, accelerate development, and push for infrastructure growth at the same time. That last piece matters most. Hydrogen only works if there are enough places to refuel. Europe is investing heavily in that network, with plans to expand significantly by 2030. This partnership positions all three companies to benefit if that rollout gains traction.&lt;/p&gt;&lt;p&gt;This does not mean battery EVs are slowing down. Automakers are still investing heavily in &lt;a href=&quot;https://www.foxnews.com/category/auto/attributes/electric&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;electric cars&lt;/a&gt;, better batteries and faster charging networks. Toyota itself continues to expand its EV lineup and production capabilities. What this partnership shows is a shift in strategy. Instead of betting everything on one approach, companies are spreading their bets across multiple technologies. That increases flexibility and improves the chances of meeting long-term emissions goals. Hydrogen may not dominate passenger cars. In trucking, though, it has a real opportunity.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/auto/toyota-hydrogen-powered-pickup-suv&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;TOYOTA UNVEILS HYDROGEN-POWERED PICKUP AND SUV&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Even if you never plan to drive a hydrogen vehicle, this still affects you. Freight powers almost everything you buy. From groceries to electronics, trucks move it across long distances every day. If hydrogen helps clean up long-haul trucking, it could reduce emissions in one of the hardest sectors to fix. It also signals something important about the future of transportation. There won&apos;t be a single solution that works everywhere. Different technologies will serve different needs depending on the job.&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;  &lt;/p&gt;&lt;p&gt;At first glance, this move feels like a detour from the EV momentum we&apos;ve been seeing. Look closer, and it starts to make more sense. Heavy-duty transport has unique demands. Hydrogen happens to solve some of them more efficiently than batteries can today. Toyota joining forces with Daimler Truck and &lt;a href=&quot;https://www.foxnews.com/category/auto/make/volvo&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Volvo is less about changing direction&lt;/a&gt; and more about covering all bases. If infrastructure catches up, this could become one of the more important shifts in clean transportation.&lt;/p&gt;&lt;p&gt;So here&apos;s the real question. If hydrogen ends up powering the trucks that deliver everything you rely on, does it matter what technology powers your own car? Let us know by writing to us at &lt;a href=&quot;http://Cyberguy.com&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Plus, you&apos;ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/Toyota-hydrogen-truck-alliance-push-1.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">a48c4421-b5b0-5adf-a235-32e5693c6bfa</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/auto/make/mercedes-benz</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/auto/style/trucks</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/auto/make/volvo</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/world/disasters/transportation</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/auto/make/toyota</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Sun, 12 Apr 2026 07:21:14 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/remove-personal-info-web-stop-coming-back</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/remove-personal-info-web-stop-coming-back</guid>
                        <title>Remove your personal info from the web; stop it from coming back</title>

                        <description>Struggling to remove personal information from data broker and people search sites? Here&amp;apos;s a complete guide to taking back control of your online privacy.</description>
                        
                        
                            <content:encoded>&lt;p&gt;The first time I tried to &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;remove my personal information&lt;/a&gt; from people search sites, it was back online after a few weeks. If the same thing happened to you, you might have decided it&apos;s just not worth the effort. This is likely by design. &lt;/p&gt;&lt;p&gt;Data brokers profit from your information, so they&apos;re incentivized to make the process as difficult as possible. Sen. Maggie Hassan even called out a few data brokers recently for hiding their opt-out pages altogether. But you don&apos;t have to let them keep your data as long as you know what to do. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/spring-clean-your-digital-footprint-why-retirees-scam-targets&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;SPRING CLEAN YOUR DIGITAL FOOTPRINT: WHY RETIREES ARE SCAM TARGETS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The way I see it, there are two ways you can do this:&lt;/p&gt;&lt;p&gt;I recommend the second option. It saves a lot of time and does a more thorough job than most people will manage on their own. But if you still prefer to go about it yourself, I&apos;ll share a step-by-step guide to help you do it as painlessly and thoroughly as possible.&lt;/p&gt;&lt;p&gt;This step is important for when your information inevitably reappears after some time. Before you start removing anything, compile a list of places where your personal information appears or is likely to be held. Or you can compile the list yourself. The sites will likely include:&lt;/p&gt;&lt;p&gt;These are the easiest to find because they&apos;re designed to be public.&lt;/p&gt;&lt;p&gt;These don&apos;t usually show up in search results because they sell data to businesses, not individuals. You can try to infer their presence based on how your data is used, but it&apos;s no easy feat.&lt;/p&gt;&lt;p&gt;This is one of the reasons I recommend using a data removal service. They narrow down which brokers are most likely to have your information based on things like your location and other markers.&lt;/p&gt;&lt;p&gt;But if you want to try for yourself, look for signals like:&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Where your data likely came from:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;If you&apos;ve shared your data with a company, there&apos;s a strong chance it&apos;s been resold or shared with brokers behind the scenes.&lt;/p&gt;&lt;p&gt;These are often built for targeted advertising and outreach, and your data can circulate across many of them at once.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;How to spot them:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Sudden spikes in spam after:&lt;/p&gt;&lt;p&gt;Signing up for a service&lt;/p&gt;&lt;p&gt;Entering a giveaway or quiz&lt;/p&gt;&lt;p&gt;Downloading a resource (e.g., ebook, discount code)&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Where to check:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Important: Unsubscribing usually stops messages. It doesn&apos;t remove your data from the underlying list.&lt;/p&gt;&lt;p&gt;These sites compile information from across the web but aren&apos;t always designed specifically for &quot;people lookup.&quot;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Examples include:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;How to find them:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Search your name in quotes + keywords like:&lt;/p&gt;&lt;p&gt;These are often overlooked but can still expose valuable details like your location, employer or social links.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/5-myths-about-identity-theft-put-your-data-risk&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Now that you&apos;ve mapped where your data is exposed (or likely to be), it&apos;s time to start removing it. Instead of jumping randomly between sites, work through your list in order of visibility and risk:&lt;/p&gt;&lt;p&gt;These should be your first priority because they make your personal information easy for anyone to find.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Typical process:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What to expect:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Tip:&lt;/strong&gt; Save confirmation emails or screenshots. You may need them if your data reappears.&lt;/p&gt;&lt;p&gt;These can be less standardized since they&apos;re often scraped or republished pages.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Typical process:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Alternative option:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;These take more effort, but they&apos;re worth addressing because they often contain contextual details (job, interests, affiliations.)&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;This is less about a single listing and more about stopping ongoing data use.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Typical process:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Important:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;If the company has a privacy page, look specifically for:&lt;/p&gt;&lt;p&gt;These are the least visible and often the most frustrating to deal with manually.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Typical process:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What makes this harder:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;This is where most people hit a wall and where ongoing monitoring or automation becomes useful.&lt;/p&gt;&lt;p&gt;As you work through your list, track:&lt;/p&gt;&lt;p&gt;This makes it much easier to:&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/1-billion-identity-records-exposed-id-verification-data-leak&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;1 BILLION IDENTITY RECORDS EXPOSED IN ID VERIFICATION DATA LEAK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;My recommendation is to use a personal data removal service. These services handle the entire removal process for you, so there&apos;s no need to search for your own data online or return to data broker sites to repeat opt-out requests. Everything is managed in the background. &lt;/p&gt;&lt;p&gt;They also tend to do a more thorough job than most people can manage on their own.&lt;/p&gt;&lt;p&gt;Many data removal services can request deletions from a wide range of websites, including some that are not easy to find on your own. They also scan for new exposures, alert you if your information shows up again and allow you to submit additional removal requests when needed. In some cases, these requests are handled by privacy specialists.&lt;/p&gt;&lt;p&gt;Most services also include a 30-day money-back guarantee, so you can try it risk-free and see how much of your information is exposed online.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/you-could-sharing-your-social-security-number-when-you-dont-need&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;YOU COULD BE SHARING YOUR SOCIAL SECURITY NUMBER WHEN YOU DON&apos;T NEED TO&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Get a&lt;strong&gt; free scan&lt;/strong&gt; to find out if your personal information is already out on the web: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Removing your personal information from the internet is not a one-and-done task. It takes persistence, a bit of strategy and the right tools. The frustrating part is that your data can come back even after you remove it, but that does not mean the effort is wasted. &lt;/p&gt;&lt;p&gt;Every step you take reduces your exposure and makes it harder for your information to spread. If you want the most control, doing it manually gives you a clear view of where your data lives. However, if you want consistency without the ongoing time commitment, a data removal service can take that burden off your plate and keep working in the background. Either way, the key is to stay proactive. Your data has value, and once you start treating it that way, you will approach your privacy very differently.&lt;/p&gt;&lt;p&gt;Have you ever removed your personal info online only to see it show up again later, and what did you do next? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/person-typing-on-computer.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">f8085a90-3bfe-5ee1-95b4-8a17a1a615a3</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/email</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/companies</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/websites</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/auto/how-to</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Sat, 11 Apr 2026 15:32:08 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/samsung-messages-ending-android-owners-must-know</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/samsung-messages-ending-android-owners-must-know</guid>
                        <title>Samsung Messages ending? What Android owners must know</title>

                        <description>Samsung is phasing out Samsung Messages by July 2026 in the U.S. and pushing Google Messages, but scam texts are targeting confused Galaxy phone owners.</description>
                        
