<?xml version="1.0" encoding="UTF-8" standalone="yes"?><rss xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"> <channel> <title>Technology News Articles on Fox News</title> <link>https://www.foxnews.com/tech</link> <description>Explore all the news happening in the technology industry with Fox News. Check out the latest tech launches and computer tech updates going on today.</description> <copyright>Copyright 2026 FOX News Network</copyright> <language>en-us</language> <pubDate>Tue, 05 May 2026 12:00:58 -0400</pubDate> <image> <url>https://global.fncstatic.com/static/orion/styles/img/fox-news/logos/fox-news-desktop.png</url> <title>Technology News Articles on Fox News</title> <link>https://www.foxnews.com/tech</link> </image> <atom:link rel="self" href="https://moxie.foxnews.com/google-publisher/tech.xml" type="application/rss+xml"/> <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/" xmlns:atom="http://www.w3.org/2005/Atom" />    <item> <link>https://www.foxnews.com/tech/humanless-big-rig-completes-first-us-freight-run</link> <guid isPermaLink="true">https://www.foxnews.com/tech/humanless-big-rig-completes-first-us-freight-run</guid> <title>Humanless big rig completes first US freight run</title> <description>Bot Auto claims its truck made the first fully humanless commercial delivery in the U.S., traveling 230 miles from Houston to Dallas with no driver.</description>   <content:encoded>&lt;p&gt;A big rig left &lt;a href=&quot;https://www.foxnews.com/category/us/us-regions/southwest/texas&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Houston, Texas,&lt;/a&gt; in the middle of the night with nobody inside. By morning, it had completed a 230-mile delivery near Dallas right on schedule. There was no driver, no backup operator and no one stepping in remotely.&lt;/p&gt;&lt;p&gt;According to Bot Auto, this marks the first &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/robots&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;fully humanless,&lt;/a&gt; over-the-road commercial truckload in the U.S.&lt;/p&gt;&lt;p&gt;More importantly, the run followed a real customer timeline and moved through the same freight network that companies rely on every day, rather than a controlled test or staged demonstration.&lt;/p&gt;&lt;p&gt;Here’s a breakdown of exactly what happened and why it matters.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/big-rigs-deliver-cargo-no-humans-wheel&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;BIG RIGS DELIVER CARGO WITH NO HUMANS AT THE WHEEL&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;CEO and founder of Bot Auto, Xiaodi Hou, explained exactly how it played out. &quot;Our autonomous truck departed Riggy&apos;s Truck Parking in northeast Houston, headed to Hutchins, Texas, just south of Dallas. Departure was late at night as the shipper requested overnight service for this route. The truck ran 230 miles northbound on I-45, one of the &lt;a href=&quot;https://www.foxnews.com/tech/can-autonomous-trucks-really-make-highways-safer&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;busiest freight corridors&lt;/a&gt; in the country, navigated stop lights, side streets and frontage roads. There was no safety driver or observer, nor a remote operator. It was booked through our customer Ryan Transportation, true to our operating model, which is compatible with how freight actually moves in America today.&quot;&lt;/p&gt;&lt;p&gt;That&apos;s the part that stands out. This ran like a normal overnight load, just without a driver.&lt;/p&gt;&lt;p&gt;The load moved through Ryan Transportation, not a special test system. Hou makes that very clear, &quot;Real freight, real customer, real timeline, delivered safe and on time. We are not disclosing the shipper or commodity, but this was not a load we manufactured to check a box. It moved through Ryan Transportation, a top-20 freight brokerage. Booked, priced, and executed the same way as any truckload moves in America. We made money on it. This is a commercial business, not a research project.&quot; In other words, nothing about this run was staged behind the scenes.&lt;/p&gt;&lt;p&gt;Many companies still rely on hidden human support. Bot Auto takes a different approach.&lt;/p&gt;&lt;p&gt;&quot;The industry often blurs the line between &lt;a href=&quot;https://www.foxnews.com/tech/ai-powered-self-driving-software-disrupting-trucking-industry&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;driverless and human-supervised&lt;/a&gt;,&quot; Hou explained. &quot;For Bot Auto, fully humanless means no safety driver, no back-seat monitor, and no low-latency remote human fallback. More specifically, our safety design does not require any human to notice, decide, or react within one minute to keep the truck safe. We may have operational visibility, just like an airport tower can monitor the plane, but it does not fly the plane. That is our standard: humans can support the mission, but the truck must own the driving safety case.&quot;&lt;/p&gt;&lt;p&gt;That&apos;s a big difference from systems that still lean on human backup.&lt;/p&gt;&lt;p&gt;One of the biggest concerns, and understandably so, is how the autonomous driving system reacts under pressure. Hou said the truck is designed to handle that on its own.&lt;/p&gt;&lt;p&gt;&quot;The truck would not wait for a human to save it,&quot; he said. &quot;If it reached a condition outside its approved operating boundary, it would enter a mitigated risk condition: slow down, create space, and bring itself to a controlled safe state. The principle is simple: when the truck encounters extreme or unexpected situations, it does not gamble. It acts conservatively. Sometimes that means stopping; sometimes it means continuing briefly to reach a safer place to stop. Human support can help after the vehicle is already safe, but the vehicle has to own the first minute.&quot;&lt;/p&gt;&lt;p&gt;So the system is designed to play it safe first, then deal with the situation after it is under control.&lt;/p&gt;&lt;p&gt;Bot Auto says removing the driver came after extensive validation and careful testing.