2023年3月31日 星期五

Delete this malicious extension and stop hackers from stealing your Gmail messages


A cybercriminal threat group from North Korea is using a malicious Chrome extension to steal Gmail emails, according to a report released by Bleeping Computer. Let's dive into how they're doing this and the steps you should take right now to protect yourself. 

The group, which uses the name Kimsuky, has been known to use spear phishing for cyber-espionage in attacks targeting people with high-profile jobs, such as diplomats, journalists, government agencies, politicians and university professors. According to the Director of National Intelligence, "spear phishing is a type of phishing campaign that targets a specific person or group and will often include information known to be of interest to the target, such as current events or financial documents." 

CLICK TO GET KURT’S CYBERGUY NEWSLETTER WITH QUICK TIPS, TECH REVIEWS, SECURITY ALERTS AND EASY HOW-TO’S TO MAKE YOU SMARTER 

The attack starts with a phishing email that urges potential victims to install a Chrome extension known as AF, which can also be installed in Microsoft Edge, Brave and other Chromium-based browsers. Once installed, AF immediately begins stealing the contents of emails from your Gmail account. 

BEWARE OF NEW MACSTEALER MALWARE THAT CAN STEAL YOUR ICLOUD KEYCHAIN DATA AND PASSWORDS 

Once your Gmail account is taken over by AF, Kimsuky uses Google Play’s web-to-phone synchronization feature for installing apps from your computer onto your smartphone to infect victims’ phones with Android malware. This allows hackers to drop, create, delete or steal files as well as retrieve your contacts, make calls, send text messages, turn on your camera and more. 

Beware, because in addition to this AF malware, Kimsuky has a variety of Android malware on the market, including other programs called FastViewer, Fastfire or Fastspy DEX. These programs are disguised as plug-ins for security as well as for viewing documents. 

1) The first thing to remember is to never click on a suspicious email. If you open a phishing email by accident, do not click on any links embedded within the email.  

2) You also should never download any extensions sent to you in an email. If you want to download a new extension, you should be searching for it in Chrome’s More Tools section under extensions. 

3) Most importantly, always have antivirus software installed on all your devices. Antivirus software will protect you from accidentally clicking malicious links and will remove any malware from your devices. 

See my expert review of the best antivirus protection for your Windows, Mac, Android & iOS devices by visiting CyberGuy.com/LockUpYourTech 

FREE ANTIVIRUS: SHOULD YOU USE IT?

4) Always double-check that there are no suspicious-looking apps downloaded to your phone, delete them immediately if you see them and then have your antivirus software scan through your phone to make sure any malware has been removed.

5) Finally, be sure to only download apps from the Google Play Store that have been reviewed and given good ratings. 

Have you been sent any suspicious phishing emails lately? Let us know at cyberguy.com/contact.

For more of my tips, subscribe to my free CyberGuy Report Newsletter by heading to CyberGuy.com/Newsletter

Copyright 2023 CyberGuy.com. All rights reserved.



via Technology News Articles on Fox News https://ift.tt/NuZCH6G

People Are Using ChatGPT For Therapy. Here’s What Mental Health Experts Think About That.


“They can offer some basic support, which is great, but not clinical support.”


View Entire Post ›



via BuzzFeed News https://ift.tt/ksLGmCK

How to get rid of your old cellphone securely


Cellphones have become an extension of our lives. Even more than laptops and computers, your phone likely has a combination of sensitive personal and professional information. I know I couldn't possibly do my work without my phone at my side at all times. 

However, there are always new models of cellphones coming out every time we turn around, and should you decide to sell, recycle, or donate your old cellphone, you've got to always take the necessary steps to clear the data. 

One of the single biggest mistakes that I learned is thinking that deleting the content on your old phone is the same as wiping the data. Deleted data can be recovered by the next stranger who gets your old phone in their hands. 

CLICK TO GET KURT’S CYBERGUY NEWSLETTER WITH QUICK TIPS, TECH REVIEWS, SECURITY ALERTS AND EASY HOW-TO’S TO MAKE YOU SMARTER

Many carriers allow you to bring the old phone in after you purchase the new one it is replacing. In that case, you can directly transfer data from your old phone to your new device. If, however, you need to give up your old phone at the time of trade-in, sale, recycling or donating, then you need to back up the phone before getting rid of all data. 

HOW TO BLUR OUT THE BACKGROUND FOR PRIVACY WHEN YOU ARE ON A FACETIME CALL

Each brand and type of phone has different requirements and steps for backing up phones. To find out how to backup and restore your iPhone, Android and Samsung devices, visit CyberGuy.com/mobilebackup. 

Please note: If your device uses eSIM which is a newer virtual SIM card technology that replaced a physical SIM card, erase your device and the eSIM profile when asked. You may be asked to input your passcode when you hit 'Erase'. 

HOW TO RECORD CALLS ON YOUR PHONE

If you're not using a SIM card, contact your carrier to help transfer the service to the new owner. Don't forget to remove the iPhone you just reset from your list of trusted devices.

You will get a prompt that will ask if you're okay with erasing the list of data. Click Reset Phone. You may be asked to input your pin or other security info. You will get a warning prompt asking if you are sure. 

Click Erase Everything 

NEVER MISS A CALL AGAIN EVEN WHEN YOUR PHONE'S IN ANOTHER

Now that your old phone has been ‘wiped’ clean, you’re ready to sell, recycle or donate your old device. Instead of adding your old phone to your pile of unused tech, consider selling it now that it is wiped clean. 

Because most cellphones contain hazardous materials such as heavy metals, avoid simply throwing them away. Many carriers, electronic stores, and other organizations have recycling or donation programs at no cost to you. The Environmental Protection Agency has a list of donation and recycling programs listed. 

Were these tips helpful? Feel free to reach out if you have any other concerns. 

For more of my tips, subscribe to my free CyberGuy Report Newsletter by heading to CyberGuy.com/Newsletter

Copyright 2023 CyberGuy.com. All rights reserved.



via Technology News Articles on Fox News https://ift.tt/r79AyQ2

Opinion: Dangers Lurk Aboard Cruise Ships. The Cruise Passenger Protection Act Can Help.


Sen. Richard Blumenthal, who authored a cruise safety bill, argues that cruise passengers deserve better protection and support.


View Entire Post ›



via BuzzFeed News https://ift.tt/V2Kks0u

2023年3月30日 星期四

Hackers can take control of your car – how to protect yourself


The right software can turn your smartphone into a spy device that watches everything you do. Scary, I know. Here’s how to check if your phone is infected. 

While you’re at it, check your computer. These are the signs that stalkerware is hard at work tracking your web activity, searches, and even the passwords you type in. 

Shockingly, your car isn’t immune. With the proper electronics and software techniques, a determined hacker can intercept or block your key fob signal, infiltrate your car’s software, and even remotely control your vehicle. 

So, is your connected car hackable? Most likely, yes. Here’s how. 

THAT'S NOT A HUMAN TALKING TO YOU IN THE FAST FOOD DRIVE-THRU

Join 400,000+ who get my free daily tech news email.  

Software hacks 

Compromised car apps 

Does your car have a smartphone app that allows you to unlock and start it remotely? Almost every car manufacturer offers this convenience in some makes and models.

Account usernames and passwords protect these apps. If hackers can break into your account or exploit a bug in the car’s software, they can compromise your entire vehicle. 

My advice: To protect your remote start app, change the default password, use strong and unique credentials and never reuse your passwords from other services. Enable two-factor authentication if you can, and keep that software current. 

Telematics exploits 

Telematics is the broad term describing a connected system that remotely monitors your vehicle's behavior. This data may include your car's location, speed, mileage, tire pressure, fuel use, braking, engine/battery status, and driver behavior. 

By now, you know anything connected to the internet is vulnerable to exploitation. Hackers that intercept your connection can track and even control your vehicle remotely. Now that’s scary. 