                        
                            <content:encoded>&lt;p&gt;You may be hearing that &lt;a href=&quot;https://www.foxnews.com/category/tech/companies/samsung&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Samsung Messages&lt;/a&gt; is going away, and for many Android users, that&apos;s true. Samsung is quietly phasing out its Samsung Messages app and moving people to &lt;a href=&quot;https://www.foxnews.com/category/tech/companies/google&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Google Messages&lt;/a&gt; as the default texting platform with a planned cutoff around July 2026 in the U.S. &lt;/p&gt;&lt;p&gt;Newer Galaxy phones already come with Google Messages preinstalled, and Samsung Messages is no longer available to download on many newer devices.&lt;/p&gt;&lt;p&gt;That shift is real. But the way people are finding out about it is causing confusion. For many people, it starts with a text that doesn&apos;t feel quite right. They&apos;re checking their phone, and suddenly a text pops up warning that their messaging app is going away. &lt;/p&gt;&lt;p&gt;That&apos;s exactly what happened to Gilberto of Running Springs, California. He wrote to us saying, &quot;I just received a text on my Android phone advising me that Samsung Messages was going to end on July 6th, 2026, and that I needed to change to Google Messages. Is that true or a scam? I am a fan and enjoy your newsletter.&quot;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/microsoft-important-mail-email-scam-how-spot&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;MICROSOFT &apos;IMPORTANT MAIL&apos; EMAIL IS A SCAM: HOW TO SPOT IT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Gilberto is not alone. A growing number of Android owners are seeing similar alerts, and they&apos;re leaving people unsure what&apos;s real and what&apos;s a scam. Here&apos;s what&apos;s real, based on Samsung and Google&apos;s latest moves.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Samsung says Samsung Messages will be discontinued and is pushing people to switch to Google Messages. Google Messages is already the default texting app on many Galaxy phones.&lt;/p&gt;&lt;p&gt;Here&apos;s what we know right now:&lt;/p&gt;&lt;p&gt;Samsung has not made a dramatic shutdown announcement inside settings or via official alerts. Instead, this is more of a phased shift tied to Google&apos;s push for RCS messaging.&lt;/p&gt;&lt;p&gt;This change is not random. It&apos;s about standardizing how texting works across Android.&lt;/p&gt;&lt;p&gt;Google has been pushing RCS, which stands for rich communication services. Think of it as the Android version of iMessage.&lt;/p&gt;&lt;p&gt;With Google Messages, you get:&lt;/p&gt;&lt;p&gt;Samsung has decided it makes more sense to partner with Google rather than maintain a separate messaging platform.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/tax-season-scams-2026-fake-irs-messages-stealing-identities&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;TAX SEASON SCAMS 2026: FAKE IRS MESSAGES STEALING IDENTITIES&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Here&apos;s where things get tricky.&lt;/p&gt;&lt;p&gt;Samsung does not typically send standalone text messages with links asking you to switch apps. That creates a perfect opening for scammers.&lt;/p&gt;&lt;p&gt;Here&apos;s what to look for:&lt;/p&gt;&lt;p&gt;Scammers know people are already hearing about this change, and they&apos;re using that confusion to make their messages look real.&lt;/p&gt;&lt;p&gt;You don&apos;t need to panic. You just need to take control of the process.&lt;/p&gt;&lt;p&gt;Even if the message looks convincing, do not tap anything inside it.  It could take you to a fake site designed to steal your information. It&apos;s also smart to have strong antivirus software on your phone, which can help block malicious links and warn you about suspicious activity before any damage is done. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Open the&lt;strong&gt; Google Play Store&lt;/strong&gt; and search for&lt;strong&gt; Google Messages. &lt;/strong&gt;If it is already installed, you are ahead of the game. If you&apos;re using a newer Galaxy phone, you may already have Google Messages as your default and may not see Samsung Messages at all.&lt;/p&gt;&lt;p&gt;Open &lt;strong&gt;Google Messages.&lt;/strong&gt; If it is not already installed, download it from the &lt;strong&gt;Google Play Store&lt;/strong&gt;. When you open it, tap &quot;&lt;strong&gt;Set default SMS app,&lt;/strong&gt;&quot; select &lt;strong&gt;Google Messages&lt;/strong&gt;, then confirm&lt;strong&gt; &quot;Set as default.&quot;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;If you do not see that prompt, go to&lt;strong&gt; Settings&lt;/strong&gt; &amp;gt;&lt;strong&gt; Apps&lt;/strong&gt; &amp;gt; &lt;strong&gt;Choose default apps&lt;/strong&gt; &amp;gt; &lt;strong&gt;SMS ap&lt;/strong&gt;p (this may appear as &quot;Default apps&quot; on some devices), then select &lt;strong&gt;Google Messages.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;When you switch your &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/apps&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;default messaging app&lt;/a&gt;, your SMS and MMS message history should automatically appear inside Google Messages. Google and Samsung both indicate that existing conversations transfer during the switch. In most cases, that means you will keep your existing text messages and won&apos;t lose your conversation history when you switch apps. It is still a good idea to open Google Messages after switching and confirm your threads are there before removing or disabling Samsung Messages.&lt;/p&gt;&lt;p&gt;Scammers don&apos;t just guess your number. They often get it from data broker sites and other places where your personal information is already floating around online. That&apos;s why it&apos;s smart to use a data removal service&lt;strong&gt;,&lt;/strong&gt; which can help remove your phone number and personal details from these sites. The less information that&apos;s out there, the harder it is for scammers to target you with texts like this in the first place. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Here&apos;s the part that frustrates many people. This transition is not being communicated in a consistent or highly visible way. Some Galaxy phones may show notices inside Samsung Messages or system prompts, but there is no single, universal alert reaching everyone at once. Instead, it&apos;s a gradual shift tied to device updates, software versions and Google&apos;s messaging strategy. That uneven rollout is exactly what creates confusion and gives scam texts an opening.&lt;/p&gt;&lt;p&gt;Some older Samsung phones may continue to use Samsung Messages for now, especially if they are no longer receiving major software updates.&lt;/p&gt;&lt;p&gt;However, Samsung has not given a clear cutoff for the Android version, so the timeline can vary depending on your specific device, carrier and region.&lt;/p&gt;&lt;p&gt;You can check your Android version by going to &lt;strong&gt;Settings &amp;gt;&lt;/strong&gt; &lt;strong&gt;About phone&lt;/strong&gt; &amp;gt; &lt;strong&gt;Software information&lt;/strong&gt; &amp;gt; &lt;strong&gt;Android version.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;This is bigger than just switching apps.&lt;/p&gt;&lt;p&gt;It highlights a growing pattern:&lt;/p&gt;&lt;p&gt;Right now, this change applies to U.S. customers, and timing may vary elsewhere. That kind of uncertainty is exactly what scammers look for, which is why it&apos;s critical to verify any message before you act. &lt;strong&gt;Don&apos;t want to use Google Messages? Here are your options&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;We&apos;re hearing from readers who don&apos;t trust Google and aren&apos;t sure what to do, especially if family members use iPhones.&lt;/p&gt;&lt;p&gt;Here&apos;s the reality:&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Best practical setup:&lt;/strong&gt; Use Google Messages for everyday texting and Signal for private conversations.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Gilberto&apos;s instinct to question that message was the right move. The switch to Google Messages is real, but the text he received might not be. When tech companies make quiet changes, scammers step in fast. The safest move is simple. Ignore unexpected links, verify everything yourself and make the switch on your terms, not theirs.&lt;/p&gt;&lt;p&gt;Should Big Tech companies be doing more to clearly warn you about major changes like this before scammers step in and fill the gap?  Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/person-using-android.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">2ea77bb6-c93a-54c8-8b28-cfb0b7082020</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/smart-and-safe-tech</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/android</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/apps</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/samsung</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/google</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Sat, 11 Apr 2026 15:23:11 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/google-search-led-costly-scam-call</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/google-search-led-costly-scam-call</guid>
                        <title>Google search led to a costly scam call</title>

                        <description>Fake phone numbers in search listings are being used to impersonate companies and steal sensitive information from unsuspecting callers.</description>
                        
                        
                            <content:encoded>&lt;p&gt;You book a flight. You reschedule. Then you try to handle &lt;a href=&quot;https://www.foxnews.com/category/travel&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;travel insurance&lt;/a&gt; quickly so you can move on with your day. That&apos;s exactly what happened to Rosette. She was trying to reach Allianz, a large travel insurance company that many airlines direct customers to after booking.&lt;/p&gt;&lt;p&gt;Within seconds, she was &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;talking to a scammer&lt;/a&gt; who sounded completely legitimate. Here&apos;s how she described it:&lt;/p&gt;&lt;p&gt;That realization hits hard. Suddenly, you start replaying everything in your head. Maybe you thought you knew what to look for. Still, the frustration sets in fast. Here&apos;s the truth: This happens every day to smart, careful people. And the scams keep getting more convincing.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/tech-giants-unite-fight-online-scams&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;TECH GIANTS UNITE TO FIGHT ONLINE SCAMS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;This is known as a search result scam, and it is one of the fastest-growing fraud tactics right now.&lt;/p&gt;&lt;p&gt;Here&apos;s the typical playbook:&lt;/p&gt;&lt;p&gt;In Rosette&apos;s case, there were several clear signs once you step back:&lt;/p&gt;&lt;p&gt;Once she questioned it, the scammer disconnected. That&apos;s classic behavior.&lt;/p&gt;&lt;p&gt;This is not sloppy fraud. It&apos;s polished, fast and designed to catch you when you are distracted. Here&apos;s why it works so well:&lt;/p&gt;&lt;p&gt;Most people assume search results are safe. Scammers exploit that trust with fake listings and ads.&lt;/p&gt;&lt;p&gt;You are often dealing with travel changes, delays or deadlines. That lowers your guard.&lt;/p&gt;&lt;p&gt;These are not obvious scammers. Many operate scripted call centers with trained agents.&lt;/p&gt;&lt;p&gt;Answering within seconds creates the illusion that you reached the right company.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/ssa-impersonation-scams-getting-more-personal&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;SSA IMPERSONATION SCAMS ARE GETTING MORE PERSONAL&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;In Rosette&apos;s situation, the scammer obtained:&lt;/p&gt;&lt;p&gt;That combination matters. Even without an immediate charge, scammers often:&lt;/p&gt;&lt;p&gt;This is why you should treat it as a &lt;a href=&quot;https://www.foxbusiness.com/category/credit-debt&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;compromised card situation,&lt;/a&gt; even if nothing has been charged yet.&lt;/p&gt;&lt;p&gt;This type of scam does not rely on hacking your device. It relies on tricking you into calling the wrong number. That means anyone can fall for it.&lt;/p&gt;&lt;p&gt;You could be booking travel, fixing a billing issue or calling tech support. One wrong click puts you in direct contact with a scammer who already sounds like the real company.&lt;/p&gt;&lt;p&gt;The danger is not just the initial call. It is what happens next if your information is reused or shared.&lt;/p&gt;&lt;p&gt;Here&apos;s &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;how to protect yourself&lt;/a&gt; from this exact scenario moving forward:&lt;/p&gt;&lt;p&gt;Always go directly to the company&apos;s official website and find the contact page there.&lt;/p&gt;&lt;p&gt;These are far more reliable than anything you find through a quick search.&lt;/p&gt;&lt;p&gt;Real companies rarely answer instantly and push for immediate payment details. &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/why-4-charge-your-statement-could-fraud&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHY THAT $4 CHARGE ON YOUR STATEMENT COULD BE FRAUD&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;If it does not match the official company domain, it is a red flag.&lt;/p&gt;&lt;p&gt;Do not wait for fraud to appear. Request a new card number right away.&lt;/p&gt;&lt;p&gt;Enable transaction alerts so you can catch suspicious activity early. &lt;/p&gt;&lt;p&gt;This adds a strong layer of protection against identity theft.&lt;/p&gt;&lt;p&gt;If your personal information was exposed, identity theft protection can monitor your identity, alert you to suspicious activity and help you respond quickly if something goes wrong. See my tips and best picks on Best Identity Theft Protection at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Data broker sites collect and sell your personal details. Removing your information reduces the chances scammers can find and target you again. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;It&apos;s important to call this, out because it matters.&lt;/p&gt;&lt;p&gt;Those steps significantly reduced the damage. This could have gone much further.&lt;/p&gt;&lt;p&gt;Scams like this are not about being careless. They are about being human. You were trying to solve a problem quickly. The scammer was ready for that exact moment. The biggest takeaway is simple: Slow down when money or personal information is involved. Even a few extra seconds to verify a phone number can make all the difference. And if something feels off, trust that instinct.&lt;/p&gt;&lt;p&gt;If you needed to call your bank or airline right now, would you trust the first number you see online? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/woman-looking-at-phone-worried.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">60427a7d-aa97-58b9-be86-926d59f56e2a</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Fri, 10 Apr 2026 12:00:18 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/ai-newsletter-lowes-250m-bet-blue-collar-jobs-ai-cant</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/ai-newsletter-lowes-250m-bet-blue-collar-jobs-ai-cant</guid>
                        <title>Fox News AI Newsletter: Lowe&apos;s $250M bet on blue-collar jobs that AI can&apos;t do</title>

                        <description>Lowe&amp;apos;s CEO warns AI can&amp;apos;t climb a ladder as the company makes a $250 million bet on blue-collar work amid rapid artificial intelligence advancement.</description>
                        