&lt;/p&gt;&lt;p&gt;&quot;We operated on our own internal validation framework, rigorous and data-driven,&quot; the company said. &quot;Millions of miles of simulation, extensive real-world testing with safety drivers, scenario-specific disengagement analysis, and a documented operational design domain defining precisely the conditions under which the system is authorized to run. We did not remove the driver until the system demonstrated, across a comprehensive set of tests, that it performs at or above the &lt;a href=&quot;https://www.foxnews.com/tech/ai-truck-system-matches-top-human-drivers-massive-safety-showdown-perfect-scores&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;level of a professional human&lt;/a&gt; driver on this route. Safety isn’t one number; it is a system-level property.&quot; &lt;/p&gt;&lt;p&gt;That is the level of testing the company says it absolutely needed before taking the driver out completely.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/ev-has-face-talks-back-ai&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;THIS EV HAS A FACE, AND IT TALKS BACK WITH AI&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Technology alone does not transform an industry. Economics do. Hou says the numbers already work.&lt;/p&gt;&lt;p&gt;&quot;With that complete accounting, the economics still work decisively in our favor,&quot; he said. &quot;This run came in below $2 per mile.&quot;&lt;/p&gt;&lt;p&gt;That puts the cost of this trip below what a human-driven truck would typically run.&lt;/p&gt;&lt;p&gt;Hou also pushed back on simplified comparisons. &quot;I want to be precise here, because the industry has a habit of cherry-picking the easy savings and hiding the real costs... autonomous trucking&apos;s cost impact isn’t a simple trade-off between driver wages and vehicle cost, it runs deep into operations.&quot;  The point here is that the savings go beyond just removing the driver.&lt;/p&gt;&lt;p&gt;And those economics could improve as the network grows. &quot;It improves at scale. The fixed costs of building and validating the system are largely sunk. As we add &lt;a href=&quot;https://www.foxnews.com/category/auto/style/trucks&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;trucks&lt;/a&gt; and lanes, the per-mile cost of the technology keeps declining.&quot; That means the more trucks and routes they add, the lower the cost per mile can go.&lt;/p&gt;&lt;p&gt;Texas has been one of the most active states in enabling &lt;a href=&quot;https://www.foxnews.com/tech/159-year-old-company-embraces-driverless-trucks&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;autonomous vehicle deployment&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&quot;Texas passed Senate Bill 2807 in 2025, creating a formal authorization program for commercial autonomous vehicle operations, administered by the Texas Department of Motor Vehicles,&quot; Hou said. &quot;Bot Auto applied and was approved under that program... We met every requirement.&quot;&lt;/p&gt;&lt;p&gt;That includes safety compliance, system reliability and the ability to safely stop if something fails. &lt;/p&gt;&lt;p&gt;The bigger question now is whether this type of run can happen consistently across real freight lanes.&lt;/p&gt;&lt;p&gt;&quot;The Houston-to-Dallas lane is repeatable now, and it isn’t a one-time event,&quot; the company said. &quot;We selected it deliberately: high freight volume, strong hub infrastructure at both ends, a supportive regulatory environment. Expansion is already underway.&quot; &lt;/p&gt;&lt;p&gt;The company is focusing first on high-volume freight lanes in the Texas triangle, which includes Houston, Dallas and San Antonio. &lt;/p&gt;&lt;p&gt;Skepticism has followed autonomous trucking for years. Hou addressed that directly, &quot;A truck left Houston with no one in it, ran 230 miles on public roads, and delivered freight to a customer on time. That happened. The skeptics had a reasonable argument for a decade because this industry has been long on promises and short on execution. I understand and respect that. The question is no longer whether it can be done. It is who can do it at scale, safely, and economically. That is the competition we intend to win.&quot;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/waabi-volvo-unveil-next-gen-self-driving-truck&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WAABI + VOLVO UNVEIL NEXT-GEN SELF-DRIVING TRUCK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;This shift could change more than the &lt;a href=&quot;https://www.foxnews.com/tech/hydrogen-fuel-cell-trucks-hit-roads-georgia&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;trucking industry.&lt;/a&gt; If autonomous freight scales, deliveries could become more predictable. Overnight shipping windows may tighten. Costs could come down over time. &lt;/p&gt;&lt;p&gt;There are also &lt;a href=&quot;https://www.foxnews.com/tech/autonomous-trucks-replace-drivers-2027&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;workforce implications&lt;/a&gt;. Long-haul trucking is a major employer, and any transition will raise real concerns about jobs. However, supporters point to reduced fatigue and fewer human errors. &lt;/p&gt;&lt;p&gt;Critics want to see long-term real-world data before drawing conclusions. For consumers, the biggest impact may be subtle at first. Some analysts point out that it could even reduce inflationary pressures, since rising transportation costs are often directly passed on to consumers.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;This Texas run does not mean highways will suddenly fill with &lt;a href=&quot;https://www.foxnews.com/tech/driverless-big-rig-robotrucks-now-road-state&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;empty big rigs&lt;/a&gt;. It does show that autonomous freight has moved beyond the prototype stage. Now the focus turns to what happens next. Can companies repeat this across more routes, in different conditions, over time and still keep things safe? The empty cab is what grabs your attention. The bigger question is whether this holds up across everyday freight operations.&lt;/p&gt;&lt;p&gt;As humanless semi-trucks become common on our major highways, are you comfortable sharing the road with them? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/05/931/523/humanless-truck-bot-auto-1.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">5df04727-7fed-591b-8715-90196dcb86a0</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/auto</category>  <category domain="foxnews.com/taxonomy">fox-news/auto/style/trucks</category>  <category domain="foxnews.com/taxonomy">fox-news/world/disasters/transportation</category>  <category domain="foxnews.com/taxonomy">fox-news/auto/attributes/innovations</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/robots</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Tue, 05 May 2026 12:00:58 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/instantly-upgrade-streaming-home-traveling</link> <guid isPermaLink="true">https://www.foxnews.com/tech/instantly-upgrade-streaming-home-traveling</guid> <title>Instantly upgrade your streaming: At home and when traveling</title> <description>Streaming apps expose more data than most people realize. A VPN can protect your privacy at home and help you access content while traveling abroad.</description>   <content:encoded>&lt;p&gt;It happens to a lot of us when we travel abroad. You land, open your &lt;a href=&quot;https://www.foxnews.com/category/entertainment/genres/streaming&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;streaming app&lt;/a&gt; and realize the shows you watch are gone. The library has changed, and some of what you expect to see is suddenly unavailable. It is one of those inconveniences that may rarely cross your mind before a trip. Still, it happens to millions of travelers every year. But the streaming problem is just one part of a bigger issue.&lt;/p&gt;&lt;p&gt;Whether you are at home or on the other side of the world, the way you stream says a lot about &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;how exposed your data is,&lt;/a&gt; how fast your connection runs and how much control you actually have over what you watch. Most of us have never thought about any of that. Although we probably should.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/why-your-home-wi-fi-needs-more-than-just-strong-password&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHY YOUR HOME WI-FI NEEDS MORE THAN JUST A STRONG PASSWORD&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Every time you fire up a streaming app, your device sends and receives a large amount of data. That data passes through your internet provider, through various servers and sometimes through networks like hotel Wi-Fi that are far from secure.&lt;/p&gt;&lt;p&gt;Your internet provider can see what you stream and when. On &lt;a href=&quot;https://www.foxnews.com/tech/mistakes-to-avoid-if-you-just-have-to-use-public-wi-fi&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;&lt;u&gt;public or shared networks&lt;/u&gt;&lt;/a&gt;, that visibility can extend further. In the background, your IP address gets logged by every service you connect to, quietly building a record of your habits.&lt;/p&gt;&lt;p&gt;Most people assume streaming is passive. From a data standpoint, it is anything but.&lt;/p&gt;&lt;p&gt;A VPN encrypts your connection before it leaves your device. That means your internet provider cannot see what you are watching, networks you connect to cannot monitor your activity, and the IP address shared with streaming platforms isn’t your real one.&lt;/p&gt;&lt;p&gt;For everyday home streaming, that is a meaningful privacy upgrade that most people have never applied to their TV habits. The benefits become even more noticeable the moment you travel.&lt;/p&gt;&lt;p&gt;Not all VPNs are built for streaming. Performance matters here. A VPN that protects your connection but &lt;a href=&quot;https://www.foxnews.com/tech/how-make-your-vpn-faster&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;slows your speed&lt;/a&gt; misses the point. Buffering isn’t an acceptable trade-off.&lt;/p&gt;&lt;p&gt;The best options use high-speed networks and optimized servers designed for streaming. That helps HD and 4K content stay smooth, even when your connection routes through servers far from your location.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/your-vpn-enough-without-antivirus-protection&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;IS YOUR VPN ENOUGH WITHOUT ANTIVIRUS PROTECTION?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;When you are abroad and want to watch the content you subscribe to at home, like local news, sports or your usual streaming lineup, a VPN lets you connect through a server back home and stream as if you never left.&lt;/p&gt;&lt;p&gt;With servers located around the world, including across the United States, your subscriptions stay within reach wherever you are.&lt;/p&gt;&lt;p&gt;It also means you avoid relying on &lt;a href=&quot;https://www.foxnews.com/tech/temptations-risks-free-wi-fi&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;hotel or airport networks&lt;/a&gt; for security. Your connection stays encrypted end to end, which matters more when you are away from your home network than almost any other time. &lt;strong&gt;For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Traveling puts your devices on networks you do not control, which makes a few simple habits go a long way. If you want to &lt;a href=&quot;https://www.foxnews.com/tech/smart-travel-safety-tips-before-your-next-trip&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;keep your streaming private&lt;/a&gt; and your accounts secure, start here:&lt;/p&gt;&lt;p&gt;Airport and hotel networks are convenient, but they are also the easiest places for your data to be exposed or intercepted.&lt;/p&gt;&lt;p&gt;Turn on your VPN before joining any network, so your connection stays encrypted from the moment you go online.&lt;/p&gt;&lt;p&gt;Logging into streaming services on shared or hotel devices can expose your login details long after you leave.&lt;/p&gt;&lt;p&gt;Updates often include security fixes that protect against known vulnerabilities and exploits.