My advice: Before you get a car with built-in telematics, consult with your car dealer about the cybersecurity measures they’re employing on connected vehicles. If you have a connected car, ensure its onboard software is always up-to-date. 

Networking attacks 

Here’s a throwback. Cybercriminals can also employ old-school denial-of-service attacks to overwhelm your vehicle and potentially shut down critical functions like airbags, anti-lock brakes, and door locks. 

This attack is feasible since some connected cars have built-in Wi-Fi hotspot capabilities. As with regular home Wi-Fi networks, they can even steal your data if they infiltrate your car’s local network. 

Also, it’s a matter of physical safety. Remember, multiple computers and Engine Control Modules run modern cars. If hackers can shut these systems down, they can put you in grave danger. 

My advice: Regularly changing your car’s onboard Wi-Fi network password is a must. Turning off your car’s Bluetooth and Wi-Fi is also a good idea when not in use. 

Your home’s Wi-Fi needs to stay locked down, too. Use these steps to find and remove anything that shouldn’t be on your network. 

Onboard diagnostics (OBD) hacks 

Every newer car has an onboard diagnostics port. This interface allows mechanics to access your car’s data, read error codes and statistics, and even program new keys. 

Anyone can buy exploit kits that can utilize this port to replicate keys and program new ones to use them for stealing vehicles.

My advice: Always go to a reputable mechanic. A physical steering wheel lock can also give you extra peace of mind. 

FORD JUST MADE THIS TYPE OF VEHICLE EXTINCT

In-car malware 

Another old-school internet hack reaches connected cars, specifically models with internet connectivity and built-in web browsers. 

Crooks can send you emails and messages with malicious links and attachments that can install malware on your car’s system. Anything is possible once the malware is installed. 

Car systems don’t have built-in malware protections, so this can be hard to spot. 

My advice: Practice good computer safety practices even when connected to your car. Never open emails and messages nor follow links from unknown sources. 

Security 202: How to remove malware from your phone or computer 

Key fob attacks 

With the proliferation of cheap electronics and relay gadgets that can be purchased easily online, key fob attacks are more common than ever. 

The relay hack 
 

Always-on key fobs present a serious weakness in your car’s security. If your keys are in range, anyone can open the car, and the system will think it’s you. That’s why newer car models won’t unlock until the key fob is within one foot. 

However, criminals can get relatively cheap relay boxes that capture key fob signals up to 300 feet away and transmit them to your car. 

One thief stands near your car with a relay box while an accomplice scans your house with another. When your key fob signal is picked up, it is transmitted to the box closer to your car, prompting it to open. 

Keep reading for steps on how to protect your keyfob. 

Keyless jamming 

In this scenario, crooks will block your signal. Say you issue a lock command from your key fob. It won’t reach your car, and your doors will remain unlocked. The crooks can then have free access to your vehicle. 

My advice: Always manually check your car doors before stepping away. You can also install a steering wheel lock to deter thieves from stealing your car, even if they get inside. 

How to stop key fob attacks 

There are a few easy ways to block key fob attacks. You can buy a signal-blocking pouch that can hold your keys, like a shielded RFID-blocking pouch

Stick it in the fridge … 

Here’s a free solution: Stick your key fob into the refrigerator or freezer. The multiple layers of metal will block the signal. Just check with your manufacturer to ensure freezing your key fob won’t damage it. 

… or even inside the microwave 

The microwave will also block signals. Just don’t turn it on.

Wrap your key fob in foil 

Since your key fob’s signal is blocked by metal, you can also wrap it up in aluminum foil. While it’s the easiest solution, it can leak the signal if you don’t do it right. You could also make a foil-lined box to put your keys in if you’re in a crafting mood. 

Keep your tech-know going  

My popular podcast is called "Kim Komando Today." It’s a solid 30 minutes of tech news, tips, and callers with tech questions like you from all over the country. Search for it wherever you get your podcasts. For your convenience, hit the link below for a recent episode. 

TECH ADVICE ON THE GO: Amazon's party drug trade, scam targeting Google users & 5 signs your webcam is hacked 

Plus, I share the shocking reason UFO sightings are skyrocketing, how to protect your skis with GPS trackers, the top three police scanner apps, and my $456.76 money-saving hack. And I help folks with security cams, set up a new site, and recover from a Discord scam. There’s a healthy dose of puns, too!

Check out my podcast "Kim Komando Today" on Apple, Google Podcasts, Spotify, or your favorite podcast player. 

Listen to the podcast here or wherever you get your podcasts. Just search for my last name, "Komando." 

Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Listen on 425+ radio stations or get the podcast. And join over 400,000 people who get her free 5-minute daily email newsletter. 

CLICK HERE TO GET THE FOX NEWS APP

Copyright 2023, WestStar Multimedia Entertainment. All rights reserved. 



via Technology News Articles on Fox News https://ift.tt/uBNHGhb

UN agency calls on governments to implement global ethical framework for AI


The United Nations Educational, Scientific and Cultural Organization (UNESCO) called Thursday for countries to implement its global ethical framework immediately following pleas by more than a thousand tech workers for a pause in the training of the most powerful artificial intelligence (AI) systems

The agency said in a release that the "Recommendation on the Ethics of Artificial Intelligence" provides all necessary safeguards. 

"The world needs stronger ethical rules for artificial intelligence: this is the challenge of our time. UNESCO’s Recommendation on the ethics of A.I. sets the appropriate normative framework. Our member states all endorsed this recommendation in November 2021. It is high time to implement the strategies and regulations at national level," Audrey Azoulay, UNESCO’s director-general, said in a statement.

This is the first global framework for the ethical use of A.I. and was adopted unanimously by the 193 member states of the organization. 

DEMOCRATS AND REPUBLICANS COALESCE AROUND CALLS TO REGULATE AI DEVELOPMENT: 'CONGRESS HAS TO ENGAGE'

UNESCO said it guides countries both on how to maximize the benefits of the tool and reduce its risks, providing policy recommendations alongside values and principles.

The group added that it was concerned by many of the ethical issues raised by the innovations, highlighting discrimination and stereotyping in particular, as well as the fight against disinformation, the right to privacy, the protection of personal data and human and environmental rights

ELON MUSK, APPLE CO-FOUNDER, OTHER TECH EXPERTS CALL FOR PAUSE ON 'GIANT AI EXPERIMENTS': 'DANGEROUS RACE'

"Industry self-regulation is clearly not sufficient to avoid these ethical harms, which is why the recommendation provides the tools to ensure that A.I. developments abide by the rule of law, avoiding harm and ensuring that when harm is done, accountability and redressal mechanisms are at hand for those affected," it said.

Notably, the recommendation places a readiness assessment tool at the core of its guidance. The tool enables countries to determine the competencies and skills required in the workforce to ensure robust regulation of the artificial intelligence sector. Furthermore, it also provides that the member states report regularly on their progress and their practices in the field of artificial intelligence, submitting a related report every four years.

CLICK TO GET THE FOX NEWS APP

Thus far, more than 40 countries are working with UNESCO to develop A.I. checks and balances at the national level. A progress report will be presented at the UNESCO Global Forum on the Ethics of Artificial Intelligence in Slovenia this December.

A founding member of UNESCO, the U.S. withdrew from the agency – and not for the first time – under the Trump administration.



via Technology News Articles on Fox News https://ift.tt/XrCypmn

Journalists Are Losing Their Blue Checks On Twitter. Will Newsrooms Pay?


BuzzFeed isn’t ponying up, but for other outlets, paying might make sense.


View Entire Post ›



via BuzzFeed News https://ift.tt/wANgRHp

AI expert warns Elon Musk-signed letter doesn't go far enough, says 'literally everyone on Earth will die'


An artificial intelligence expert with more than two decades of experience studying AI safety said an open letter calling for six-month moratorium on developing powerful AI systems does not go far enough.