                        
                            <content:encoded>&lt;p&gt;IN TODAY’S NEWSLETTER:&lt;/p&gt;&lt;p&gt;- &lt;strong&gt;Lowe&apos;s CEO warns AI can&apos;t climb a ladder as company makes $250M bet on blue-collar future&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;- &lt;strong&gt;Wisconsin town becomes first in nation to pass referendum restricting AI data center development&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;- &lt;strong&gt;Amazon rebuilding customer shopping experience around AI from ground up&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;HAMMERING IT HOME: Lowe&apos;s CEO warns AI can&apos;t climb a ladder as company makes $250M bet on blue-collar future&lt;/strong&gt; – &lt;a href=&quot;https://www.foxbusiness.com/economy/lowes-ceo-warns-ai-cant-climb-ladder-company-makes-250m-bet-blue-collar-future&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;i&gt;The CEO of Lowe&apos;s highlighted&lt;/i&gt;&lt;/a&gt;&lt;i&gt; the physical limitations of artificial intelligence, noting that AI &quot;can&apos;t climb a ladder,&quot; while simultaneously announcing the home improvement company&apos;s massive $250 million investment focused on the future of blue-collar work.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;CITIZENS FIGHT BACK: Wisconsin town becomes first in nation to pass referendum restricting AI data center development&lt;/strong&gt; – &lt;i&gt;A local community in Wisconsin became the first in the nation to pass a referendum designed to &lt;/i&gt;&lt;a href=&quot;https://www.foxnews.com/media/wisconsin-town-becomes-first-nation-pass-referendum-restricting-ai-data-center-development&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;i&gt;restrict the development&lt;/i&gt;&lt;/a&gt;&lt;i&gt; of massive artificial intelligence data centers in their area.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;CLEAN SHEET: Amazon disrupting itself, rebuilding customer shopping experience around AI from ground up&lt;/strong&gt; &lt;i&gt;– Tech giant &lt;/i&gt;&lt;a href=&quot;https://www.foxbusiness.com/economy/amazon-disrupting-itself-rebuilding-customer-shopping-experience-around-ai-from-ground-up%20&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;i&gt;Amazon is intentionally disrupting&lt;/i&gt;&lt;/a&gt;&lt;i&gt; its own established e-commerce models by rebuilding the entire customer shopping experience from the ground up to center around advanced artificial intelligence technologies.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;SECURITY DISPUTE: Federal appeals court rejects Anthropic bid to block Pentagon blacklist in AI dispute&lt;/strong&gt; – &lt;a href=&quot;https://www.foxnews.com/politics/federal-appeals-court-rejects-anthropic-bid-block-pentagon-blacklist-ai-dispute&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;i&gt;A federal appeals court denied&lt;/i&gt;&lt;/a&gt;&lt;i&gt; a bid by artificial intelligence company Anthropic to block a Pentagon blacklist amid an ongoing legal dispute regarding defense contracting and AI technology.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;WHAT&apos;S AT STAKE: OPINION: Chad Wolf: China&apos;s AI mockery shows fight for America is underway&lt;/strong&gt; – &lt;a href=&quot;https://www.foxnews.com/opinion/chad-wolf-chinas-ai-mockery-shows-fight-americas-underway&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;i&gt;Former acting Homeland Security Secretary Chad Wolf argues&lt;/i&gt;&lt;/a&gt;&lt;i&gt; in a Fox News Digital op-ed that China&apos;s mockery in the artificial intelligence space is a clear indicator that the high-stakes fight for America&apos;s future is already actively underway.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;ENEMY WITHIN: OPINION: We could win AI war, still lose all our freedoms if we aren&apos;t careful&lt;/strong&gt; – &lt;a href=&quot;https://www.foxnews.com/opinion/we-could-win-ai-war-still-lose-all-our-freedoms-we-arent-careful&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;i&gt;A newly published opinion essay&lt;/i&gt;&lt;/a&gt;&lt;i&gt; from Fox News Digital explores the complex geopolitical and domestic threats surrounding artificial intelligence, cautioning that the United States could successfully win the global AI arms race but still risk losing fundamental freedoms if careful guardrails are not implemented.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;REVOLUTIONARY MOMENT: Hollywood titan believes AI is a revolutionary moment reshaping industries&lt;/strong&gt; – &lt;i&gt;A prominent Hollywood titan &lt;/i&gt;&lt;a href=&quot;https://www.foxbusiness.com/media/hollywood-titan-believes-ai-revolutionary-moment-reshaping-industries&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;i&gt;expressed strong convictions&lt;/i&gt;&lt;/a&gt;&lt;i&gt; regarding artificial intelligence, characterizing the technology&apos;s rapid advancement as a revolutionary moment that is fundamentally reshaping the entertainment industry and beyond.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;BOT DOC: AI chatbots refilling psych meds sparks debate&lt;/strong&gt; – &lt;i&gt;If you have ever waited weeks just to renew a &lt;u&gt;mental health prescription,&lt;/u&gt; you already know how frustrating the system can feel. Now &lt;/i&gt;&lt;a href=&quot;https://www.foxnews.com/tech/ai-chatbots-refilling-psych-meds-sparks-debate&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;i&gt;imagine handling that refill&lt;/i&gt;&lt;/a&gt;&lt;i&gt; through a chatbot instead of a doctor.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;FOLLOW FOX NEWS ON SOCIAL MEDIA&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.facebook.com/FoxNews&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow&quot;&gt;&lt;u&gt;Facebook&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.instagram.com/foxnews/&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow&quot;&gt;&lt;u&gt;Instagram&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/c/FoxNews/featured&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow&quot;&gt;&lt;u&gt;YouTube&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://x.com/FoxNews&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;&lt;u&gt;X&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.linkedin.com/company/fox-news-channel/&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow&quot;&gt;&lt;u&gt;LinkedIn&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;SIGN UP FOR OUR OTHER NEWSLETTERS&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/newsletters&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox News First&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/newsletters&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox News Opinion&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/newsletters&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox News Lifestyle&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/newsletters&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox News Health&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;DOWNLOAD OUR APPS&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox Business&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxweather.com/app&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox Weather&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;TRUMP UNVEILS NATIONAL AI POLICY FRAMEWORK&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxsports.com/mobile&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox Sports&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://tubitv.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Tubi&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;WATCH FOX NEWS ONLINE&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/go&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox News Go&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;STREAM FOX NATION&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://nation.foxnews.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox Nation&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;here&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/524/lowes-home-improvement-chicago-fox-news-001.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="524" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">346b2c9a-4f29-59aa-b7ec-0531c281402b</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/columns/artificial-intelligence-newsletter</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/amazon</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Fri, 10 Apr 2026 09:39:27 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/ai-chatbots-refilling-psych-meds-sparks-debate</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/ai-chatbots-refilling-psych-meds-sparks-debate</guid>
                        <title>AI chatbots refilling psych meds sparks debate</title>

                        <description>Utah is testing an AI system to renew certain psychiatric medications, drawing concern from experts about safety, oversight and reliance on patient self-reporting.</description>
                        
                        
                            <content:encoded>&lt;p&gt;If you have ever waited weeks just to renew a &lt;a href=&quot;https://www.foxnews.com/category/health/mental-health&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;mental health prescription,&lt;/a&gt; you already know how frustrating the system can feel. Now imagine handling that refill through a chatbot instead of a doctor.&lt;/p&gt;&lt;p&gt;That kind of thing is already starting to happen. In Utah, a new pilot program is allowing an &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;artificial intelligence&lt;/a&gt; system from Legion Health to renew certain psychiatric medications without direct approval from a physician each time. State officials say this could speed things up and reduce costs.&lt;/p&gt;&lt;p&gt;Many psychiatrists are not convinced. They are asking whether this actually solves the problem it claims to fix.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/amazon-health-ai-brings-doctor-your-pocket&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;AMAZON HEALTH AI BRINGS A DOCTOR TO YOUR POCKET&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;Before this starts sounding like a robot psychiatrist, the program stays tightly limited. The AI only renews a short list of lower-risk medications that a doctor has already prescribed. These include commonly used antidepressants like Prozac, Zoloft and Wellbutrin. &lt;/p&gt;&lt;p&gt;To qualify, patients must meet strict requirements. You need to be stable on your current medication. Recent dosage changes or a psychiatric hospitalization will disqualify you. You also need to check in with a &lt;a href=&quot;https://www.foxnews.com/category/health/health-care&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;healthcare provider&lt;/a&gt; after a set number of refills or within a certain time frame.&lt;/p&gt;&lt;p&gt;During the process, the chatbot asks about symptoms, side effects and warning signs such as suicidal thoughts. If anything raises concern, it sends the case to a real doctor before approving a refill. According to an agreement filed with Utah&apos;s Office of Artificial Intelligence Policy, the pilot includes strict safeguards, including human review thresholds and automatic escalation for higher-risk cases. The system cannot prescribe new medications or manage drugs that require close monitoring. As a result, it leaves out many complex conditions from the pilot.&lt;/p&gt;&lt;p&gt;Even with those guardrails, many psychiatrists are uneasy. Brent Kious, a psychiatrist and professor at the University of Utah School of Medicine, has questioned whether AI systems like this actually solve the access problem they are designed to address. &lt;/p&gt;&lt;p&gt;He has suggested that the benefits of an &lt;a href=&quot;https://www.foxnews.com/tech&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;AI-based refill system&lt;/a&gt; may be overstated, especially since patients must already be stable and under care to qualify. Kious has also raised concerns about how much these systems rely on self-reported answers. Patients may not recognize side effects, may answer inaccurately, or may adjust their responses to get the outcome they want. &lt;/p&gt;&lt;p&gt;He has further questioned whether current AI tools can safely handle even routine parts of psychiatric care, noting that treatment decisions often depend on factors that go beyond simple screening questions. He has also pointed to a lack of transparency in how these systems operate, which can make it harder for doctors and patients to fully trust them. &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/healthcare-data-breach-hits-system-storing-patient-records&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HEALTHCARE DATA BREACH HITS SYSTEM STORING PATIENT RECORDS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;Supporters of the program are focused on access. A lot of people in Utah still struggle to get mental health care. Wait times can stretch for weeks. In some areas, there simply are not enough providers available. The idea is that AI can take care of routine refill requests, so doctors have more time to focus on patients with more complex needs. That could help take some pressure off the system. Legion Health is also leaning into convenience. The service is expected to cost about $19 a month and is designed to make refills quicker and easier for patients who qualify. From a big-picture view, that could help. From a patient&apos;s point of view, the trade-off may feel a little more complicated. We reached out to Legion Health for comment but did not hear back before our deadline.&lt;/p&gt;&lt;p&gt;If you rely on mental health medication, this kind of system could &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/innovation&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;change how you manage your care.&lt;/a&gt; You may be able to get refills more quickly if your condition is stable and your treatment plan is not changing. At the same time, this does not replace your doctor. It does not handle new diagnoses or complex decisions. It also adds another layer between you and your care. Instead of a conversation, you are interacting with a system that depends on how you answer a series of questions. Mental health treatment often depends on small details. Changes in mood, sleep or behavior can matter more than a simple yes or no response. That is where some experts believe human care still has a clear advantage.&lt;/p&gt;&lt;p&gt;This pilot is only one step in a much larger shift. Utah is already experimenting with AI in other areas of healthcare. Companies like Legion are signaling plans to expand beyond a single state. What starts with simple refills could eventually move into more complex decisions. That is where the conversation becomes more urgent. Is this a practical way to improve access to care, or does it risk reducing something deeply personal into a transaction driven by software?&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/healthcare/how-artificial-intelligence-transforming-healthcare&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HOW ARTIFICIAL INTELLIGENCE IS TRANSFORMING HEALTHCARE&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;There is no question that access to mental health care needs improvement. Long wait times and limited availability are real problems that affect millions of people. AI may help in specific situations, especially when the task is routine and the patient is stable. Still, convenience should not be confused with quality. For now, this system is narrow in scope and closely monitored. That makes it easier to test. It also highlights how early we are in this transition. The technology will continue to evolve. The real question is whether the safeguards, oversight and transparency will evolve at the same pace.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/ai-presecription-refills-1.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">b21554bb-75cc-585c-964e-8ec48bc82413</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/health/health-care</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/health/mental-health</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Fri, 10 Apr 2026 06:26:30 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/humanoid-robots-hit-mass-production-china</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/humanoid-robots-hit-mass-production-china</guid>
                        <title>Humanoid robots hit mass production in China</title>

                        <description>A Chinese factory is producing humanoid robots every 30 minutes, marking a shift toward large-scale manufacturing and broader adoption.</description>
                        