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/beware-fake-wi-fi-networks-steal-your-data-when-traveling&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;BEWARE OF FAKE WI-FI NETWORKS THAT STEAL YOUR DATA WHEN TRAVELING&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Your device can automatically reconnect to saved networks without you realizing it, which can increase your exposure if those networks are unsecured or impersonated. Turn off auto-connect in your settings to stay in control of when and where you connect. &lt;/p&gt;&lt;p&gt;If you do sign in on a shared device, make sure you fully log out and clear the browser if possible.&lt;/p&gt;&lt;p&gt;Streaming has quietly become one of the biggest data pipelines in your daily life. Most people focus on content, not on what happens behind the scenes. Once you understand how much data moves every time you press play, the case for adding a layer of protection becomes much clearer. A VPN does more than unlock content while traveling. It gives you more control over &lt;a href=&quot;https://www.foxnews.com/tech/5-tech-terms-shape-your-online-privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;your privacy, your connection&lt;/a&gt;, and your overall experience. That applies just as much on your couch as it does in a hotel room halfway around the world.&lt;/p&gt;&lt;p&gt;If you pay for streaming every month, should you also have more control over who can see what you watch and where you can watch it? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/05/931/523/family-watching-tv-fox-news-001.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">dee6e8fa-7a12-5b15-9198-bd0001d79ac3</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>  <category domain="foxnews.com/taxonomy">fox-news/entertainment/genres/streaming</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/wifi</category>  <category domain="foxnews.com/taxonomy">fox-news/travel</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Tue, 05 May 2026 07:22:43 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/fake-traffic-violation-text-scam-uses-qr-codes-steal-payment-info</link> <guid isPermaLink="true">https://www.foxnews.com/tech/fake-traffic-violation-text-scam-uses-qr-codes-steal-payment-info</guid> <title>Fake traffic violation text scam uses QR codes to steal payment info</title> <description>Scammers are sending fake court text messages with QR codes to U.S. drivers, demanding payment for traffic violations that never occurred across multiple states.</description>   <content:encoded>&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/smartphones&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Your phone&lt;/a&gt; buzzes. A text message pops up saying you have an outstanding traffic violation, and if you scan the attached QR code immediately, you can pay a $6.99 balance and avoid a court appearance.&lt;/p&gt;&lt;p&gt;It looks official. It sounds urgent. And it is completely fake.&lt;/p&gt;&lt;p&gt;Scammers are now targeting drivers &lt;a href=&quot;https://www.foxnews.com/us&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;across the U.S.&lt;/a&gt; with text messages that impersonate state courts, demanding payment for traffic violations that never happened. This campaign has already hit residents in New York, California, North Carolina, Illinois, Virginia, Texas, Connecticut and New Jersey, and it shows no signs of slowing down.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Plus, you&apos;ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/fake-ssa-email-alert-spot-scam-fast&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;&lt;u&gt;FAKE SSA EMAIL ALERT: SPOT THIS SCAM FAST&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;You might remember the&lt;a href=&quot;https://www.foxnews.com/tech/fake-toll-road-texts-sweep-america-chinese-scammers-target-us-drivers&quot;&gt;&lt;u&gt; wave of smishing scams in 2025&lt;/u&gt;&lt;/a&gt; that we reported on, which pretended to be from state toll agencies. Those texts pushed people toward phishing websites through direct links. This new variation takes a different approach, and a more convincing one.&lt;/p&gt;&lt;p&gt;Instead of a plain text link, these messages include an image that looks like an official court notice. It carries formal language, official-sounding headings and a QR code embedded directly in the document. The shift from a clickable link to a scannable code makes it harder for automated security tools to flag the message as dangerous.&lt;/p&gt;&lt;p&gt;One example Bleeping Computer shared claimed to be from the &quot;Criminal Court of the City of New York.&quot; The notice warned that an unpaid parking or toll violation had entered the &quot;formal enforcement stage&quot; and demanded immediate payment, or else an in-person court appearance. Real courts communicate through official mail, not unsolicited text messages with QR codes.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/samsung-messages-ending-android-owners-must-know&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;&lt;u&gt;SAMSUNG MESSAGES ENDING? WHAT ANDROID OWNERS MUST KNOW&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Scanning the QR code takes you to an &lt;a href=&quot;https://www.foxnews.com/tech/from-captcha-catastrophe-how-fake-verification-pages-spreading-malware&quot;&gt;&lt;u&gt;intermediary page with a CAPTCHA&lt;/u&gt;&lt;/a&gt;. That step is intentional. Scammers use it to filter out security researchers and automated scanners so their phishing infrastructure stays under the radar longer.&lt;/p&gt;&lt;p&gt;Once you complete the CAPTCHA, you land on a site designed to look like your state&apos;s DMV or another government agency. It presents an &quot;unpaid balance,&quot; always $6.99 in every case documented so far. That suspiciously round number creates urgency without raising an immediate alarm.&lt;/p&gt;&lt;p&gt;Clicking to pay takes you to a form that asks for your name, address, phone number, email address and credit card information. Everything you enter goes directly to the scammers. That data can fuel follow-on &lt;a href=&quot;https://www.foxnews.com/tech/dont-click-that-link-how-to-spot-prevent-phishing-attacks-in-your-inbox&quot;&gt;&lt;u&gt;phishing attempts&lt;/u&gt;&lt;/a&gt;,&lt;a href=&quot;https://www.foxnews.com/tech/do-you-know-true-cost-identity-theft&quot;&gt;&lt;u&gt; identity theft&lt;/u&gt;&lt;/a&gt;,&lt;a href=&quot;https://www.foxnews.com/tech/why-4-charge-your-statement-could-fraud&quot;&gt;&lt;u&gt; financial fraud &lt;/u&gt;&lt;/a&gt;or be sold outright to other bad actors.