Eliezer Yudkowsky, a decision theorist at the Machine Intelligence Research Institute, wrote in a recent op-ed that the six-month "pause" on developing "AI systems more powerful than GPT-4" called for by Tesla CEO Elon Musk and hundreds of other innovators and experts understates the "seriousness of the situation." He would go further, implementing a moratorium on new large AI learning models that is "indefinite and worldwide." 

The letter, issued by the Future of Life Institute and signed by more than 1,000 people, including Musk and Apple co-founder Steve Wozniak, argued that safety protocols need to be developed by independent overseers to guide the future of AI systems.

"Powerful AI systems should be developed only once we are confident that their effects will be positive and their risks will be manageable," the letter said. Yudkowsky believes this is insufficient.

ELON MUSK, APPLE CO-FOUNDER, OTHER TECH EXPERTS CALL FOR PAUSE ON ‘GIANT AI EXPERIMENTS’: ‘DANGEROUS RACE’

"The key issue is not "human-competitive" intelligence (as the open letter puts it); it’s what happens after AI gets to smarter-than-human intelligence," Yudkowsky wrote for Newsweek. 

"Many researchers steeped in these issues, including myself, expect that the most likely result of building a superhumanly smart AI, under anything remotely like the current circumstances, is that literally everyone on Earth will die," he asserts. "Not as in ‘maybe possibly some remote chance,’ but as in ‘that is the obvious thing that would happen.’"

ARTIFICIAL INTELLIGENCE ‘GODFATHER’ ON AI POSSIBLY WIPING OUT HUMANITY: ‘IT’S NOT INCONCEIVABLE'

For Yudkowsky, the problem is that an AI more intelligent than human beings might disobey its creators and would not care for human life. Do not think "Terminator" — "Visualize an entire alien civilization, thinking at millions of times human speeds, initially confined to computers—in a world of creatures that are, from its perspective, very stupid and very slow," he writes. 

Yudkowsky warns that there is no proposed plan for dealing with a superintelligence that decides the most optimal solution to whatever problem it is tasked with solving is annihilating all life on Earth. He also raises concerns that AI researchers do not actually know if learning models have become "self-aware," and whether it is ethical to own them if they are. 

DEMOCRATS AND REPUBLICANS COALESCE AROUND CALLS TO REGULATE AI DEVELOPMENT: ‘CONGRESS HAS TO ENGAGE’

Six months is not enough time to come up with a plan, he argues. "It took more than 60 years between when the notion of Artificial Intelligence was first proposed and studied, and for us to reach today’s capabilities. Solving safety of superhuman intelligence—not perfect safety, safety in the sense of ‘not killing literally everyone’—could very reasonably take at least half that long."

Instead, Yudkowsky proposes international cooperation, even between rivals like the U.S. and China, to shut down development of powerful AI systems. He says this is more important than "preventing a full nuclear exchange," and that countries should even consider using nuclear weapons "if that's what it takes to reduce the risk of large AI training runs." 

"Shut it all down," Yudkowsky writes. "Shut down all the large GPU clusters (the large computer farms where the most powerful AIs are refined). Shut down all the large training runs. Put a ceiling on how much computing power anyone is allowed to use in training an AI system, and move it downward over the coming years to compensate for more efficient training algorithms. No exceptions for governments and militaries." 

Yudkowsky's drastic warning comes as artificial intelligence software continues to grow in popularity. OpenAI's ChatGPT is a recently-released artificial intelligence chatbot that has shocked users by being able to compose songs, create content and even write code.

"We've got to be careful here," OpenAI CEO Sam Altman said about his company's creation earlier this month. "I think people should be happy that we are a little bit scared of this."

Fox News' Andrea Vacchiano contributed to this report.



via Technology News Articles on Fox News https://ift.tt/wzgTrb2

Missing Surveillance Footage, Understaffed Security Teams, A Lost Rape Kit: Passengers Say Cruise Lines Did Not Protect Them Against Sexual Assault


Numerous passengers traveling on major cruise lines such as Carnival and Disney say in court documents that they were raped and assaulted — often times by crew members.


View Entire Post ›



via BuzzFeed News https://ift.tt/BnKQA5f

That's not a human talking to you in the fast food drive-thru


I've been seeing AI pop up everywhere lately, from automatic-driving cars to AI-narrated audiobooks. Now, it looks like the advanced technology is taking over our favorite fast-food chains too, and I'm growing more and more concerned about this taking over yet another sector of American jobs.

CLICK TO GET KURT’S CYBERGUY NEWSLETTER WITH QUICK TIPS, TECH REVIEWS, SECURITY ALERTS AND EASY HOW-TO’S TO MAKE YOU SMARTER

Wingstop has become the latest fast food restaurant to start using AI bots to take customers' orders. It is joining the likes of some of the most famous fast food chains around, including McDonald's, Taco Bell, Chipotle, Popeye's and Domino's. The AI voice bots are mostly being used for drive-thru services and for taking orders over the phone. However, I wouldn't be surprised if these fast food chains start incorporating the technology for taking orders at the counter as well.

CRAZY SHAPESHIFTING DRONE INSPIRED BY DRAGONS FORCES ITSELF AROUND OBJECTS

Wingstop restaurants across multiple states are using AI bots for over-the-phone orders by incorporating conversational bots from the startup company ConverseNow, which is also helping Domino's and Fazoli's.

HOW DRONES ARE REVOLUTIONIZING FOOD DELIVERY BY TAKING TO THE SKIES

Since the pandemic, we've seen a ton of ups and downs when it comes to our economy and businesses not being able to get enough hired help. With the quick advancement of AI, fast food chains are employing this technology mainly because it would prevent them from having to hire and pay human workers. This could help them with everything from getting food to their customers quickly to even extending their hours, as AI bots do not need breaks as humans do. Plus, AI bots are less likely to make mistakes than human workers and, therefore will likely provide more accuracy for customers with their orders.

U.S. MILITARY JET FLOWN BY AI FOR 17 HOURS – SHOULD YOU BE WORRIED?

The answer is yes. With more companies opting for AI tech over human hiring, it seems as though people may struggle a bit more to find work in the future. Many fast-food restaurants are even testing out robotic cooks, cashiers and servers, which would eliminate humans from working there altogether. Chipotle, for example, has already begun its testing on an AI-powered tool called Chippy, which is a tortilla-making robot invented by Miso Robotics.

Restaurants are also looking for ways to better improve mobile orders by incorporating things like voice assistants and designated drive-thru lanes for customers who order on mobile apps. With AI advancing more and more each day, I would say it's safe to assume that the fast food industry may be taken over by AI in the near future.

REVOLUTIONIZING BREAST CANCER DETECTION: THE POWER OF AI

How do you feel about AI taking over fast-food chains? Let us know your thoughts.

For more of my tips, subscribe to my free CyberGuy Report Newsletter by clicking the "Free newsletter" link at the top of my website.

Copyright 2023 CyberGuy.com. All rights reserved. 



via Technology News Articles on Fox News https://ift.tt/8JfGd5e

2023年3月29日 星期三

Crazy shapeshifting drone inspired by dragons forces itself around objects


Graduate students at the University of Tokyo have outdone themselves and are changing the way we look at drones with their newest invention. They created a group of futuristic-looking drone prototypes that can change their structural shape midair.

As you will see in the video below, this could be a game changer if the drones were to be used by companies or the military for moving and transporting things.

CLICK TO GET KURT’S CYBERGUY NEWSLETTER WITH QUICK TIPS, TECH REVIEWS, SECURITY ALERTS AND EASY HOW-TO’S TO MAKE YOU SMARTER 

The students were inspired by the idea of a dragon flying through the air, as we've seen in movies like "Game of Thrones," and how they can twist and turn their bodies as they fly. 

The drones were built with multi-axis gimbal systems and have individual segments. A multi-axis gimbal system is a device that uses motors and sensors to stabilize and control the movement of a camera or other mounted object along multiple axes. It typically consists of a base, which houses the motors and controls, and a platform that holds the camera or other equipment. Also, in this case, each segment has its multi-copter propulsion unit, which powers it and allows it to thrust in any direction. 