                        
                            <content:encoded>&lt;p&gt;For years, &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/robots&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;humanoid robots&lt;/a&gt; felt like something you watched on social media. Impressive, yes. Practical, not quite. That line just got blurry.&lt;/p&gt;&lt;p&gt;A new &lt;a href=&quot;https://www.foxnews.com/category/world/world-regions/china&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;factory in China&lt;/a&gt; is now producing humanoid robots at a pace that feels closer to car manufacturing. One robot rolls off the line every 30 minutes.&lt;/p&gt;&lt;p&gt;That adds up to about 10,000 units a year. This is not a prototype phase anymore. This is real production.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, &lt;strong&gt;visit &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; – trusted by millions who watch CyberGuy on TV daily&lt;/strong&gt;. Plus, you’ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/home-robot-cooks-cleans-organizes-your-life&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HOME ROBOT COOKS, CLEANS AND ORGANIZES YOUR LIFE&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;The &lt;a href=&quot;https://www.foxbusiness.com/category/fox-news-manufacturing&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;production line&lt;/a&gt; comes from a partnership between Leju Robotics and Dongfang Precision Science &amp;amp; Technology. What makes this facility stand out is how structured and repeatable the process has become.&lt;/p&gt;&lt;p&gt;There are 24 precision assembly stages. On top of that, 77 inspection steps check everything before a robot leaves the line. That level of testing matters because reliability has always been a weak spot for humanoid machines. Efficiency also jumped. The company says output improved by more than 50 percent compared to older production methods.&lt;/p&gt;&lt;p&gt;Then there is flexibility. The system can switch between robot models without shutting everything down. That means the same factory can serve multiple industries, from automotive to home appliances. This is how you move from cool tech to actual business.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/tech/topics/innovation&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;The robotics industry&lt;/a&gt; has reached a turning point. It is no longer enough to show what a robot can do. Companies now need to prove they can build them at scale.&lt;/p&gt;&lt;p&gt;That shift is showing up across the market.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/category/fox-news-investment&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Investors are watching&lt;/a&gt; production numbers closely. High output signals that a company can move beyond demos and into real deployment. It also shows confidence that there will be actual demand.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/us-targets-chinese-robots-over-security-fears&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;US TARGETS CHINESE ROBOTS OVER SECURITY FEARS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;There is another important change here that is easy to miss. Companies are splitting roles. In this case, Leju Robotics focuses on design and software. Dongfang Precision Science &amp;amp; Technology handles production and scaling. This model looks a lot like how other tech industries evolved. One group builds the brain. Another builds the product at scale. That separation could speed things up across the entire robotics space.&lt;/p&gt;&lt;p&gt;Even with all this progress, &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/software&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;one big problem remains.&lt;/a&gt; Software. Building the body is getting easier. Teaching it how to function in the real world is still difficult. Homes, warehouses and public spaces are unpredictable. Objects vary in shape. Lighting changes. Tasks that seem simple for humans can confuse a machine. Factories can now produce thousands of robots. That does not guarantee those robots will be useful right away. The pressure is shifting toward AI developers to close that gap.&lt;/p&gt;&lt;p&gt;This might feel far removed from everyday life. It is not. As production ramps up, costs usually come down. That opens the door for more businesses to adopt humanoid robots. You could start seeing them in warehouses, retail environments or service roles sooner than expected. At the same time, this &lt;a href=&quot;https://www.foxnews.com/category/us/economy/jobs&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;raises questions about jobs,&lt;/a&gt; safety and how comfortable people feel interacting with machines that look and move like humans. The speed of this shift is what stands out. What felt experimental last year is now moving toward mainstream deployment.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/robots-coming-mcdonalds-near-you&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;ARE ROBOTS COMING TO A MCDONALD’S NEAR YOU?&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;Humanoid robots are entering a new phase. The conversation is no longer about whether they can be built. It is about how quickly they can be produced and where they will actually work. Factories like this one in China are setting the pace. Now the rest of the industry has to keep up.&lt;/p&gt;&lt;p&gt;If humanoid robots become common in workplaces, where would you draw the line between helpful automation and going too far? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, &lt;strong&gt;visit &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; – trusted by millions who watch CyberGuy on TV daily&lt;/strong&gt;. Plus, you’ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/humanoid-robot-mass-production-1.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">0f00232b-7924-58a4-a4c8-0ef7e69602bc</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/robots</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/innovation</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/world/world-regions/china</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Thu, 09 Apr 2026 13:00:44 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/fbi-warns-about-foreign-apps-your-data</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/fbi-warns-about-foreign-apps-your-data</guid>
                        <title>FBI warns about foreign apps and your data</title>

                        <description>The FBI issued an alert warning that some foreign-developed apps may collect and store user data overseas, raising privacy and security concerns.</description>
                        
                        
                            <content:encoded>&lt;p&gt;You &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/apps&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;download an app,&lt;/a&gt; tap &quot;allow,&quot; and move on. It feels routine. But according to the Federal Bureau of Investigation, that simple step may open the door to far more data collection than most people realize.&lt;/p&gt;&lt;p&gt;In a recent alert from the Internet Crime Complaint Center, officials warned that many popular apps used in the U.S. are developed by foreign companies, especially those &lt;a href=&quot;https://www.foxnews.com/category/world/world-regions/china&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;based in China.&lt;/a&gt; That matters because some of these apps operate under laws that can require companies to share user data with the government. In plain terms, your phone could be handing over more information than you expect, and not always just while you are using the app.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you&apos;ll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/how-to-opt-out-ai-data-collection-popular-apps&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HOW TO OPT OUT OF AI DATA COLLECTION IN POPULAR APPS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/tech/topics/fbi&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;The FBI&lt;/a&gt; did not name specific apps in its warning. Instead, it focused on how some foreign-developed apps collect and store data, which can apply to a wide range of popular platforms. The warning focuses on how these apps collect and store data. And the details are eye-opening.&lt;/p&gt;&lt;p&gt;First, some apps can keep gathering information even after you close them. That includes data across your entire device, not just inside the app itself.&lt;/p&gt;&lt;p&gt;Second, default permissions can expose more than your own data. If you allow contact access, the app may collect names, phone numbers, email addresses and even physical addresses from your contacts list. That means your friends and family can be affected too.&lt;/p&gt;&lt;p&gt;Third, many privacy policies confirm that user data may be stored on overseas servers, including in China, where local laws may allow government access, sometimes for as long as the developer chooses.&lt;/p&gt;&lt;p&gt;And finally, some apps may include hidden risks like malware. In worst-case scenarios, malicious code can exploit weaknesses in your phone, create backdoor access and pull in even more data without your knowledge.&lt;/p&gt;&lt;p&gt;This alert did not come out of nowhere. It follows years of growing &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;concern about data privacy,&lt;/a&gt; especially tied to global tech companies. A major example is TikTok, which faced pressure in the U.S. over national security concerns. In early 2026, control of its U.S. operations shifted to a new joint venture involving Oracle, Silver Lake and MGX to avoid a potential ban. That situation helped bring a bigger issue into focus. It is not about one app. It is about how data flows across borders and who can access it.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/politics/fbi-warns-foreign-apps-could-collect-americans-data-even-from-people-who-never-downloaded-them&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;FBI WARNS SOME FOREIGN APPS COULD COLLECT AMERICANS’ DATA — EVEN IF YOU NEVER DOWNLOAD THEM&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;You do not need a technical background to catch red flags. Start with these:&lt;/p&gt;&lt;p&gt;A flashlight app should not need your contacts or microphone.&lt;/p&gt;&lt;p&gt;Look for where your data is stored and how long it is kept.&lt;/p&gt;&lt;p&gt;If there is no way to limit access, that is a warning sign.&lt;/p&gt;&lt;p&gt;Stick to official app stores whenever possible.&lt;/p&gt;&lt;p&gt;Here is the part most people miss. You might think you are safe if you avoid certain apps. But that is not always true. If someone else uploads their contacts and your information is in their phone, your data can still be collected and stored. That creates a ripple effect. One person&apos;s permissions can impact dozens or even hundreds of other people. This is why privacy settings matter more than ever. They are not just about your phone. They affect your entire digital footprint.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/android-flaw-lets-hackers-unlock-phones-minute-&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;ANDROID FLAW LETS HACKERS UNLOCK PHONES IN UNDER A MINUTE&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;You do not need to delete every app on your phone. But you do need to take control of &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;what those apps can access.&lt;/a&gt; &lt;/p&gt;&lt;p&gt;If an app does not truly need your contacts,&lt;a href=&quot;https://www.foxnews.com/tech/5-simple-tech-tips-improve-digital-privacy&quot;&gt;&lt;u&gt; remove that permission&lt;/u&gt;&lt;/a&gt;. This is one of the biggest data exposure risks. &lt;/p&gt;&lt;p&gt;Set &lt;a href=&quot;https://www.foxnews.com/tech/5-simple-tech-tips-improve-digital-privacy&quot;&gt;&lt;u&gt;location to &quot;while using,&lt;/u&gt;&lt;/a&gt;&quot; restrict photo access and keep your microphone and camera off unless needed.&lt;/p&gt;&lt;p&gt;On iPhones, turn off &lt;a href=&quot;https://www.foxnews.com/tech/your-phone-shares-data-night-heres-how-stop&quot;&gt;&lt;u&gt;app tracking&lt;/u&gt;&lt;/a&gt;. On Android,&lt;a href=&quot;https://www.foxnews.com/tech/your-phone-shares-data-night-heres-how-stop&quot;&gt;&lt;u&gt; reset or delete your advertising ID&lt;/u&gt;&lt;/a&gt;. This reduces how much data is shared across apps.&lt;/p&gt;&lt;p&gt;Security updates fix known vulnerabilities. Skipping them leaves the door open. &lt;/p&gt;&lt;p&gt;Apps from trusted stores go through security checks. Third-party downloads carry a higher risk of malware.&lt;/p&gt;&lt;p&gt;Even if you are careful about what you download, some apps can still slip through or exploit vulnerabilities. Strong antivirus software can help detect malware, flag suspicious behavior and protect your data in real time. &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;A password manager can help you create strong, unique passwords without relying on memory. &lt;strong&gt;Check out the best expert-reviewed password managers of 2026 at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Every unused app is another potential data source. If you have not opened it in months, remove it.&lt;/p&gt;&lt;p&gt;On &lt;strong&gt;iPhone&lt;/strong&gt;, go to &lt;strong&gt;Settings &amp;gt; General &amp;gt; iPhone Storage&lt;/strong&gt;, tap any &lt;strong&gt;app&lt;/strong&gt; you do not need, then tap &lt;strong&gt;Delete App&lt;/strong&gt; and confirm by tapping &lt;strong&gt;Delete&lt;/strong&gt;. You can also press and hold the app icon on your home screen, tap &lt;strong&gt;Remove App&lt;/strong&gt;, then select &lt;strong&gt;Delete App&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;On &lt;strong&gt;Samsung&lt;/strong&gt;, go to &lt;strong&gt;Settings &amp;gt; Apps &amp;gt; See all apps&lt;/strong&gt;, tap the &lt;strong&gt;app&lt;/strong&gt; you want to remove, then tap &lt;strong&gt;Uninstall, &lt;/strong&gt;then confirm by tapping &lt;strong&gt;OK&lt;/strong&gt;. You can also press and hold the app icon and drag it to &lt;strong&gt;Uninstall&lt;/strong&gt;, or tap &lt;strong&gt;App info &amp;gt; Uninstall,&lt;/strong&gt; depending on your device.&lt;i&gt; &lt;/i&gt;Settings may vary by manufacturer. &lt;/p&gt;&lt;p&gt;Even if apps collect your data, data brokers often amplify the risk. Using a data removal service to reduce your exposure can limit how detailed your profile becomes. &lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;If you notice unusual activity after installing an app, do not ignore it. That could include strange pop-ups, battery drain or unexpected logins. The FBI encourages people to report suspicious behavior through the IC3 platform at&lt;strong&gt; &lt;u&gt;complaint.ic3.gov/&lt;/u&gt;&lt;/strong&gt;. Reporting helps investigators track patterns and warn others faster.&lt;/p&gt;&lt;p&gt;Apps make life easier. They help you navigate cities, stay in touch and manage daily tasks. But convenience often comes with a trade-off, and that trade-off is your data. The good news is you are not powerless. A few small changes can significantly reduce the amount of information your phone shares.&lt;/p&gt;&lt;p&gt;How much of your personal data are you willing to trade for convenience?  Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/fbi-app-privacy-warning-1.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">eac009e4-736d-5089-bfb4-33b43a31d0c3</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/apps</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fbi</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Thu, 09 Apr 2026 07:58:01 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/space-travel-tickets-back-prices-keep-rising</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/space-travel-tickets-back-prices-keep-rising</guid>
                        <title>Space travel tickets are back, but prices keep rising</title>

                        <description>Virgin Galactic is selling space tickets again at $750,000 a seat, up from $600,000, with over 675 customers already waiting for suborbital flights.</description>
                        