&lt;/p&gt;&lt;p&gt;For reference, fake New York DMV sites in this campaign have used hostnames like &quot;ny.gov-skd[.]org&quot; or &quot;ny.ofkhv[.]life,&quot; neither of which has anything to do with actual New York state government infrastructure.&lt;/p&gt;&lt;p&gt;These scams are sophisticated enough to fool a lot of people, but a few smart habits can keep you well ahead of them.&lt;/p&gt;&lt;p&gt;The most important thing you can do is also the simplest: do not scan QR codes from unknown senders. If a text arrives from a number you don&apos;t recognize, and it asks you to scan something or make a payment, treat it as suspicious until proven otherwise. State agencies across the U.S. have made their position clear. They do not send text messages requesting personal information or payment details. If you genuinely owe a fine, you will receive official correspondence through the mail with verifiable contact information.&lt;/p&gt;&lt;p&gt;Never enter credit card information on a site you reached through a QR code in a text message. Go directly to your state&apos;s official .gov website instead, type the address manually into your browser and look up your actual account status there. If a charge is legitimate, it will show up when you log in through the real site.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/google-search-led-costly-scam-call&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;&lt;u&gt;GOOGLE SEARCH LED TO A COSTLY SCAM CALL&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Strong antivirus software adds a critical layer of protection that works even when you don&apos;t. A good security app can detect phishing attempts, flag malicious sites before you enter any information and alert you to threats that arrive through text or email. Make sure your antivirus is active and updated on every device you use to open links or scan QR codes. &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at&lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt; CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;If your personal information has already been exposed through a scam like this one, a data removal service can help limit the damage. These services scan data broker databases and request the removal of your name, address, phone number and other personal details that scammers rely on to target you. It won&apos;t undo what happened, but it can reduce your exposure going forward and make it harder for bad actors to reach you again. &lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;This scam&lt;/a&gt; collects exactly the kind of information that makes identity theft possible: your name, address, phone number, email address and credit card details. An identity theft protection service monitors your accounts, credit file and personal information for suspicious activity and alerts you the moment something looks off. Some services also provide recovery assistance and insurance if your identity does get compromised, which can make an overwhelming situation a lot more manageable. &lt;strong&gt;See my tips and best picks on Best Identity Theft Protection at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;If you already entered your payment information on one of these sites, contact your bank or credit card issuer immediately to dispute charges and request a new card number. Check your credit reports for any unusual activity and consider placing a fraud alert with one of the major credit bureaus.&lt;/p&gt;&lt;p&gt;If you receive one of these texts, report it. Forward the message to 7726 (SPAM), which is the carrier reporting shortcut used across major U.S. networks. You can also file a complaint with the FTC at &lt;i&gt;&lt;strong&gt;&lt;u&gt;reportfraud.ftc.gov&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt; and alert your state&apos;s attorney general&apos;s office.&lt;/p&gt;&lt;p&gt;This scam works because it exploits something real: the anxiety most people feel when a government notice shows up demanding action. The fake court language, the formal tone and the &lt;a href=&quot;https://www.foxnews.com/category/tech&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;embedded QR&lt;/a&gt; code all contribute to an experience designed to short-circuit your skepticism. But the tells are there if you look. No legitimate court sends text message ultimatums with QR codes. No state DMV asks you to scan an image from a stranger&apos;s phone number to pay a $6.99 balance. When something feels urgent and slightly off, that combination is usually the scam talking.&lt;/p&gt;&lt;p&gt;If a court could send you a text message threatening legal action for less than the cost of a coffee, and millions of people might actually pay it, what does that tell us about how little most of us actually trust ourselves to spot a scam in the moment? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt; &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/man-worried-using-smartphone.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">467d271d-cae5-5774-891b-6b150c37a4d7</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Mon, 04 May 2026 15:00:46 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/china-blocks-meta-ai-deal-over-security-concerns</link> <guid isPermaLink="true">https://www.foxnews.com/tech/china-blocks-meta-ai-deal-over-security-concerns</guid> <title>China blocks Meta AI deal over security concerns</title> <description>China&amp;apos;s regulators stopped Meta&amp;apos;s reported $2 billion deal to acquire Manus, an AI startup, requiring all parties to withdraw amid a growing U.S.-China tech rivalry.</description>   <content:encoded>&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/world/world-regions/china&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;China has stepped in&lt;/a&gt; and stopped Meta Platforms, which owns Facebook and Instagram, from acquiring the AI startup Manus, a Singapore-based company that builds AI agents capable of performing complex tasks. The deal, reportedly worth about $2 billion, had already been moving forward.