The aircraft continually changes its structural shape while in motion, which is why it moves a bit slowly in the video above. However, as you can see, it can handle basic tasks such as pushing and pulling and grabbing onto objects. So the opportunities and potential practical applications for its use are endless. 

5 DRONES EXPERT REVIEWED 

This cutting-edge technology could change the future of drone technology and its use. For instance, it could be used by a company like Amazon to move and transport its products. Or it could possibly be used for search and rescue to change its shape and navigate through narrow spaces or to grab onto objects to transport them or push debris aside to clear a path. Another use could be in agriculture to grab onto and pick fruits and vegetables. It also could help with space exploration and be used to create spacecraft that can adapt to different conditions in space. In addition, the military could use this tech to adapt to different terrain types, such as navigating through forests or over rough terrain. 

The fact that the drones have the ability to change structural shape while in motion makes the possibilities for their use endless. It's important to note that the University of Tokyo team is still working on perfecting the drones to try to make them move faster and have more flexibility. 

HOW DRONES ARE REVOLUTIONIZING FOOD DELIVERY BY TAKING TO THE SKIES 

The students have also recently created a prototype known as the SPIDAR, which stands for SPherIcally vectorable and Distributed rotors-assisted Air-ground amphibious quadruped Robo. We know it's quite a mouthful. 

Essentially, the SPIDAR is a quadruped robot with articulating joints at the hip and knee of each leg. The joints are meant to help the robot to move around. However, it still moves pretty slowly and can only walk for around 20 minutes and fly for about nine minutes. The hope is that the students will continue to develop the prototype so that it can eventually hold and manipulate two objects at once. The video below shows the progress that has been made on SPIDAR so far. 

With all new technology, it has its pluses and minuses. While the potential applications of these drones seem exciting and limitless, there are also potential downsides to consider. 

RUSSIA'S DRONE ATTACK: WHY CHINA COULD TRY IT NEXT

One negative could be the potential for these drones to be used for malicious purposes, such as espionage or terrorism. Their ability to change shape and maneuver through tight spaces could be tough to detect and track. Another downside is the impact on jobs, particularly in agriculture, where these types of drones could replace human labor in tasks such as picking crops. I also have concerns about privacy and surveillance if they were to be used for unauthorized surveillance, infringing on your privacy rights. 

I think it's crucial that we consider these potential downsides as we explore the possibilities of this new technology. As this tech becomes available, I really believe it's also important to work to develop regulations and policies that can help to mitigate any negative impacts. 

What do you think of these drones so far? Let us know your thoughts. 

For more of my tips, subscribe to my free CyberGuy Report Newsletter by clicking the "Free newsletter" link at the top of my website. 

Copyright 2023 CyberGuy.com. All rights reserved.



via Technology News Articles on Fox News https://ift.tt/EQ7jgAX

This Uncensored Chatbot Shows What Happens When AI Is Programmed To Disregard Human Decency


FreedomGPT spews out responses sure to offend both the left and the right. Its makers say that is the point.


View Entire Post ›



via BuzzFeed News https://ift.tt/8MVEw59

Apple Introduces Buy Now, Pay Later Service. Here's How It Will Work.


Apple is getting into the buy now, pay later space with a few tweaks to the existing model, including no option to pay with a credit card.

via Tech – NBC Chicago https://ift.tt/iFklp7a

Beware of new MacStealer Malware that can steal your iCloud keychain data and passwords


Mac computers are the latest targets of new info-stealing malware, according to a report from the cybersecurity firm Uptycs, which located it while searching for threats on the dark web.

The dark web is notorious for being a hub for illegal activities and a breeding ground for new malware, so it's not surprising that cybercriminals are actively targeting Mac computers. Here's everything we know so far.

CLICK TO GET KURT’S CYBERGUY NEWSLETTER WITH QUICK TIPS, TECH REVIEWS, SECURITY ALERTS AND EASY HOW-TO’S TO MAKE YOU SMARTER

The new malware is called MacStealer, and it is capable of stealing sensitive data stored in iCloud Keychains, including passwords and credit card information. How these hackers are spreading the malware is still unknown, however, it is likely being spread on fake websites or sent via phishing emails. All that is known is that the malware appears as a DMG file.

A variety of Mac browsers are being attacked, including Google Chrome, Mozilla Firefox and Brave. However, the malware can also harvest Microsoft Office files, images, archives and Python scripts from infected Macs.

ALWAYS DO THIS FIRST BEFORE DOWNLOADING A SOFTWARE UPDATE TO YOUR PHONE

Once MacStealer infects a Mac device, it opens a fake password prompt for users trying to gain access to their System Settings app. Instead of granting access to the app, the malware begins harvesting the user's credentials. It then sends the stolen data back to a command and control server operated by the hackers distributing this malware by using the encrypted messaging app Telegram.

A hacking forum, where the MacStealer creators have been regularly discussing the malware, has revealed that the cybercriminals want to add even more new features, including the ability to capture data from Apple’s Safari browser and its Notes app.

HUNDREDS OF BANKING APPS AT RISK FROM THE NEW NEXUS ANDROID TROJAN

One thing you can do right now is open your Settings app on your Mac computer and make sure that you have the most recent software update installed. If you do not, install it right now. Apple is always making improvements in its security for its devices, so you must make sure all your Apple devices are always up-to-date.

Word of caution: always back up your computer on your Mac so you can reinstall should there be any issues with the update.

Antivirus software will protect you from accidentally clicking malicious links and will remove any malware from your devices. See my expert review of the best antivirus protection for your Windows, Mac, Android and iOS devices by searching "Best Antivirus" at CyberGuy.com by clicking the magnifying glass icon at the top of my website.

REVOLUTIONIZING BREAST CANCER DETECTION: THE POWER OF AI

FREE ANTIVIRUS: SHOULD YOU USE IT?

You also always want to make sure that you're avoiding opening emails from unknown senders and downloading any attachments they may contain.

Avoid clicking on any links within the email as well without inspecting them first to see where they will take you.

DON'T FALL FOR THIS NEW ROUND OF ICLOUD SUPPORT SCAM EMAILS

Have you seen any suspicious activity on your Mac? Let us know below.

For more of my tips, subscribe to my free CyberGuy Report Newsletter by clicking the "Free newsletter" link at the top of my website.

Copyright 2023 CyberGuy.com. All rights reserved.



via Technology News Articles on Fox News https://ift.tt/JMfDNdo

2023年3月28日 星期二

Uber vs Lyft: Which ride service comes out on top?


Smartphones replaced the need for house phones, GPS navigation replaced the use of traditional maps, digital cameras replaced classic film cameras, and Uber and Lyft have almost completely outgrown the taxi business. That's thanks to the ease of use and reach these applications have attained. Due to their user-friendly design, competitive pricing, and safety features (not usually found in taxis), these two apps have amassed a large consumer base. They are deemed reputable and trustworthy when needing a ride, whether at home or away on vacation.

The idea and eventual process of doing something new can be daunting, frightening or anxiety-inducing, but at the end of it, you come out with new superpowers. Your new superpower today will be using Uber or Lyft and saving some cash.

CLICK TO GET KURT’S CYBERGUY NEWSLETTER WITH QUICK TIPS, TECH REVIEWS, SECURITY ALERTS AND EASY HOW-TO’S TO MAKE YOU SMARTER

Uber is one of the top-rated ride-sharing platforms on the Google Play Store and app store, likely from its large and loyal customer base and its availability in over 900 metropolitan areas worldwide.

iPhone: 4.8 stars (at time of publishing)

Android: 4.7 stars (at time of publishing)

While taxis and Ubers differ in many ways, a critical distinguishing component is Uber utilizes ordinary people, like your postman, waiter, or even your child's teacher, who seek to earn extra cash by becoming drivers during their spare time. This does not mean that Uber hires just anyone; they conduct thorough background checks and quality inspections on vehicles to ensure applicants align with safety and customer service standards.