                        
                            <content:encoded>&lt;p&gt;After nearly two years on pause, &lt;a href=&quot;https://www.foxnews.com/category/science/air-and-space&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Virgin Galactic&lt;/a&gt; is selling tickets again. The catch is the price. A seat now costs $750,000. That number is not a typo. It is also a sharp increase from the company&apos;s earlier pricing, which was $600,000. Now the company is reopening sales with 50 new spots available.&lt;/p&gt;&lt;p&gt;The company says flight testing is expected to begin in the third quarter of 2026, with commercial service starting in the fourth quarter of 2026.&lt;/p&gt;&lt;p&gt;If you are thinking about booking, you are not alone. More than 675 customers are currently waiting for their turn to experience &lt;a href=&quot;https://www.foxnews.com/category/science/air-and-space/spaceflight&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;space travel&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/air-taxis-us-could-launch-summer&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;AIR TAXIS IN THE U.S. COULD LAUNCH THIS SUMMER&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Buying a ticket does not mean moving to space. These are short suborbital trips that last about 90 minutes. Here is how it works. Virgin Galactic uses a spaceship that launches from a carrier aircraft at high altitude. After release, the spaceplane fires its rocket engine and climbs to the edge of space. Passengers experience a few minutes of weightlessness before gliding back to Earth. It is closer to a thrill ride than a long mission. Still, for many, the appeal is simple. You get to see Earth from above the atmosphere.&lt;/p&gt;&lt;p&gt;Going to space sounds incredible, but paying for it is a very different story. Building reusable spacecraft is expensive. Testing takes years. Safety requirements are intense. When something goes wrong, the entire program can slow down.&lt;/p&gt;&lt;p&gt;Virgin Galactic knows this firsthand. The company has faced delays, technical challenges and even tragedy. In 2014, a test flight operated by Scaled Composites, the company that designed and built the spaceplane, crashed and killed co-pilot Michael Alsbury. Since then, progress has been careful and at times slow. That helps explain the high ticket price. With only a limited number of flights and passengers, companies rely on premium pricing to stay afloat.&lt;/p&gt;&lt;p&gt;The company&apos;s latest financials highlight that reality. Virgin Galactic reported a net loss of $279 million in 2025 and negative free cash flow of $438 million, underscoring how expensive it is to build and scale commercial spaceflight. CEO Michael Colglazier signaled that pricing could continue to climb as the company ramps up production and testing.&lt;/p&gt;&lt;p&gt;This latest ticket release is tied to a new development phase. Virgin Galactic says it expects its next-generation SpaceShip to enter ground testing in April 2026, with flight testing expected to begin in the third quarter of 2026. Commercial flights with this new vehicle are still on track for the fourth quarter of 2026.&lt;/p&gt;&lt;p&gt;A second SpaceShip is already in progress and is expected to enter service between late 2026 and early 2027, which is expected to increase flight frequency even more.&lt;/p&gt;&lt;p&gt;&quot;We completed pivotal milestones during the first quarter of 2026, and with assembly of our first SpaceShip nearly complete and ground testing set to begin in April, we have released a limited number of Virgin Galactic Spaceflight Expeditions, each priced at $750,000,&quot; said CEO Michael Colglazier.&lt;/p&gt;&lt;p&gt;That production ramp is key. The company is trying to move from monthly flights to a twice-weekly schedule per ship.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/new-personal-evtol-promises-personal-flight-under-40k&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;NEW PERSONAL EVTOL PROMISES PERSONAL FLIGHT UNDER $40K&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The timing of this relaunch is not random. Blue Origin has paused its tourist flights for at least two years. Meanwhile, SpaceX is focused on satellites, cargo missions and government contracts. That leaves Virgin Galactic as the only active option for private individuals who want a ticket to space right now. It is a small market, but for now, it is theirs.&lt;/p&gt;&lt;p&gt;This is the big question hanging over the industry. Space tourism has been around for more than two decades, yet only a handful of people have actually gone. The dream has always been to make it more accessible. Right now, that dream still feels far away. Companies are trying to scale up. Virgin Galactic plans to increase flights from about four per month to as many as 10. If that happens, prices could eventually come down. But for now, the math is simple. Limited supply plus high costs equals very expensive tickets.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/flying-car-now-sale-190000&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;FLYING CAR NOW FOR SALE FOR $190,000&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Even if you are not planning to spend $750,000 on a 90-minute trip, this still matters. First, it shows how close space travel is to becoming a real consumer experience. Not for everyone yet, but no longer something that feels out of reach. Second, the &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/innovation&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;technology being developed&lt;/a&gt; for these flights often trickles down. Advances in materials, safety systems and aviation design can influence other industries over time. Finally, it is a reminder of how early we still are. Space tourism exists, but it is not mainstream. It is still in the phase where wealthy early adopters help fund the future.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Virgin Galactic reopening ticket sales is a signal. The industry is not fading away. It is evolving and trying to enter a new phase. At the same time, the higher price tag tells a different story. Space is still hard. It is still risky. It is still expensive. For now, the view from above remains one of the most exclusive experiences money can buy.&lt;/p&gt;&lt;p&gt;Would you ever pay for a trip to space if prices dropped enough, or does the risk still outweigh the thrill? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved. &lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/richard-branson-virgin-galactic-space-travel.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">4d159be8-bd7f-5aa4-825e-4568ef2643c8</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/science/air-and-space/spaceflight</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/science/air-and-space</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/travel/general/extreme-travel</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Wed, 08 Apr 2026 13:00:51 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/apple-pay-text-scam-almost-cost-15000</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/apple-pay-text-scam-almost-cost-15000</guid>
                        <title>Apple Pay text scam almost cost her $15,000</title>

                        <description>A woman almost lost $15,000 after a fake Apple Pay text led her to call a scammer posing as law enforcement. Learn the warning signs of this growing scam.</description>
                        
                        
                            <content:encoded>&lt;p&gt;You see a charge you don&apos;t recognize. It looks like it came from a trusted brand. Your instinct kicks in. You want to fix it quickly and move on. That&apos;s exactly what happened to Dorothy.&lt;/p&gt;&lt;p&gt;After a simple text, she found herself on the phone with someone who sounded official, confident and completely convincing. Here&apos;s how she described it:&lt;/p&gt;&lt;p&gt;&quot;I received a text from &lt;a href=&quot;https://www.foxnews.com/category/tech/companies/apple&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;APPLE Pay&lt;/a&gt;, which I don&apos;t even use... It said an Apple Store in CA wants to charge me $144... If I have questions, I should call. DUH! I called and was speaking with the scammer.&quot;&lt;/p&gt;&lt;p&gt;Within minutes, the situation escalated.&lt;/p&gt;&lt;p&gt;&quot;He knew everything about me... He said I should take out $15,000... He said he was working with the FBI and the FDIC.&quot;&lt;/p&gt;&lt;p&gt;That&apos;s when the pressure really started. Dorothy told me this story when she joined me on my Beyond Connected podcast, and what happened next shows just how far these scams can go.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/10-ways-protect-seniors-from-email-scams&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;10 WAYS TO PROTECT SENIORS FROM EMAIL SCAMS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;This scam follows a pattern that is becoming more common. It combines a fake &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;alert with a live phone call&lt;/a&gt; designed to build trust fast.&lt;/p&gt;&lt;p&gt;Here&apos;s what is happening behind the scenes:&lt;/p&gt;&lt;p&gt;You get a text about a suspicious charge. It looks urgent. It often includes a number to call.&lt;/p&gt;&lt;p&gt;The number connects you directly to a criminal. They pose as Apple, your bank or even law enforcement.&lt;/p&gt;&lt;p&gt;They may know your name, address or bank. That information often comes from past data breaches.&lt;/p&gt;&lt;p&gt;You are told your money is at risk. You need to act immediately.&lt;/p&gt;&lt;p&gt;In Dorothy&apos;s case, the scammer told her to withdraw $15,000 and lie to &lt;a href=&quot;https://www.foxnews.com/category/banking&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;her bank&lt;/a&gt; about why.&lt;/p&gt;&lt;p&gt;&quot;He said he would stay on the phone with me while I drove to the bank... If anyone asked, I should say I was buying a car.&quot;&lt;/p&gt;&lt;p&gt;That is a major red flag.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/phishing-scam-exploits-apple-mail-trusted-sender-label&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;PHISHING SCAM EXPLOITS APPLE MAIL &apos;TRUSTED SENDER&apos; LABEL&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Dorothy drove to the bank with the scammer still on the phone. This is exactly what criminals want. They try to isolate you and keep control of the situation.&lt;/p&gt;&lt;p&gt;But something didn&apos;t feel right.&lt;/p&gt;&lt;p&gt;&quot;When I got to the bank, I recognized one of the employees and told her that I was uncomfortable... She said to hang up immediately.&quot;&lt;/p&gt;&lt;p&gt;That decision changed everything.&lt;/p&gt;&lt;p&gt;The bank confirmed it was a scam. The calls kept coming from different numbers. Dorothy blocked them all. Fortunately, no money was lost.&lt;/p&gt;&lt;p&gt;Scammers are getting better at one thing. They make you feel like you are solving a problem, not being scammed.&lt;/p&gt;&lt;p&gt;Here&apos;s why this one works so well:&lt;/p&gt;&lt;p&gt;They also add authority. Claiming &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/fbi&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;ties to the FBI&lt;/a&gt; or FDIC makes people feel like they must comply. In reality, no legitimate agency will ever ask you to move money this way.&lt;/p&gt;&lt;p&gt;If you remember nothing else, remember these:&lt;/p&gt;&lt;p&gt;Each one is a warning sign. Together, they confirm it is a scam.&lt;/p&gt;&lt;p&gt;You do not need to outsmart scammers. You just need to slow the situation down.&lt;/p&gt;&lt;p&gt;If you get a suspicious text, do not call the number provided. Look up the official number yourself.&lt;/p&gt;&lt;p&gt;Scammers rely on urgency. Take a moment. Real companies will not rush you like this.&lt;/p&gt;&lt;p&gt;No bank, tech company or government agency will ask you to withdraw cash to &quot;protect&quot; it.&lt;/p&gt;&lt;p&gt;Strong antivirus software can help detect malicious links, block scam websites and warn you before you engage with risky content. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Scammers often use data from breaches to sound convincing. A &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;data removal service&lt;/a&gt; can help reduce your exposure and limit what criminals can find about you online. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;A quick conversation with a friend, family member or bank employee can stop a scam cold.&lt;/p&gt;&lt;p&gt;Consider identity monitoring services that alert you if your information is being misused. See my tips and best picks on Best Identity Theft Protection at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Even if you did not lose money, take a few steps right away:&lt;/p&gt;&lt;p&gt;These steps help protect you from future attempts.&lt;/p&gt;&lt;p&gt;This scam did not begin with a complex hack. Instead, it started with a simple text. That is what makes it so dangerous. At first, it looks routine. Then urgency takes over. As a result, anyone can feel pressured to act quickly and without thinking.&lt;/p&gt;&lt;p&gt;In many cases, the situation feels real. That is how people get pulled into a conversation that seems legitimate. In Dorothy&apos;s case, she trusted her instincts at the right moment. Because of that decision, fortunately, she did not lose $15,000.&lt;/p&gt;&lt;p&gt;Scammers target more than technology. They focus on human behavior. They create pressure, build trust and keep you engaged long enough to make a mistake. However, you can break the cycle. A single pause can disrupt the scam. Asking one question can expose it. Even a quick conversation with someone you trust can stop it. If you&apos;d like to hear more of Dorothy&apos;s story, you can catch our full conversation on my Beyond Connected podcast at &lt;i&gt;&lt;strong&gt;getbeyondconnected.com/&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;If you got a text like this right now, would you pause or would you call? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/woman-iphone-customer.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">c9ccd99a-942a-5d17-9398-825c57a0ea98</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fbi</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/apple</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Wed, 08 Apr 2026 08:00:47 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/healthcare-data-breach-hits-system-storing-patient-records</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/healthcare-data-breach-hits-system-storing-patient-records</guid>
                        <title>Healthcare data breach hits system storing patient records</title>

                        <description>CareCloud says hackers accessed one electronic health record environment for about eight hours on March 16 as investigators review possible data exposure.</description>
                        