&lt;/p&gt;&lt;p&gt;China&apos;s National Development and Reform Commission said it was prohibiting the &lt;a href=&quot;https://www.foxnews.com/category/business&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;foreign acquisition&lt;/a&gt; of Manus and required all parties to withdraw from the deal. The decision followed a regulatory review that began earlier this year.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/meta-tracks-workers-train-ai-agents&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;&lt;u&gt;META TRACKS WORKERS TO TRAIN AI AGENTS&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;China did not spell out every detail or specifically name Meta Platforms, but the direction is clear. Officials are focused on keeping advanced AI technology and talent from moving overseas. AI is now treated as a strategic asset, similar to critical infrastructure.&lt;/p&gt;&lt;p&gt;Regulators also pointed to rules around cross-border deals. Any transfer &lt;a href=&quot;https://www.foxnews.com/category/tech&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;involving tech,&lt;/a&gt; data or investment must comply with Chinese law. Even though Manus operates out of Singapore, its Chinese roots gave Beijing grounds to intervene.&lt;/p&gt;&lt;p&gt;Timing may also matter. The decision comes just ahead of a planned meeting in May between Donald Trump and China&apos;s president, Xi Jinping, adding pressure to an already tense relationship.&lt;/p&gt;&lt;p&gt;This move fits into a bigger pattern. &lt;a href=&quot;https://www.foxnews.com/us&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;The U.S.&lt;/a&gt; and China are competing for leadership in artificial intelligence, and both sides are tightening control. China&apos;s decision sends a message. It will step in when it sees sensitive technology or expertise leaving the country&apos;s orbit.&lt;/p&gt;&lt;p&gt;That could make future deals harder. U.S. tech companies may think twice before trying to acquire startups with ties to China, even if those companies are based elsewhere.&lt;/p&gt;&lt;p&gt;At the same time, the U.S. has its own restrictions. Export controls and investment limits already shape how companies work across borders. What we are seeing now is a more direct clash over who controls the future of AI.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/anthropics-mythos-ai-found-2000-unknown-software-vulnerabilities-seven-weeks-testing&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;&lt;u&gt;ANTHROPIC&apos;S MYTHOS AI FOUND OVER 2,000 UNKNOWN SOFTWARE VULNERABILITIES IN JUST SEVEN WEEKS OF TESTING&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;For &lt;a href=&quot;https://www.foxnews.com/category/tech/companies/facebook&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Meta Platforms,&lt;/a&gt; this is more than a missed deal. The company has been pushing into AI agents. These systems go beyond chatbots and can take action on your behalf. That includes tasks like managing schedules, analyzing data or even building software.&lt;/p&gt;&lt;p&gt;Manus was expected to help accelerate that push. Losing access could slow development or force Meta to look for other acquisitions.&lt;/p&gt;&lt;p&gt;Manus did not respond to CyberGuy&apos;s request for comment. Its website still says it is now part of Meta, suggesting the deal had already gone through before regulators stepped in. Meta said the transaction complied with applicable laws and that it expects an appropriate resolution to the inquiry.&lt;/p&gt;&lt;p&gt;Still, the outcome shows how unpredictable global tech deals have become.&lt;/p&gt;&lt;p&gt;So how does this affect you, and why should you care? Well, despite it being a high-level tech deal, it still affects the apps you use, your data and how quickly new technology reaches you.&lt;/p&gt;&lt;p&gt;First, it can shape the tools &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/smartphones&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;on your phone&lt;/a&gt; and computer. When deals like this get blocked, companies may take longer to roll out new features. Some tools may never make it to the U.S.&lt;/p&gt;&lt;p&gt;Next, it affects how your data is handled. Governments are paying closer attention to where data goes and who controls it. That can lead to tighter rules around apps and services you rely on every day.&lt;/p&gt;&lt;p&gt;It can also change how much choice you have. When fewer deals go through, companies build more on their own. That can mean fewer options or tools that do not work well across platforms. Over time, these decisions can influence how fast AI improves and who controls the technology behind it.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/wifi&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Wi-Fi settings,&lt;/a&gt; you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/politics/white-house-meeting-anthropic-powerful-new-ai-model-despite-pentagon-resistance-&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;&lt;u&gt;WHITE HOUSE MEETS AI FIRM ANTHROPIC AMID POLITICAL TENSIONS, PENTAGON DISPUTE&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;This situation goes beyond one blocked deal. It shows how &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;artificial intelligence&lt;/a&gt; has moved into the center of global strategy. Governments are no longer watching from the sidelines. They are setting limits and deciding who gets access to what. For companies like Meta, the path forward may require new partnerships or different strategies. For everyone else, it means the AI tools we use will increasingly reflect political decisions as much as technical progress.&lt;/p&gt;&lt;p&gt;If governments control who builds AI, how much control should you have over the tools you use every day? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/05/931/523/meta-photo-1.