Although taxis have worked fine over the years, Uber tends to be better priced with an upfront rate rather than a price based on a meter. They have personalized selections to fit your needs better; they provide reliable estimates on their arrival time, and it's all available with a few swipes on your Android or iPhone. The platform allows riders to request rides, track their driver's progress, and pay/tip for the ride through the app.

BEST WAYS TO BLOCK SCAM CALLS (DO THIS FOR YOUR OLDER RELATIVES, TOO!)

Step 1: Download the Uber app. Don't be intimidated. This part is super easy. Go to the app store on your iPhone or Google Play Store on your Android device, search for "Uber," and download the app.

Step 2: Sign up. The first step is the hardest, now just follow the prompts. To sign up for an Uber account, enter your phone number first, your name, email address, and payment information. Don’t worry your info is safe. If you already have an account, log in with your email address and password.

Step 3: Set your pick-up location. You can manually enter your pickup location by selecting the top bar or by allowing the app to use your current site. You can also add a destination if you have one.

Step 4: Choose your ride. Now time for some fun. You will be given various ride options, such as UberX, Uber Pool, UberXL. Select the one that fits your needs.

Step 5: Confirm your ride. Once you've chosen, confirm the details and select "Request."

Step 6: Wait for your driver. Don’t wander off or dilly-dally. The app will show your driver's estimated arrival time. Wait at the designated pickup location for your driver to arrive.

Step 7: Once your driver arrives, get in the car and enjoy your ride. The app will show you the route to your destination and the estimated arrival time.

Step 8: Pay and rate your driver: Once you arrive at your destination, the app will confirm your total and give you the opportunity to tip via the app. You can also rate your driver if you have any feedback. The fare will be charged to the payment method you provided during sign-up.

BEING STALKED THROUGH YOUR DEVICES? TAKE THESE STEPS NOW

Now that you're signed up, a few selections are at your disposal if you need additional services during your ride. From wheelchair accessibility to a larger vehicle to riding in luxury, Uber provides several options to cater to your budget or needs. Although, in my personal experience, the standard option tends to be everything you'll ever need at a reasonable rate.

Beyond all of that, there are even a few more options, such as Uber Español (provides the rider with a Spanish-speaking driver), Uber Pet (this option allows the rider to bring along their furry friend), and Uber electric. 

With so many choices, one might begin to feel overwhelmed. In that case, I’d stick to the classic UberX, and it'll likely get the job done without the stress of waiting on a taxi. Thankfully, however, Uber is not a monopoly, so if prices or services aren't satisfactory, you can always take your business to its arch-enemy, Lyft.

ASK KURT: BEST WAYS TO SAVE MONEY ON GAS WITH APPS & LOYALTY PROGRAMS

Lyft is arguably the second most popular ride-sharing app on the Google Play Store and app store.

iPhone: 4.9 stars (at time of publishing)

Android: 4.0 stars (at time of publishing)

While Uber's design is a bit more buttoned-up and sleek, Lyft's is much more colorful and bubbly. From hot pink and goofy mustaches (it was a marketing stunt), Lyft sought to set itself apart from Uber; however, the similarities remained distinct, except that while Uber is available worldwide, Lyft is available in over 600 cities in the United States and Canada.

Like Uber, however, Lyft offers upfront pricing, reliable arrival time estimates, and safety features to ensure a better ride. Everything from requesting the ride, tracking the journey, and paying/ tipping the driver is done through the app and mirrors the simplicity of Uber.

BEWARE OF RISE IN SHORT-TERM VACATION RENTAL SCAMS

Step 1: Download the Lyft app. Installing the app is simple. Go to the app store on your iPhone or Google Play store on your Android device, search "Lyft," or the really bright pink app, and download.

Step 2: Fire up the app. Open Lyft, then follow the prompts. To sign up, enter your name, phone number, email address, and payment information (credit cards are recommended over debit cards). The app will only charge you if you request a ride. If you already have an account, log in with your email address and password.

Step 3: Set pickup location and destination. Select the large search bar at the bottom of your screen. Once selected, the top bar is your pickup location, which you can manually adjust by clicking it and typing in a specific address, while the bottom option is reserved for your destination, which must be entered.

Step 4: Choose your ride. If you’re riding solo, or with a large group, this is the time to make the driver aware of your needs. You will be given various ride options, such as Lyft, Lyft XL, Lyft shared. Select the one that fits your requirements best.

Step 5: Confirm your ride. Once you've chosen, confirm the details and select "Request."

Step 6: Wait for your driver. The app will show your driver's estimated arrival time. Wait at the designated pickup location for your driver to arrive.

Step 7: Enjoy your ride. Once your driver arrives, get in the car and enjoy your ride. The app will show you the route to your destination and the estimated arrival time.

Step 8: Pay and rate your driver. Once you arrive at your destination, the app will confirm the total for your ride and then will follow up with an option to tip your driver. You can then rate your driver and provide feedback. The fare will be charged to the payment method you provided during sign-up.

Like Uber, Lyft offers an array of ride choices to fit your personal needs. (Like Uber, however, we have only needed a standard Lyft or, at most, a Lyft XL for when accompanying a large group.)

STOP! THIS MISTAKE IS LOADING YOUR DEVICE WITH ADWARE AND TRACKERS!

For simplicity's sake, feel free to stick to the standard option to avoid paying higher fees or overwhelming yourself with too many selections.

AIRPORT DISASTER BEING PREVENTED BY NEW FAA TECHNOLOGY

Although Uber and Lyft are top-rated apps, they are likely more reliable than taxis, and both implement safety features such as driver background checks, in-app safety features, and feedback systems, riders may still want to take additional precautions to ensure safety.

If, however, you are a frequent rider or plan on using either Lyft or Uber far more often; there are several ways to save additional cash.

Lyft also provides cost-saving options to frequent riders but favors the traveler over the penny-saver. While Uber offers benefits like a free subscription, coupon codes, or cash back, Lyft offers miles and hotel points.

Option 5 should only be used in the case of an emergency; however, it remains one of the best safety features at your disposal.

ELECTRIC CARGO BIKE AIMS TO REPLACE YOUR SUV

I personally was a late adopter of both Uber and Lyft as I didn’t see the need for them. However, I’ve discovered that both apps are much more reasonably priced than taxis and usually have better customer service. From the upfront pricing to accountable drivers who depend on passenger ratings and reviews to the app’s ease of use and simplicity, Uber and Lyft are far more preferable than a taxi on most occasions. (In Italy, taxis were cheaper than Ubers, so that’s not always the golden rule.)

Regarding our recommendation between Lyft and Uber, we suggest opening both apps and checking the pricing to your desired location by following the above instructions. Then, if one is far cheaper than the other, save some much-needed cash and select the most economically friendly choice. Otherwise, our default selection remains to be awarded to Uber for its sleek design and quality customer service.

Which app do you prefer Uber or Lyft? Let us know. We'd love to hear from you.

For more of my tips, subscribe to my free CyberGuy Report Newsletter by clicking the "Free newsletter" link at the top of my website.

Copyright 2023 CyberGuy.com. All rights reserved.



via Technology News Articles on Fox News https://ift.tt/1RAScMf

I Let AI Choose My Makeup For A Week


AI may struggle with fingers and teeth, but the makeup was on point.


View Entire Post ›



via BuzzFeed News https://ift.tt/Kirgvcs

Apple likely updating AirPod Pro charging case port: reports


The Apple AirPods Pro charging case may soon be made more user-friendly. 

Ming-Chi Kuo, an analyst at the Wuhan-headquartered TF International Securities Group Ltd., tweeted Friday in response to a developer who reportedly caught references to new AirPods models in Apple's iOS 16.4 software. 