                        
                            <content:encoded>&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/health/health-care&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Healthcare data breaches&lt;/a&gt; keep coming. Now, CareCloud is the latest to confirm a serious security incident.&lt;/p&gt;&lt;p&gt;The company says &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/hackers&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;hackers accessed&lt;/a&gt; one of its systems that stores electronic health records, not confirmed patient records themselves. The intrusion lasted more than eight hours on March 16. That window matters because even a short breach can expose sensitive data at scale.&lt;/p&gt;&lt;p&gt;At this point, there is still uncertainty. CareCloud has not confirmed whether any data was taken or what specific information may be involved. However, the investigation is ongoing, and the company has brought in outside cybersecurity experts.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, &lt;strong&gt;visit &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; -  trusted by millions who watch CyberGuy on TV daily&lt;/strong&gt;. Plus, you’ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/health-tech-breach-exposes-3-4m-patient-records&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HEALTH TECH BREACH EXPOSES 3.4M PATIENT RECORDS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;CareCloud operates multiple environments where patient records are stored. According to its filing with the U.S. Securities and Exchange Commission, attackers gained access to one of those environments.&lt;/p&gt;&lt;p&gt;Here is what we know so far:&lt;/p&gt;&lt;p&gt;CareCloud also says the incident was contained to that single environment and did not impact its other systems or platforms. Even so, the biggest unanswered question remains whether any data left the system. That detail matters because stolen health data often fuels identity theft, insurance fraud and targeted scams. &lt;/p&gt;&lt;p&gt;Healthcare companies sit on a goldmine of personal information. That includes names, Social Security numbers and medical histories. Unlike a credit card, you cannot simply cancel your medical history. We saw the scale of this risk during the &lt;a href=&quot;https://www.foxnews.com/tech/change-healthcare-ransomware-attack-exposes-personal-health-information-over-100-million&quot;&gt;&lt;u&gt;Change Healthcare ransomware attack&lt;/u&gt;&lt;/a&gt;. That breach disrupted systems across the U.S. and delayed care for weeks. It also exposed just how interconnected the healthcare infrastructure has become. CareCloud serves more than 45,000 providers and supports millions of patients. That kind of reach makes any incident more serious. &lt;/p&gt;&lt;p&gt;CareCloud has not shared full technical details yet. Public records suggest much of its infrastructure relies on Amazon Web Services. Cloud platforms are widely used across healthcare. They offer scale and flexibility. At the same time, they require strict security controls to prevent unauthorized access. It is still unclear how CareCloud separates or backs up data across its systems. That detail could affect how far attackers were able to move once inside. We reached out to CareCloud for a comment, but did not hear back before our deadline.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/banking-tech-data-breach-exposes-672k-ransomware-attack&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;BANKING TECH DATA BREACH EXPOSES 672K IN RANSOMWARE ATTACK&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;Even if you have never heard of CareCloud, your doctor might use it. That is how these breaches work. A behind-the-scenes company gets compromised, and patients feel the impact later. Right now, there is no confirmation that patient data was stolen. Still, this is the moment to stay alert. If your information was involved, notifications could come weeks or even months later.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Healthcare breaches&lt;/a&gt; can feel out of your control. Still, a few simple habits can make a real difference.&lt;/p&gt;&lt;p&gt;Check every explanation of benefits and billing statement you receive. Look for charges, prescriptions or visits you do not recognize. Even a small, unfamiliar charge can signal fraud. If something looks off, contact your insurer or provider right away.&lt;/p&gt;&lt;p&gt;Health data can be used to open accounts, file fake claims or commit identity theft. Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.&lt;strong&gt; &lt;/strong&gt;The faster you catch it, the easier it is to limit the damage. See my tips and best picks on Best Identity Theft Protection at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com &lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Your &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;personal details&lt;/a&gt; often end up on data broker sites without your knowledge. That information can be used to target you after a breach. Removing your data from these sites with a data removal service reduces how much scammers can find and use against you. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;If you receive emails about medical updates or billing issues, be extra careful. Malicious links and attachments are common after breaches. Strong antivirus software can help detect threats before you click and stop harmful downloads in real time. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp;amp; iOS devices at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/ssa-impersonation-scams-getting-more-personal&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;SSA IMPERSONATION SCAMS ARE GETTING MORE PERSONAL&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Secure your patient portals&lt;/a&gt; with a password you do not use anywhere else. Reusing passwords makes it easier for attackers to access multiple accounts. A password manager can generate and store strong passwords for you so you do not have to remember them. Check out the best expert-reviewed password managers of 2026 at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Turn on two-factor authentication (&lt;a href=&quot;https://www.foxnews.com/tech/what-two-factor-authentication-should-enable-it&quot;&gt;&lt;u&gt;2FA&lt;/u&gt;&lt;/a&gt;) if your provider offers it. This adds a second step, such as a code sent to your phone. Even if someone gets your password, this extra layer can stop them from getting into your account.&lt;/p&gt;&lt;p&gt;After a breach, scammers often pose as healthcare providers or support teams. They may send emails, texts or even call you. Do not click links or share personal details unless you verify the source. When in doubt, go directly to your provider&apos;s official website or call their listed number.&lt;/p&gt;&lt;p&gt;The CareCloud data breach is still unfolding. That uncertainty is part of the problem. Healthcare systems are complex. They rely on multiple vendors, cloud services and interconnected tools. That creates more entry points for attackers. Even when companies respond quickly, the ripple effects can last much longer.&lt;/p&gt;&lt;p&gt;If your most sensitive health data can pass through multiple companies you have never heard of, who should be responsible for keeping it safe? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, &lt;strong&gt;visit &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; -  trusted by millions who watch CyberGuy on TV daily&lt;/strong&gt;. Plus, you’ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/carecloud-data-breach-1.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">2f01b541-8e5b-5f7b-91f3-1ad40e44a886</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/health/health-care</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Tue, 07 Apr 2026 13:22:42 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/home-robot-cooks-cleans-organizes-your-life</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/home-robot-cooks-cleans-organizes-your-life</guid>
                        <title>Home robot cooks, cleans and organizes your life</title>

                        <description>UniX AI is testing its Panther robot in residential settings, where it cooks, organizes and cleans while navigating the clutter and unpredictability of daily life.</description>
                        
                        
                            <content:encoded>&lt;p&gt;Ready for a &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/robots&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;home robot&lt;/a&gt; that wakes you up, makes breakfast and even cleans the house afterward?  It may sound far-fetched. However, the Chinese robotics company UniX AI says it is closer than most people think.&lt;/p&gt;&lt;p&gt;The company&apos;s new Panther series robot is designed to handle full daily routines rather than just one task at a time. It can move through a home, interact with objects and complete multistep actions without constant input.&lt;/p&gt;&lt;p&gt;UniX AI is already testing the system &lt;a href=&quot;https://www.foxnews.com/category/real-estate/home-improvement&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;in real homes&lt;/a&gt; and service environments. That shift from the lab to everyday use is what makes this worth paying attention to.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, &lt;strong&gt;visit &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; - trusted by millions who watch CyberGuy on TV daily&lt;/strong&gt;. Plus, you’ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/ai-robot-now-helps-travelers-san-jose-airport&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;AI ROBOT NOW HELPS TRAVELERS AT SAN JOSÉ AIRPORT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The robot stands about 5 feet 3 inches to 5 feet, 9 inches tall and weighs roughly 170 pounds based on reported specs. Instead of walking like a humanoid, it moves on wheels. That choice improves stability and helps it run longer on a single charge.  This robot can run roughly 6 to 12 hours, depending on use.&lt;/p&gt;&lt;p&gt;A six-microphone array lets it hear and respond to voice commands. That gives it a more natural way to interact with people. Its robotic arms are another key piece. They have multiple joints and can lift up to about 26 pounds. That allows for precise movements like picking up items or placing them exactly where they belong.&lt;/p&gt;&lt;p&gt;Under the hood, the robot is packed with &lt;a href=&quot;https://www.foxnews.com/tech&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;sensors and hardware&lt;/a&gt; that help it understand and move through your home. It uses cameras and depth sensors to see objects and spaces. It can also rely on LiDAR to map its surroundings and avoid obstacles.&lt;/p&gt;&lt;p&gt;This robot is designed to follow through on tasks from start to finish. Instead of stopping after one action, it can continue working through a routine without needing constant input.&lt;/p&gt;&lt;p&gt;In recent demonstrations, UniX AI shows the robot preparing food, organizing items and interacting with home appliances inside real residential settings.&lt;/p&gt;&lt;p&gt;That matters because real homes are messy and unpredictable. The robot has to recognize objects, adjust to different layouts and handle tasks in sequence.&lt;/p&gt;&lt;p&gt;Here are a few examples of what it is being tested to do:&lt;/p&gt;&lt;p&gt;Some of these tasks may sound simple, but they are difficult for machines. Handling objects, moving through tight spaces and working around everyday clutter are still major challenges in robotics.&lt;/p&gt;&lt;p&gt;This is what makes the system stand out. It is not just completing one action. It is working through a series of steps in real environments.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/us-targets-chinese-robots-over-security-fears&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;US TARGETS CHINESE ROBOTS OVER SECURITY FEARS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Most home robots you see today are built for one job. Think robot vacuums or lawn mowers. This system brings those functions into one platform. It works more like a general-purpose helper.&lt;/p&gt;&lt;p&gt;The difference comes down to how it handles tasks. It can plan and complete a sequence instead of waiting for step-by-step instructions. That is where &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;embodied AI&lt;/a&gt; comes in.&lt;/p&gt;&lt;p&gt;It connects software intelligence with physical movement in the real world. Instead of only answering questions, the robot can take action.&lt;/p&gt;&lt;p&gt;Even with all this progress, there are real hurdles. Homes are unpredictable. Lighting changes throughout the day. Objects come in all shapes and textures. Spaces get cluttered fast. Tasks that seem simple to humans can be difficult for machines. Folding clothes, handling soft materials or moving through tight spaces are still major challenges. Cost and safety matter too. Most people will not bring a robot into their home unless it can handle all of that and work reliably every single day.&lt;/p&gt;&lt;p&gt;You are not replacing your morning routine with a robot tomorrow. But this shows &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/innovation&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;where things are heading.&lt;/a&gt; The idea of a home assistant that handles chores is moving closer to reality. That could mean less time spent cleaning and more time for everything else.&lt;/p&gt;&lt;p&gt;At the same time, it raises questions about trust, privacy and cost. A robot that sees your home and hears your voice needs strong safeguards.&lt;/p&gt;&lt;p&gt;For now, think of this as an early glimpse. It is not about buying one today. It is about understanding what could become normal sooner than expected.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/humanoid-robot-shows-speed-real-skill&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HUMANOID ROBOT SHOWS SPEED AND REAL SKILL&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The idea of a robot that cooks, cleans and organizes your life has been around for decades. What feels different now is how close the pieces are coming together. This robot shows real progress in combining movement, perception and decision-making. It is still early, but it is already being tested in real homes. The next few years will show whether it becomes something more of us rely on every day.&lt;/p&gt;&lt;p&gt;If a robot could handle your daily chores, would you trust it inside your home? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, &lt;strong&gt;visit &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; - trusted by millions who watch CyberGuy on TV daily&lt;/strong&gt;. Plus, you’ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/unixai-home-robot-1.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">d9059508-f76e-5777-89d4-b9dd9c998488</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/robots</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/real-estate/home-improvement</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Tue, 07 Apr 2026 08:04:58 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/amazon-job-text-scam-warning-signs</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/amazon-job-text-scam-warning-signs</guid>
                        <title>Amazon job text scam warning signs</title>

                        <description>Fraudsters are using texts offering jobs to target phones, often posing as Amazon with suspicious contact details and no hiring process.</description>
                        