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">8b1c5ef1-de40-599f-a68d-a4a2c520a23a</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/companies/facebook</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/companies/instagram</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Mon, 04 May 2026 11:08:06 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/united-arab-emirates-plans-ai-run-government-within-two-years</link> <guid isPermaLink="true">https://www.foxnews.com/tech/united-arab-emirates-plans-ai-run-government-within-two-years</guid> <title>United Arab Emirates plans AI-run government within two years</title> <description>The UAE says it plans to deploy agentic AI across 50% of government operations in two years, making one of the most aggressive moves in the global AI race.</description>   <content:encoded>&lt;p&gt;The United Arab Emirates just made one of the most aggressive moves yet in the global AI race. The country says it will integrate agentic &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;artificial intelligence&lt;/a&gt; across half of its government operations within two years.&lt;/p&gt;&lt;p&gt;For context: Most governments are still debating whether to use AI.  This plan puts speed and execution front and center and goes in the opposite direction of how governments typically handle major technology changes.&lt;/p&gt;&lt;p&gt;If it works, the UAE could offer a preview of how AI may reshape public services far beyond the &lt;a href=&quot;https://www.foxnews.com/category/world/world-regions/middle-east&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Middle East&lt;/a&gt;. If it runs into problems, it could also highlight the risks of moving this fast when government decisions, personal data and public trust are all involved.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/opinion/uae-ambassador-yousef-al-otaiba-us-uae-forge-groundbreaking-high-tech-partnership-based-ai&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;UAE AMBASSADOR YOUSEF AL OTAIBA: US AND UAE FORGE GROUNDBREAKING HIGH-TECH PARTNERSHIP BASED ON AI&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Agentic AI refers to systems that can analyze information, make decisions and &lt;a href=&quot;https://www.foxnews.com/tech/first-autonomous-ai-agent-here-worth-risks&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;take action with minimal human&lt;/a&gt; input. In this model, AI can process requests, adjust workflows and improve outcomes in real time. It can also carry out certain government tasks from start to finish, instead of only suggesting what a person should do next.&lt;/p&gt;&lt;p&gt;So, how would that show up in everyday ways? Think faster permit approvals, automated public services or systems that respond instantly to changes in demand. Instead of waiting for human bottlenecks, processes move continuously.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/fox-news-ai-newsletter-trump-admin-unveils-groundbreaking-tool-supercharging-govt-efficiency-ai&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;FOX NEWS AI NEWSLETTER: TRUMP ADMIN UNVEILS GROUNDBREAKING TOOL &apos;SUPERCHARGING&apos; GOV&apos;T EFFICIENCY IN AI&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;According to the announcement, AI will act more like an operational partner than a tool. That marks a change in how governments think about technology.&lt;/p&gt;&lt;p&gt;There is also a clear structure behind the rollout. The UAE has put a detailed plan in place with clear expectations from the start. Every ministry and government entity will be evaluated based on how quickly it adopts AI, how well it implements those systems and how effectively it redesigns workflows around them.&lt;/p&gt;&lt;p&gt;Oversight will come from Mansour bin Zayed Al Nahyan, a senior government leader who plays a key role in the country&apos;s executive decision-making. Day-to-day execution will be led by a task force chaired by Mohammad Al Gergawi, a longtime &lt;a href=&quot;https://www.foxnews.com/category/politics/executive/cabinet&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;cabinet&lt;/a&gt; minister focused on government modernization.&lt;/p&gt;&lt;p&gt;One of the biggest parts of this plan has less to do with machines and more to do with people. Every federal employee will receive AI training. The goal is to build a workforce that can work alongside intelligent systems rather than compete with them.&lt;/p&gt;&lt;p&gt;That matters because large-scale automation often raises concerns about job loss. The UAE is taking a different angle by focusing on reskilling and adaptation. If it works, it could become a model that other countries try to follow. If it struggles, it will highlight how difficult workforce transformation can be at scale.&lt;/p&gt;&lt;p&gt;This move fits into a broader strategy. The UAE has spent years positioning itself as a tech-forward economy. By embedding AI into government operations, the country hopes to improve efficiency, reduce delays and deliver faster services to residents and businesses.&lt;/p&gt;&lt;p&gt;It also sends a signal globally. The UAE wants to set the benchmark for how &lt;a href=&quot;https://www.foxnews.com/tech/trump-unveils-national-ai-policy-framework&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;governments use AI in a&lt;/a&gt; big way. That puts pressure on other countries, including the United States, to rethink how quickly we adopt similar technologies.&lt;/p&gt;&lt;p&gt;For all the excitement, this kind of rollout raises real concerns. Critics point to accountability as one of the biggest questions. When AI systems start making decisions inside government, it can become harder to understand who is responsible when something goes wrong. Was it the system, the developer or the agency using it?&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/jobs-most-risk-from-ai-according-microsoft&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;JOBS THAT ARE MOST AT RISK FROM AI, ACCORDING TO MICROSOFT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/us/personal-freedoms/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Privacy&lt;/a&gt; is another sticking point. Government systems already handle sensitive personal data. Expanding AI across those systems could increase how much data is collected, analyzed and stored, which makes some experts uneasy.