"I think this is likely the USB-C version of the AirPods Pro 2, with mass shipments expected in 2Q23-3Q23. By the way, Apple currently appears to have no plans for USB-C versions of the AirPods 2 & 3," Kuo said, quote-tweeting user @aaronp613. 

The current AirPods Pro case requires a Lightning cable to charge the wireless headphones.

DON'T FALL FOR THIS NEW ROUND OF ICLOUD SUPPORT SCAM EMAILS

Apple did not immediately respond to Fox News Digital's request for comment on the matter.

The AirPods have been refreshed a couple of times since the tech giant launched them in 2016. 

The AirPods Pro was first released in 2019 and a second-generation version was released just last year.

IPHONE OWNERS OUTRAGED OVER FORCED CLEAN ENERGY USAGE SETTING

It remained unclear whether Apple plans to add more features — including hardware alterations — to the case. 

MacRumors noted Friday that, after the original AirPods Pro launched, Apple started selling the headphones with a MagSafe-compatible charging case. 

CLICK TO GET THE FOX NEWS APP

The site said that all four iPhone 15 models to be released later this year are expected to be equipped with a USB-C port. 

Also, in 2022, Apple switched Apple TV's Siri Remote from Lightning to USB-C compatible.



via Technology News Articles on Fox News https://ift.tt/QIkprv2

Revolutionizing breast cancer detection: The power of AI


AI technology is making its presence known in every aspect of our lives from food delivery to narrating audiobooks. Now, the technology is starting to be used in the medical field. One area where AI is proving to be a particularly valuable tool is in the detection of breast cancer.

Doctors are now able to use AI algorithms to analyze medical images, such as mammograms, and identify potential signs of breast cancer with greater accuracy and efficiency.

This is especially crucial since early detection is key to successful treatment and improved survival rates.

CLICK TO GET KURT’S CYBERGUY NEWSLETTER WITH QUICK TIPS, TECH REVIEWS, SECURITY ALERTS AND EASY HOW-TO’S TO MAKE YOU SMARTER 

According to Kheiron Medical Technologies, doctors can teach the AI how to accurately point out cancer by showing it previous mammogram photos of patients who already got a diagnosis. This could also help to cut down a radiologist's workload by allowing the AI to focus more on analyzing mammogram images, while the radiologist can focus more on treatments and other duties they have to perform. 

This AI technology is built similarly to the ChatGPT tool that was released a few months ago. It is modeled on the human brain and is designed to detect types of breast cancer on mammograms that doctors may have missed. They are meant to work just as well, if not better, than human radiologists. However, since AI technology is so new, many do not fully trust it yet. 

One of the main concerns is that this technology will replace human radiologists altogether. However, many radiologists have spoken out and said that they are on board with using the technology in partnership with trained human doctors, as the main goal is to make sure that the cancer is caught as early as possible regardless of who is finding it.

There have not been enough widespread clinical trials for AI technology as well, so some are wary about using it right away before they have concrete proof that it works. The technology must be able to not only prove it can accurately detect breast cancer, yet also show that it can perform its duties on women of all ages, body types, races and medical histories. Plus, it will have to show that it can catch very complicated forms of breast cancer and cut down false-positive results as well. 

MORE: HOW GENERATIVE AI COULD CUT HEALTHCARE COSTS AND DEVELOP NEW CANCER DRUGS

The biggest upside for sure is that AI technology has the potential to catch more types of breast cancer and have more accurate results than human doctors could ever deliver. Human beings naturally get exhausted and make mistakes, and with something as complicated as breast cancer, mistakes happen all the time, and tiny lesions are often missed. With AI assisting, those tiny lesions can be caught more often, and human doctors can still be there to verify that the AI hasn't made a mistake. 

MORE: SLEEP BETTER TONIGHT WITH THESE TOP-RATED APPS AND ACCESSORIES

Overall, this is one field where AI could really make a positive difference in the world, and I'm excited to see how many cancer patients will benefit from this. 

How do you feel about AI technology being used to detect cancer? Let us know your thoughts. 

For more of my tips, subscribe to my free CyberGuy Report Newsletter by clicking the "Free newsletter" link at the top of my website. 

Copyright 2023 CyberGuy.com. All rights reserved.



via Technology News Articles on Fox News https://ift.tt/pX34HOL

2023年3月27日 星期一

Elon Musk Says Only Paid Users Will Appear In The New Twitter For You Feed


Starting April 15, only Twitter Blue subscribers will appear in the For You feed.


View Entire Post ›



via BuzzFeed News https://ift.tt/bPFkBam

We Spoke To The Guy Who Created The Viral AI Image Of The Pope That Fooled The World


“I just thought it was funny to see the Pope in a funny jacket,” he told BuzzFeed News.


View Entire Post ›



via BuzzFeed News https://ift.tt/fmc5iFN

The WAGs Of TikTok Want To Show What Their Lives Are Really Like


“Some girls romanticize the NFL WAG life, but are y’all also romanticizing the emotional roller coaster, randomly having to move… spending holidays alone?”


View Entire Post ›



via BuzzFeed News https://ift.tt/9Yzq8U4

Always do this first before downloading a software update to your phone


We recently got a question emailed to us by Nancy. Here's what she had to say:

Dear Kurt,

I want to thank you for what you do. You have no idea how much you help me! I love that you put step-by-step directions. I love my Apple iPhone and MacBook Air but am not super tech savvy. Everything you write about is relevant to me. Last time, it was about seeing the battery % left.

Today for example you showed how to upload the newest software on my iPhone and why to do it. It did ask me a question, "Do you want to use cellular data or WiFi?" I didn’t really know so I just guessed WiFi and it worked. But always your tips are so great and you truly make a positive difference in my life, and I’m sure in so many others too. Thank you! Nancy 

This is a great question and one that people seem to ask often, so let's go over which option is best to use.

CLICK TO GET KURT’S CYBERGUY NEWSLETTER WITH QUICK TIPS, TECH REVIEWS, SECURITY ALERTS AND EASY HOW-TO’S TO MAKE YOU SMARTER

If you’re in a Wi-Fi environment, always use Wi-Fi. When you're a guest at someone's house or even in your office building, it's always best to ask someone what the Wi-Fi password is. Having access to the Wi-Fi where you are will help your phone's internet move much faster and will save you the trouble of worrying if you're using up too much data on your phone plan.

MORE: HOW TO SPEED UP YOUR WIFI AND INTERNET CONNECTION

Be aware of unsecured Wi-Fi networks or networks with weak passwords in public places. With technology advancing so quickly, many public places will likely offer a public Wi-Fi hotspot where you do not need a password to use it. 

Yet this also comes with its dangers, as some scammers have gotten quite savvy by using similar names of popular legitimate hotspots hoping that people who aren't paying close attention will use it. It's important to only connect to networks that you trust.

HOW SCAMMERS ARE SELLING COUNTERFEIT STAMPS ON FACEBOOK ADS

To protect yourself from getting hacked by a public Wi-Fi scam, you should consider using a secure VPN. This type of service protects your privacy and security, especially when you're traveling. A VPN will allow you to not only safeguard your connection from hackers, but will also give you other perks like bypassing censored sites, increasing connection speeds and more.

For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices by searching "Best VPN" at CyberGuy.com by clicking the magnifying glass icon at the top of my website.

HOW TO BLUR OUT THE BACKGROUND FOR PRIVACY WHEN YOU ARE ON A FACETIME CALL

Cellular data is very useful when you're on the go and need quick access to the internet. However, if you don’t have an unlimited cellular data plan, you may be charged for any extra usage beyond your plan. Also, if you’re not on 5G, anything you're trying to download could be much slower. So my advice is only to use cellular data when you have to, and if you find that you're needing to use public Wi-Fi a lot, again, get a secure VPN service on your device.

Was this helpful? Let us know if you have other concerns about using cellular data versus Wi-Fi.