                        
                            <content:encoded>&lt;p&gt;You get a text message. It says &lt;a href=&quot;https://www.foxnews.com/category/tech/companies/amazon&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Amazon is hiring.&lt;/a&gt; The pay sounds great. The work is easy. It feels like a lucky break. Then you read it again. That is when things start to feel off, and you realize it could be a scam. Let&apos;s break down the exact text message &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;scammers are sending&lt;/a&gt; and call out every red flag so you know what to watch for next time.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, &lt;strong&gt;visit &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; -  trusted by millions who watch CyberGuy on TV daily&lt;/strong&gt;. Plus, you’ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.  &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/youtube-job-scam-text-how-spot-fast&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;YOUTUBE JOB SCAM TEXT: HOW TO SPOT IT FAST&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;Here is what stands out right away in this message.&lt;/p&gt;&lt;p&gt;The message opens with &quot;Hi&quot; and does not include your name. Legitimate recruiters usually personalize outreach, especially for a job opportunity. A generic greeting suggests this message was sent to many people at once.&lt;/p&gt;&lt;p&gt;The message shows up out of nowhere, which should immediately raise concern. In this case, there was no application submitted and no prior contact with a recruiter. Because of that, the outreach feels unexpected and unverified. Legitimate companies do not randomly text people with job offers, especially without any previous interaction.&lt;/p&gt;&lt;p&gt;The message comes from a &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/email&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;random Hotmail email address,&lt;/a&gt; not an official Amazon domain. Real recruiters from Amazon use corporate email accounts tied to Amazon. They do not text you from a generic email or personal number. That alone should stop you in your tracks.&lt;/p&gt;&lt;p&gt;The role description sounds broad and generic. &quot;Supporting Amazon sellers&quot; and &quot;online tasks&quot; could mean anything. There are no clear responsibilities, no team, no department. Scammers keep things vague on purpose. It helps them reach more people.&lt;/p&gt;&lt;p&gt;The message promises $100 to $600 per day for about an hour of work. That is not how legitimate jobs work. When you see high pay for very little effort, that is often bait designed to pull you in fast.&lt;/p&gt;&lt;p&gt;It mentions a base pay of $1,000 for every four working days. That conflicts with the daily rate listed earlier. Inconsistent details are a common scam signal. Real job offers are clear and consistent.&lt;/p&gt;&lt;p&gt;The message asks you to text &quot;Interested&quot; to a phone number instead of applying through a formal process. There is no application, no interview and no verification. Because of that, the urgency is intentional and designed to get a fast response before you have time to think it through.&lt;/p&gt;&lt;p&gt;The message tells you to text a number like +14482009251. At first glance, it may look like a U.S. number because of the +1 country code. But scammers often use internet-based numbers that can be routed from anywhere. Legitimate recruiters rarely ask you to move a job conversation to a random phone number. If the number feels off, trust that instinct. &lt;/p&gt;&lt;p&gt;It says, &quot;If you are 25 or older.&quot; That is not a standard hiring requirement for most roles. Random restrictions like this are another sign that something is off.&lt;/p&gt;&lt;p&gt;There is no mention of:&lt;/p&gt;&lt;p&gt;Legitimate companies follow structured hiring steps. They do not skip straight to texting.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/ssa-impersonation-scams-getting-more-personal&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;SSA IMPERSONATION SCAMS ARE GETTING MORE PERSONAL&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;These messages hit a sweet spot for many people. They promise flexible work while also offering remote roles and quick income. As a result, that combination is hard to ignore, especially if you are &lt;a href=&quot;https://www.foxnews.com/category/us/economy/jobs&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;job hunting.&lt;/a&gt; Because of this, scammers design messages that feel like an opportunity rather than a risk.&lt;/p&gt;&lt;p&gt;You are likely to see more messages like this. Job scams have moved from email to text because people respond faster on their phones. That means you need to slow down and question anything that feels too easy or too good. A real opportunity will still be there tomorrow. A scam depends on speed.&lt;/p&gt;&lt;p&gt;We reached out to Amazon about this text message scam, and a spokesperson told us:&lt;/p&gt;&lt;p&gt;&quot;Scammers that attempt to impersonate Amazon put consumers at risk. We will continue to invest in protecting consumers and educating the public on scam avoidance. We encourage consumers to report suspected scams to us so that we can protect their accounts and refer bad actors to law enforcement to help keep consumers safe.&quot;&lt;/p&gt;&lt;p&gt;Start with a quick gut check. Then take these steps. &lt;/p&gt;&lt;p&gt;Go to the official website of Amazon and check their careers page. If the job is real, it will be listed there. &lt;/p&gt;&lt;p&gt;Instead, ignore the message completely. Do not text back, click any links or call the number. Even a quick reply can confirm your number is active, which may lead to more scam attempts.&lt;/p&gt;&lt;p&gt;Scammers often find your number through data broker websites that collect and sell personal information. Using a trusted data removal service can help reduce your exposure by &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;removing your information&lt;/a&gt; from hundreds of these sites and lowering the chances of being targeted. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;If a scam message leads you to a link, your device could be exposed. Strong antivirus software helps block malicious downloads before they cause harm. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp;amp; iOS devices at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;High pay for minimal work is one of the biggest warning signs. If it sounds easy, assume there is a catch.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/tech-giants-unite-fight-online-scams&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;TECH GIANTS UNITE TO FIGHT ONLINE SCAMS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;Look at the email or phone number. If it is not tied to the company, treat it as suspicious.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Never share sensitive details&lt;/a&gt; like your Social Security number, banking information or ID through text. Real employers use secure systems, not text messages. &lt;/p&gt;&lt;p&gt;After you spot the red flags, delete the message right away. In addition, use your phone&apos;s&lt;strong&gt; &quot;Report Spam&quot; option&lt;/strong&gt; to flag it. This helps your carrier and messaging apps identify similar scams and block them for others. Also, Amazon recommends visiting its help pages to find additional information on how to identify scams and report them at &lt;i&gt;&lt;strong&gt;&lt;u&gt;amazon.com/ReportAScam&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;.&lt;/p&gt;&lt;p&gt;At first, the message looks polished. It uses a name and references a well-known company while laying out pay and benefits. However, once you slow down, the problems become clear. For example, the greeting is generic, and you never applied. In addition, the sender does not match the company, and the phone number feels off. On top of that, the pay is unrealistic, and the hiring process is missing entirely. This is how most scams work. They depend on speed instead of accuracy.&lt;/p&gt;&lt;p&gt;Have you ever received a job text like this, and what tipped you off that it was a scam? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, &lt;strong&gt;visit &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; -  trusted by millions who watch CyberGuy on TV daily&lt;/strong&gt;. Plus, you’ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/amazon-job-text-scam-1.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">8fe72364-4f81-5d51-94e5-ba83b73584f7</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/smart-and-safe-tech</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/amazon</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/us/economy/jobs</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Mon, 06 Apr 2026 09:19:50 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/ai-needs-more-power-offices-could-answer</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/ai-needs-more-power-offices-could-answer</guid>
                        <title>AI needs more power: Offices could be the answer</title>

                        <description>Seattle startup Edo is helping utilities turn office buildings into virtual power plants as AI demand and extreme weather add pressure to the grid.</description>
                        
                        
                            <content:encoded>&lt;p&gt;If your office cranks up the AC on a hot afternoon, you are part of a much bigger story. &lt;a href=&quot;https://www.foxnews.com/category/energy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Energy demand&lt;/a&gt; is climbing fast. Data centers and AI systems are using more electricity than ever. At the same time, extreme weather is putting added &lt;a href=&quot;https://www.foxnews.com/category/us/infrastructure-across-america&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;stress on the grid.&lt;/a&gt; That pressure has utilities looking for relief in an unexpected place. Not a new plant. Not a massive battery installation. Instead, they are turning to buildings that already exist. A Seattle startup called Edo is betting your office can help keep the lights on.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, &lt;strong&gt;visit &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; -  trusted by millions who watch CyberGuy on TV daily&lt;/strong&gt;. Plus, you’ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join. &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/politics/basic-monthly-bill-americans-cant-dodge-becoming-midterm-flashpoint&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;A BASIC MONTHLY BILL AMERICANS CAN’T DODGE IS BECOMING A MIDTERM FLASH POINT&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;A virtual power plant, often called a VPP, connects many buildings and devices so they can act like one coordinated energy resource. Instead of generating new electricity, these systems adjust when and how energy gets used.&lt;/p&gt;&lt;p&gt;Here is the idea in plain terms. When demand spikes, a building can temporarily reduce non-essential power use. That might mean cooling a space earlier in the day or delaying equipment that does not need to run right away. Across thousands of buildings, those small shifts add up quickly.&lt;/p&gt;&lt;p&gt;Edo focuses on commercial buildings, which make up a large share of U.S. electricity use. The company installs technology that connects to existing building systems like HVAC, batteries, solar and &lt;a href=&quot;https://www.foxnews.com/category/auto/attributes/electric&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;EV charging.&lt;/a&gt; It links these systems through standard communication protocols and manages them from a central platform. That allows everything to work together instead of operating in silos. Edo then maps out where energy is being used and when. From there, building operators get a clearer picture of what can be adjusted without disrupting daily operations.&lt;/p&gt;&lt;p&gt;For example:&lt;/p&gt;&lt;p&gt;These changes happen with coordination, not guesswork. Utilities can then tap into that flexibility when demand spikes.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/politics/ny-house-gop-launches-pressure-campaign-hochul-scrap-climate-law-over-soaring-energy-costs&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;NY HOUSE GOP LAUNCHES PRESSURE CAMPAIGN ON HOCHUL TO SCRAP CLIMATE LAW OVER SOARING ENERGY COSTS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;This approach solves a real problem. When demand surges, utilities usually face tough choices. They can build new power plants, install large-scale batteries or reduce power through blackouts. All of those options come with high costs or major disruptions. Virtual power plants offer another path. They reduce strain on the grid without building new infrastructure. According to the U.S. Department of Energy, VPPs could provide up to 160 gigawatts of flexible capacity by 2030 if adoption ramps up.&lt;/p&gt;&lt;p&gt;Virtual power plants have been around for years, mostly in residential settings. Companies &lt;a href=&quot;https://www.foxnews.com/category/auto/make/tesla&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;like Tesla,&lt;/a&gt; Sunrun and EnergyHub already connect home batteries and smart devices.&lt;/p&gt;&lt;p&gt;At the same time, firms like Voltus and CPower Energy focus on large industrial users. Commercial buildings, however, have been largely overlooked. That is where Edo sees opportunity.&lt;/p&gt;&lt;p&gt;AI is not just a software story. It is an energy story. Massive data centers require huge amounts of electricity. As more companies adopt &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;AI tools,&lt;/a&gt; demand will continue to rise.&lt;/p&gt;&lt;p&gt;That makes flexible energy strategies more important than ever. Instead of racing to build new plants, utilities are rethinking how existing power gets used. Virtual power plants are becoming part of that solution.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/media/oil-ceo-urges-newsom-do-math-california-governor-vows-stop-offshore-drilling&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;OIL CEO URGES NEWSOM TO DO THE &apos;MATH&apos; AS CALIFORNIA GOVERNOR VOWS TO STOP OFFSHORE DRILLING&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;Office buildings are already being used to support the grid. Companies like Edo are working with thousands of properties to adjust energy use in real time when demand spikes. What makes this shift important is how quickly it can scale. Instead of waiting years for new infrastructure, utilities can tap into systems that already exist. As AI demand grows and energy pressure builds, that flexibility could become one of the most practical tools available.&lt;/p&gt;&lt;p&gt;As AI drives up electricity demand, who should take the lead in keeping the grid stable: utilities or the companies using the most power? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, &lt;strong&gt;visit &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; - trusted by millions who watch CyberGuy on TV daily&lt;/strong&gt;. Plus, you’ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/edo-office-building-energy-1.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">3a2ecc03-9c6d-59e6-b26f-7e59efc2dd68</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/energy</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/energy</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/us/infrastructure-across-america</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Mon, 06 Apr 2026 06:21:46 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/android-flaw-lets-hackers-unlock-phones-minute-</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/android-flaw-lets-hackers-unlock-phones-minute-</guid>
                        <title>Android flaw lets hackers unlock phones in under a minute</title>

                        <description>Researchers say a serious Android vulnerability affecting certain MediaTek processors could let attackers bypass your lock screen and steal data.</description>
                        