For more of my tips, subscribe to my free CyberGuy Report Newsletter by clicking the "Free newsletter" link at the top of my website.

Copyright 2023 CyberGuy.com. All rights reserved.



via Technology News Articles on Fox News https://ift.tt/lXzxknr

2023年3月26日 星期日

Twitter Source Code Leaked Online, Court Filings Show


Pieces of the computer code used to run Twitter were leaked online, according to court filings.

via Tech – NBC Chicago https://ift.tt/UBLENa5

See all the police surveillance tools used in your city


Over a million hobby drones are registered in the U.S. You may never know when you’re being watched. Check out my guide to avoiding drone surveillance. We wrote this after one hovered over my pool while I was swimming.

Ever stay in an Airbnb? Hosts sometimes spy on their guests with hidden cameras. Yes, that happened to me too. Use these tricks to catch them in the act.

Police departments are stepping up their surveillance, adding drones to their tech collection. How closely does your local department monitor you? Here’s a searchable website you can use to see.

Atlas of Surveillance

The Atlas of Surveillance is a searchable database project from the Electronic Frontier Foundation. It shows which surveillance technologies — such as drones, automated license plate readers, and facial recognition — are used by law enforcement agencies across the U.S.

The pilot program began as a collaboration between the EFF and the University of Nevada’s Reno Reynolds School of Journalism in 2019.

The information comes from public records, crowdsourcing, data journalism, news stories, social media posts, press releases, and volunteer assistance. As of November 2022, the Atlas of Surveillance has 10,000 data points, with at least partial data on 5,500 law enforcement agencies in all 50 states, plus most territories and districts.

The Atlas of Surveillance site says its information is only as good as the source and that government agencies can withhold information. Plus, there’s always the chance of misinterpretation. 

HOW DRONES ARE REVOLUTIONIZING DELIVERY BY TAKING TO THE SKIES

While it’s impossible to fact-check every data point, each one is reviewed by multiple journalism students and staff. Let’s have a closer look at what it shows.

RELATED: Have a DJI drone? Beware of this serious security flaw allowing someone to take over and see your location.

Types of surveillance in use around the country

Does a camera on every street corner make you nervous? Do you worry that your face is constantly being scanned against a database of who-knows-who? Some people don’t mind it, and others are really bothered by it.

The Atlas of Surveillance lets you search and view databases containing the following examples of surveillance:

Interactive map

The Atlas is a map with over 10,000 data points across the country. Go to atlasofsurveillance.org/atlas to get started.

See what’s going on in your area

Want to narrow your search? Go to atlasofsurveillance.org/search to access a searchable database. Then:

Keep your tech-know going 

My popular podcast is called "Kim Komando Today." It’s a solid 30 minutes of tech news, tips, and callers with tech questions like you from all over the country. Search for it wherever you get your podcasts. For your convenience, hit the link below for a recent episode.

CHINA'S SPYING IS OUT OF CONTROL: GET THE CCP'S DRONES OUT OF US SKIES

PODCAST CONTENT ON THE GO: eBay's dead bats, Venmo shares dirty little secrets & items Amazon won't let you return

Take an incredible pic of the moon on your Samsung phone? It might not be all you. Also, I share how Google's newly introduced "Magic Wand" tool will change the workplace. And want to fact-check news from home or earn real college credits on YouTube? I got you covered. Don't miss my guide to detecting GPS trackers in your car.

Check out my podcast "Kim Komando Today" on Apple, Google Podcasts, Spotify, or your favorite podcast player.

Listen to the podcast here or wherever you get your podcasts. Just search for my last name, "Komando."

Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Listen on 425+ radio stations or get the podcast. And join over 400,000 people who get her free 5-minute daily email newsletter.

Copyright 2023, WestStar Multimedia Entertainment. All rights reserved.



via Technology News Articles on Fox News https://ift.tt/TsCi7Y4

How scammers are selling counterfeit stamps on Facebook ads


We received an email from one of our loyal newsletter subscribers, Patrick K., who told us about fraudulent stamp ads that he found on Facebook. He was able to gather and share with us a number of fraudulent Facebook ads and their corresponding scam websites.

CLICK TO GET KURT’S CYBERGUY NEWSLETTER WITH QUICK TIPS, TECH REVIEWS, SECURITY ALERTS AND EASY HOW-TO’S TO MAKE YOU SMARTER

The selling of fake postal stamps has been an issue for quite some time now, and the U.S. Postal Service has warned against this. Now, it looks like those items are being advertised on Facebook as well for as low as $19.99 for a roll of 100 stamps. Let's dive in and discuss what to look out for from these scammers. 

The U.S. Postal Service has made clear that they only sell postal stamps at face value. They state on their website, "Scammers peddle fake stamps on social media marketplaces, e-commerce sites via third-party vendors, and other websites. Counterfeit stamps are often sold in bulk quantities at a significant discount–anywhere from 20 to 50 percent of their face value."

So, if you see an advertisement on an online platform like Facebook for stamps that are ridiculously low-priced, it's likely that those stamps are counterfeit. 

IS FACEBOOK LISTENING TO YOU?

The U.S. Postal Service has teams of forensic scientists who can catch the subtle differences between a real postage stamp and a fake one, however, an average person could easily make that mistake and use a counterfeit stamp, which is a federal crime.

Other legitimate retailers such as Costco, Walgreens, and CVS are permitted to sell postage stamps at a discount by law, so it is possible to get postage stamps for slightly cheaper. However, the discount is always very slight, and the stamps themselves are legitimate and authorized by the U.S. Postal Service.

There are multiple ways to be able to tell if an online store is fake. You should always research the store before buying anything from there and look to see if other people have given it poor reviews. Another good tip to remember is to check the website's URL

If it starts with "https" instead of "http", this indicates a secure connection. And if the store is looking for you to make any form of payment that isn't via credit cards or PayPal, there's a good chance it's a scam.

You can check out more of our tips for what to look for in a fake online store scam here.

If you think you've become the victim of a scam, contact the Better Business Bureau. You can file a complaint with the 24/7 and they can look into the fake online store for you.

WARNING OVER NEW EMAIL SCAMS TARGETING FACEBOOK, APPLE USERS

Besides the BBB, you can also use IdentityTheft.org or call 877-438-4338 if you feel that your identity has been stolen or misused. Identity theft that has been made online can also be reported to the FBI’s Internet Crime Complaint Center. 

Protecting your Identity

If you want additional layers of protection, handholding, recovery and theft insurance against identity theft, see my tips and best picks for Identity Theft protection by searching ‘identity theft' at CyberGuy.com by clicking the magnifying glass icon at the top of my website.

Protecting against clicking malicious links

The best way to protect yourself from accidentally clicking on untrustworthy links like those that may exist in some of these online fake stores is to have antivirus protection installed on all your devices. 

HOW TO BE REMEMBERED FOREVER ON FACEBOOK

See my expert review of the best antivirus protection for your Windows, Mac, Android & iOS devices by searching ‘BestAntivirus’ at CyberGuy.com by clicking the magnifying glass icon at the top of my website.

The best place for you to buy stamps is, without a doubt, the U.S. Postal Service. You can go to your local post office and purchase the stamps there. However, if you're looking to save a little, here's a list of places that also sell legit postage stamps for a slightly cheaper price:

You should always be buying stamps from approved vendors to avoid using counterfeit ones and having your mail confiscated, and never from an online platform like Facebook, Instagram, or any other retailer that you have never heard of.

It's not exactly that Facebook allows people to post fraudulent ads to the site. It's more so that these scammers have found a way for their posts to avoid Facebook's verification process altogether. 

The way they do this is by buying accounts that have already gone through the verification process, such as business manager accounts that are allowed to post lots of ads. 

AIRTAG TRACKER DETECTOR WARNS OF STALKERS IN SECONDS

Once hackers take over these accounts, they can charge thousands of dollars in ad spending to credit cards associated with the compromised accounts and post whatever ads they want. So, it's really a flaw within Facebook's verification process that allows these ads to come to life.

Have you seen these or other fraudulent ads on Facebook or other platforms? Let us know by contacting us at CyberGuy.com/contact.

For more of my tips, subscribe to my free CyberGuy Report Newsletter by clicking the "Free newsletter" link at the top of my website.

Copyright 2023 CyberGuy.com. All rights reserved.



via Technology News Articles on Fox News https://ift.tt/39W48uf

How to blur out the background for privacy when you are on a FaceTime call


Getting to FaceTime your loved ones is one of the best parts of having an iPhone, iPad, iPod touch, or Mac. However, Apple expanded its camera app's Portrait Mode for FaceTime calling.

CLICK TO GET KURT’S CYBERGUY NEWSLETTER WITH QUICK TIPS, TECH REVIEWS, SECURITY ALERTS AND EASY HOW-TO’S TO MAKE YOU SMARTER

That change has many people confused as to why their backgrounds are suddenly blurred out when they're on a call. If this has happened to you and you wish to turn this feature off, we've got you covered.

First, let's go over the steps for how to make a FaceTime call. There are a few ways you can do this. The first process is:

DON'T FALL FOR THIS NEW ROUND OF ICLOUD SUPPORT SCAM EMAILS

The other way you can FaceTime someone is by doing the following:

IS AN AIRTAG DANGEROUS TO YOUR DOG?

Some people like the idea of blurring their backgrounds on FaceTime because it gives them a better sense of privacy. If you wish to blur your background on a FaceTime call, follow these steps:

TOP IDENTITY THEFT SCAMS TO AVOID

MORE: HOW TO KNOW IF YOUR IPHONE IS LISTENING TO YOU

FaceTime is a convenient app, although you should always make sure that you are using the app safely and not putting your privacy at risk. Here are a few things to keep in mind when on a FaceTime call:

FIND OUT WHY CELLPHONE COMPANIES NOW MUST BLOCK OBVIOUS SCAM TEXTS

Was this article helpful? Let us know if you have any other concerns when it comes to using FaceTime.

MORE: HOW TO FLIP YOUR CAMERA AND ZOOM-IN USING FACETIME

For more of my tips, subscribe to my free CyberGuy Report Newsletter by clicking the "Free newsletter" link at the top of my website.

Copyright 2023 CyberGuy.com. All rights reserved.



via Technology News Articles on Fox News https://ift.tt/5KqXhic

2023年3月25日 星期六

Artificial intelligence 'godfather' on AI possibly wiping out humanity: ‘It's not inconceivable’


Geoffrey Hinton, a computer scientist who has been called "the godfather of artificial intelligence", says it is "not inconceivable" that AI may develop to the point where it poses a threat to humanity.

The computer scientist sat down with CBS News this week about his predictions for the advancement of AI. He compared the invention of AI to electricity or the wheel.

Hinton, who works at Google and the University of Toronto, said that the development of general purpose AI is progressing sooner than people may imagine. General purpose AI is artificial intelligence with several intended and unintended purposes, including speech recognition, answering questions and translation.

"Until quite recently, I thought it was going to be like 20 to 50 years before we have general purpose AI. And now I think it may be 20 years or less," Hinton predicted. Asked specifically the chances of AI "wiping out humanity," Hinton said, "I think it's not inconceivable. That's all I'll say." 

CHATGPT NEW ANTI-CHEATING TECHNOLOGY INSTEAD CAN HELP STUDENTS FOOL TEACHERS

Artificial general intelligence refers to the potential ability for an intelligence agent to learn any mental task that a human can do. It has not been developed yet, and computer scientists are still figuring out if it is possible.

Hinton said it was plausible for computers to eventually gain the ability to create ideas to improve themselves. 

"That's an issue, right. We have to think hard about how you control that," Hinton said.

MICROSOFT IMPOSES LIMITS ON BING CHATBOT AFTER MULTIPLE INCIDENTS OF INAPPROPRIATE BEHAVIOR

But the computer scientist warned that many of the most serious consequences of artificial intelligence won't come to fruition in the near future.

"I think it's very reasonable for people to be worrying about these issues now, even though it's not going to happen in the next year or two," Hinton said. "People should be thinking about those issues."

Hinton's comments come as artificial intelligence software continues to grow in popularity. OpenAI's ChatGPT is a recently-released artificial intelligence chatbot that has shocked users by being able to compose songs, create content and even write code.

"We've got to be careful here," OpenAI CEO Sam Altman said about his company's creation earlier this month. "I think people should be happy that we are a little bit scared of this."



via Technology News Articles on Fox News https://ift.tt/d9ZLRCy

Don't fall for this new round of iCloud support scam emails


Those who use Apple devices are being targeted once again with the latest phishing email scam. This is not the first time hackers are trying to get your personal information. However, they're always coming up with new tricks, and you must know how to protect yourself. 

CLICK TO GET KURT’S CYBERGUY NEWSLETTER WITH QUICK TIPS, TECH REVIEWS, SECURITY ALERTS AND EASY HOW-TO’S TO MAKE YOU SMARTER 

With this particular phishing scam, tons using Apple products have been receiving emails claiming to be from iCloud Support. These phishing emails will typically tell you some false information about your iCloud account being compromised and will ask you to click a link immediately to change your Apple ID and password. 

The link will then lead you to a website that looks like Apple Support's official website and ask you to start adding in your personal information. Once the hackers have that information, they can expose your entire digital life and get pretty much any information they want on you.

IS AN AIRTAG DANGEROUS TO YOUR DOG?

If you're an Apple user, you're aware that your iCloud account is used to back up all your files and is guarded with your Apple ID and password. However, what you may not realize is just how much information is stored within your Apple ID, which is exactly why these hackers want you to hand it over to them. 

Your Apple ID is what allows you to access everything from your personal iCloud Photo Library to your Notes app and even files stored in iCloud Drive. It also gives access to Find My, which would allow hackers to figure out the location of all your devices and potentially your family's devices as well.

If you use Apple Pay, your Apple ID would give them access to your debit and credit card information too. And probably worst of all, they can remotely wipe any of your devices, intercept your iMessage and SMS messages, and get at everything in your iCloud Backups including your call history, web browsing history, and more.

FREE ANTIVIRUS: SHOULD YOU USE IT? 

The most important step you can take to protect yourself is to never open any suspicious-looking emails or click any links sent to you. You should always be double-checking the email address of any message you've received, as you may notice that the email address has an extra letter, a capital letter that doesn't belong, or a random symbol within it. 

Even if you do take these steps, however, it's possible to miss something because these hackers can be super clever. That's why you should also consider installing antivirus software on all your devices. Antivirus software will protect you from accidentally clicking malicious links and will remove any malware from your devices. 

See my expert review of the best antivirus protection for your Windows, Mac, Android & iOS devices by searching ‘Best Antivirus’ at CyberGuy.com by clicking the magnifying glass icon at the top of my website.

I would also strongly recommend enabling 2-factor authentication with your Apple ID. This would require anyone trying to access your Apple ID to enter a 6-digit verification code along with your password. The code gets sent to your iPhone or iPad, so unless the hacker has those devices in their possession, then they're way less likely to be able to get into your account. 

HOW TO SCAN A QR CODE SAFELY USING YOUR SMARTPHONE

To enable 2-factor authentication for your Apple ID, follow these steps: 

Stay vigilant and take necessary precautions to safeguard your personal information while using your Apple devices to avoid falling victim to these malicious iCloud phishing email scams. Have you been seeing any iCloud phishing email scams? Let us know how you handled it. 

For more of my tips, subscribe to my free CyberGuy Report Newsletter by clicking the "Free newsletter" link at the top of my website. 

Copyright 2023 CyberGuy.com. All rights reserved.



via Technology News Articles on Fox News https://ift.tt/EBdZl62