                        
                            <content:encoded>&lt;p&gt;Your phone lock screen is supposed to be your last line of defense. If your device gets lost or stolen, that PIN or passcode should keep strangers out of your photos, messages and financial apps. But researchers have found a serious flaw that can break through those protections on certain &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/android&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Android phones&lt;/a&gt; in less than a minute.&lt;/p&gt;&lt;p&gt;Once exploited, attackers can recover your phone&apos;s PIN, unlock encrypted storage and even extract sensitive data such as cryptocurrency wallet seed phrases. Security researchers estimate that roughly one in four Android phones could be affected, particularly budget phones.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report &lt;/strong&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, &lt;strong&gt;visit &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; -  trusted by millions who watch CyberGuy on TV daily&lt;/strong&gt;. Plus, you’ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.  &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/android-fixes-129-security-flaws-major-phone-update&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;ANDROID FIXES 129 SECURITY FLAWS IN MAJOR PHONE UPDATE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;A newly disclosed vulnerability, tracked as CVE-2026-20435 in the National Vulnerability Database, affects some Android phones powered by MediaTek, a major smartphone chip maker based in Taiwan that competes with companies like Qualcomm. These phones use a security component called Trustonic&apos;s Trusted Execution Environment (TEE), which is designed to keep sensitive data, such as encryption keys, protected from the rest of the system.&lt;/p&gt;&lt;p&gt;It stores cryptographic keys that help keep your device encrypted and secure, even if someone tries to tamper with it. However, security analyses of the vulnerability indicate that these protections may be bypassed on affected devices.&lt;/p&gt;&lt;p&gt;By connecting a phone to a computer using a USB cable, an attacker with physical access may be able to exploit the flaw during the early boot process, potentially exposing sensitive data before full security protections are enforced. Think of it like accessing the master key before the safe door even closes. Once attackers gain access to these low-level components, they may be able to access encrypted storage without needing your PIN.&lt;/p&gt;&lt;p&gt;In a worst-case scenario, this type of access could allow attackers to extract highly sensitive information, including personal photos, stored passwords, private messages, financial data, and crypto wallet credentials. If seed phrases for crypto wallets are exposed, attackers could drain funds permanently.&lt;/p&gt;&lt;p&gt;There&apos;s limited action manufacturers can take on their own since the issue originates at the processor level, which is manufactured by MediaTek. The company says it has released a firmware patch addressing the vulnerability. However, the update must still be distributed by individual phone manufacturers through security updates. Depending on the device and whether it is still supported, that update could arrive quickly or not at all.&lt;/p&gt;&lt;p&gt;The good thing is that this attack requires physical access to the phone and a USB connection to a computer. That means it cannot be done remotely over the internet. However, if your phone is stolen, briefly confiscated, or even taken during a repair, the attacker could potentially extract sensitive information.&lt;/p&gt;&lt;p&gt;If you&apos;re not sure whether this vulnerability affects your mobile device, you can look up your phone on a platform like GSMArena or your vendor&apos;s website to see which SoC it uses, then cross-check it with MediaTek&apos;s March security bulletin under CVE-2026-20435. You can log onto &lt;i&gt;&lt;strong&gt;&lt;u&gt;corp.mediatek.com/product-security-bulletin/March-2026 &lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;to review the list of affected chipsets and confirm whether your device may be at risk.&lt;/p&gt;&lt;p&gt;CyberGuy reached out to MediaTek for comment, but did not hear back before our deadline.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/new-android-attack-tricks-you-giving-dangerous-permissions&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;NEW ANDROID ATTACK TRICKS YOU INTO GIVING DANGEROUS PERMISSIONS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;So how do you know if your phone is actually at risk? Not every Android phone is vulnerable. The issue primarily affects devices that use certain MediaTek processors. Here&apos;s how to check your phone:&lt;/p&gt;&lt;p&gt;Go to&lt;strong&gt; Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;About phone&lt;/strong&gt; and look for your exact model name.&lt;/p&gt;&lt;p&gt;Search your &lt;strong&gt;phone model&lt;/strong&gt; on a site like GSMArena or your manufacturer&apos;s website to find the processor (also called the SoC).&lt;/p&gt;&lt;p&gt;If your phone uses a &lt;strong&gt;MediaTek chip&lt;/strong&gt;, it may be affected. Devices with Qualcomm Snapdragon or Google Tensor chips are not part of this specific issue.&lt;/p&gt;&lt;p&gt;Check your phone&apos;s system update settings and install any available updates from your manufacturer.  Go to &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Software update&lt;/strong&gt; and install any &lt;strong&gt;available updates. &lt;/strong&gt;MediaTek has already released a fix, but phone makers must distribute it. Installing updates quickly ensures you receive the firmware patch if your device manufacturer has released it.&lt;/p&gt;&lt;p&gt;If your phone uses one of the affected chips, a few simple precautions can help reduce the chances of someone accessing your data if the device ever falls into the wrong hands.&lt;/p&gt;&lt;p&gt;A security app cannot fix this processor-level flaw. However, it can still help protect your phone from other threats that often follow stolen or compromised devices. It will not stop this specific exploit, but it can detect malicious apps, spyware, and suspicious activity that attackers may install after gaining access. That extra layer of monitoring can help stop additional data theft if your device ever falls into the wrong hands. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp;amp; iOS devices at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;If you store things like cryptocurrency wallet seed phrases, recovery codes, or &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;sensitive documents&lt;/a&gt; in notes apps or screenshots, consider moving them to a secure offline location. If someone extracts your phone&apos;s data through this vulnerability, that information could be exposed.&lt;/p&gt;&lt;p&gt;This exploit requires someone to physically connect your phone to a computer. Do not leave your device unattended in public places, and be cautious when handing it to repair shops or unknown technicians. Physical access dramatically increases the risk.&lt;/p&gt;&lt;p&gt;While the vulnerability bypasses encryption on affected devices, &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;strong lock settings&lt;/a&gt; still protect against many other threats. Use a longer PIN or passcode instead of simple patterns, and enable automatic locking after short periods of inactivity.&lt;/p&gt;&lt;p&gt;Even if attackers gain access to data on your phone, two-factor authentication (2FA) can stop them from logging into your online accounts. Enable it for email, banking apps, cloud storage, and social media wherever possible.&lt;/p&gt;&lt;p&gt;A password manager stores your login credentials in a secure, encrypted vault instead of leaving them scattered across apps and notes. If someone compromises your device, the password manager still protects your accounts with strong encryption, forcing attackers to break through another security layer before they can access your logins. Check out the best expert-reviewed password managers of 2026 at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Some Android devices limit USB data access when locked. Turning on this setting can reduce the risk of unauthorized data extraction through a wired connection, especially in situations where someone briefly gains physical access to your phone. On &lt;a href=&quot;https://www.foxnews.com/category/tech/companies/samsung&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Samsung phones&lt;/a&gt; running the latest software:&lt;/p&gt;&lt;p&gt;&lt;i&gt;Settings may vary slightly depending on your Samsung model and software version.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Go to &lt;strong&gt;Settings&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Tap&lt;strong&gt; Lock screen&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Then, tap &lt;strong&gt;Secure lock settings&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Enter&lt;strong&gt; your current PIN, &lt;/strong&gt;then tap &lt;strong&gt;Continue&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Enable &lt;strong&gt;&quot;Lock network and security&lt;/strong&gt;&quot; (or a similarly named option) to help block USB data access while your device is locked.&lt;/p&gt;&lt;p&gt;This vulnerability exposes a deeper issue with the Android ecosystem. Even when chipmakers release a fix, millions of phones depend on manufacturers to deliver updates that may never arrive, especially for cheaper devices that lose support quickly. We often assume our lock screen and encryption will protect our data if a phone is lost or stolen. However, incidents like this show that protection is only as strong as the update policies behind it. When devices stop receiving security patches, those protections quietly weaken over time.&lt;/p&gt;&lt;p&gt;Should phone manufacturers be required to guarantee security updates for several years if their devices contain critical encryption vulnerabilities? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report &lt;/strong&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, &lt;strong&gt;visit &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; -  trusted by millions who watch CyberGuy on TV daily&lt;/strong&gt;. Plus, you’ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/12/931/523/woman-texts-on-phone.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">42ede4fb-5d84-5d4b-b572-04ecaa3ec91e</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/smartphones</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/android</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Sun, 05 Apr 2026 12:50:35 -0400</pubDate>
                    </item>
                
            
                
                    <item>
                        <link>https://www.foxnews.com/tech/humanoid-robot-shows-speed-real-skill</link>
                        <guid isPermaLink="true">https://www.foxnews.com/tech/humanoid-robot-shows-speed-real-skill</guid>
                        <title>Humanoid robot shows speed and real skill</title>

                        <description>KAIST&amp;apos;s humanoid robot sprints, moonwalks and kicks a ball on a soccer field, showing smooth repeatable movement powered by custom motors and AI.</description>
                        
                        
                            <content:encoded>&lt;p&gt;By now, you&apos;ve no doubt seen &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/robots&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;humanoid robots&lt;/a&gt; run, flip and pull off impressive stunts in recent years. That alone is no longer the headline. What stands out here is how controlled and repeatable the movement appears in a non-lab setting.&lt;/p&gt;&lt;p&gt;Engineers at Korea Advanced Institute of Science and Technology, also known as KAIST, built a humanoid that runs, jumps and even moonwalks with smooth control. In a recent field test, the robot sprinted across a soccer field, kicked a ball toward the goal and changed direction without hesitation.&lt;/p&gt;&lt;p&gt;That is the real shift. It is not about pulling off one impressive move. It is about doing it over and over without missing a beat.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/us-targets-chinese-robots-over-security-fears&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;US TARGETS CHINESE ROBOTS OVER SECURITY FEARS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report &lt;/strong&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, &lt;strong&gt;visit &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; -  trusted by millions who watch CyberGuy on TV daily&lt;/strong&gt;. Plus, you’ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;At about five foot five and 165 pounds, this machine was designed to move fast without losing balance. The team, led by Hae-Won Park, focused on building everything from scratch instead of relying on off-the-shelf parts.&lt;/p&gt;&lt;p&gt;That decision pays off. By designing their own motors, gear systems and controllers, the engineers could fine-tune how power flows through the robot&apos;s body. The result is better torque and faster response when it needs to react in real time.&lt;/p&gt;&lt;p&gt;One standout feature is its Quasi-Direct Drive system. It pairs strong motors with low gear ratios, which helps the robot respond quickly while staying stable. A compact gearbox design also keeps the system lighter and more efficient.&lt;/p&gt;&lt;p&gt;All of that adds up to performance you can see. The robot can run up to about 7.3 miles per hour and climb steps taller than a foot. That is already impressive, and the team is working toward even higher.&lt;/p&gt;&lt;p&gt;Speed alone does not make a robot feel realistic. Movement quality matters just as much. This is where Physical AI comes in. Instead of simply following pre-programmed steps, the robot learns how to move in ways that match real human motion.&lt;/p&gt;&lt;p&gt;Researchers trained it using &lt;a href=&quot;https://www.foxnews.com/category/tech/understanding-ai&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;deep reinforcement learning&lt;/a&gt; combined with human movement data. That training happened in simulation first, then carried over to the real world. The payoff is clear. Movements look fluid instead of robotic. Transitions between actions feel smoother. Even complex motions like dancing or kicking a ball appear controlled rather than forced.&lt;/p&gt;&lt;p&gt;Another interesting detail is how the robot navigates. It can move across uneven terrain using internal sensing, also called proprioception, without relying on cameras. That opens the door for use in environments where visibility is poor.&lt;/p&gt;&lt;p&gt;It is easy to watch a robot moonwalk and think this is just a cool demo. The reality is more practical. The research team is working toward a full humanoid system that can operate in real workplaces. That includes climbing ladders, handling tools and adapting to unpredictable environments. They are also developing a system called DynaFlow. The goal is to let &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;robots learn&lt;/a&gt; directly from human demonstrations. In simple terms, a worker could show a task once, and the robot could learn to repeat it. That kind of learning could reshape how automation works across industries.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/ai-robot-now-helps-travelers-san-jose-airport&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;AI ROBOT NOW HELPS TRAVELERS AT SAN JOSÉ AIRPORT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;You may not be buying a humanoid robot anytime soon, but this shift is closer to your daily life than it sounds. Robots are getting much better at moving in the real world. That means they can start taking on work that used to be too complex for machines. Think of jobs that require balance, quick reactions or constant adjustment.&lt;/p&gt;&lt;p&gt;As a result, industries like construction, manufacturing and logistics could start using humanoid robots more often. These are environments where flexibility matters, and that is exactly what this new generation is built for. At the same time, more everyday tasks are becoming possible to automate. Not just repetitive work, but physical work that once required human coordination and judgment.&lt;/p&gt;&lt;p&gt;All of this points to a bigger change. The line between human work and machine assistance is starting to blur, and that will shape how many jobs look in the years ahead.&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;   &lt;/p&gt;&lt;p&gt;The KAIST humanoid is not just about speed or flashy moves. It reflects a bigger change in how robots are built and trained. By combining custom hardware with smarter AI, researchers are pushing machines closer to human-like capability. That does not mean robots are replacing people tomorrow, but it does mean the pace of change is picking up. When a robot can run, adapt and move naturally, it becomes useful in ways older machines never could.&lt;/p&gt;&lt;p&gt;If robots can soon learn tasks just by watching us, how comfortable are you with sharing your work with a machine that might one day do it better? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report &lt;/strong&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, &lt;strong&gt;visit &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; -  trusted by millions who watch CyberGuy on TV daily&lt;/strong&gt;. Plus, you’ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>
                        

                        
                            
                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/Humanoid-robot-1.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
                            
                        

                        <category domain="foxnews.com/metadata/dc.identifier">8ad00d65-4462-5bd2-969d-ee186934e401</category>
                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>

                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/innovation</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/world/world-regions/south-korea</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
                        
                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/robots</category>
                        

                        
                            <category domain="foxnews.com/section-path">fox-news/tech</category>
                        
                        <category domain="foxnews.com/content-type">article</category>

                        <pubDate>Sun, 05 Apr 2026 07:55:14 -0400</pubDate>
                    </item>
                
            
                
            
                
            
                
            
                
            
                
            
        
    </channel>
</rss>