&lt;/p&gt;&lt;p&gt;There is also the issue of bias. AI models learn from data, and if that data has gaps or flaws, the outcomes can reflect that. In a government setting, that could affect access to services, approvals or enforcement decisions in ways that are not always obvious.&lt;/p&gt;&lt;p&gt;Then there is trust. Even if the systems work as intended, people may still hesitate to accept decisions made by machines, especially when those decisions affect their daily lives.&lt;/p&gt;&lt;p&gt;Supporters argue that these risks can be managed with strong oversight and transparency. Still, critics say the speed of this rollout leaves little room for error, and that is where the debate is likely to intensify.&lt;/p&gt;&lt;p&gt;Even if you do not live in the UAE, this push has real implications. First, it raises expectations. When one government proves it can deliver faster services with AI, people elsewhere will start asking why theirs cannot.&lt;/p&gt;&lt;p&gt;Second, it accelerates the global AI race. Governments will need to balance speed with privacy, security and oversight. Third, it highlights a growing reality. AI is moving into decision-making roles beyond basic support functions. That changes how systems are built and how accountability works.&lt;/p&gt;&lt;p&gt;You may start to see similar experiments here in the United States, especially at the state or city level, where &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/innovation&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;innovation&lt;/a&gt; can happen faster.&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my quiz here: CyberGuy.com&lt;/p&gt;&lt;p&gt;The UAE is betting big on a future in which AI plays a central role in how its government operates. The timeline is aggressive, and the scope is hard to ignore. What stands out most is how quickly this is moving from concept to execution. At the same time, the questions are just as big as the opportunity. Who is accountable when AI makes a decision? How much data is being used behind the scenes? And how much trust are people willing to place in systems they cannot fully see? This could become a model that other governments try to follow. It could also expose real challenges around transparency and control. Either way, it is a clear signal that AI is moving deeper into systems that affect our everyday lives.&lt;/p&gt;&lt;p&gt;If AI can start making real-time decisions inside government systems, how comfortable are you with that level of automation showing up in your everyday life? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/05/931/523/United-Arab-Emirates-plans-AI-run-government-1.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">d2d522e6-f9d1-5291-8a41-baa09acddfb4</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/us/economy/public-sector</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>  <category domain="foxnews.com/taxonomy">fox-news/world/world-regions/middle-east</category>  <category domain="foxnews.com/taxonomy">fox-news/us/personal-freedoms/privacy</category>  <category domain="foxnews.com/taxonomy">fox-news/world/united-nations/global-government</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Sun, 03 May 2026 14:20:31 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/data-broker-opt-out-steps-widows-take-90-days</link> <guid isPermaLink="true">https://www.foxnews.com/tech/data-broker-opt-out-steps-widows-take-90-days</guid> <title>Data broker opt-out steps widows should take in 90 days</title> <description>Grief makes widows prime targets for scammers who exploit obituaries and data broker profiles. Here is how to protect your personal information early on.</description>   <content:encoded>&lt;p&gt;Three weeks after her husband&apos;s funeral, Carol&apos;s phone rings. The caller knows her husband&apos;s name, their address and their daughter&apos;s name, even mentioning that she lives across town.&lt;/p&gt;&lt;p&gt;He says he&apos;s calling from a life insurance company and that there&apos;s a policy ready to be paid out. He just needs Carol&apos;s Social Security number and bank routing details to process it.&lt;/p&gt;&lt;p&gt;This scenario draws from real scams reported by fraud investigators and elder abuse advocates across the country. The details change, but the playbook stays the same.&lt;/p&gt;&lt;p&gt;The reason these attacks work so well comes down to something most grieving families never think to check.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/how-scammers-target-you-even-without-social-media&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Losing a spouse creates a perfect storm for scammers. Grief can leave you overwhelmed, and at the same time, you are handling financial decisions, paperwork and major life changes. That combination makes it easier for someone to catch you off guard.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/one-thing-scammers-check-targeting-online&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;THE ONE THING SCAMMERS CHECK BEFORE TARGETING YOU ONLINE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Meanwhile, your personal information becomes easier to find. Obituaries often include names, relationships and locations. Death records get filed with the Social Security Administration and added to the Death Master File. Probate filings can reveal property transfers, beneficiaries and account details.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/scammers-build-profile-using-data-brokers&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Data brokers collect&lt;/a&gt; all of this and turn it into detailed profiles that almost anyone can access. According to research from a data privacy company analyzing five years of FBI Internet Crime Complaint Center data, about 52.5% of crimes reported by Americans over 60 in 2023 were either enabled or worsened by personal data available online. Widows, especially those managing estates alone, sit high on that target list.&lt;/p&gt;&lt;p&gt;Despite being in a high-risk group, taking these protective steps should keep scammers at bay. I know how overwhelming this time can be, so I recommend asking a trusted family member or friend for assistance setting things up. Though you should always refrain from sharing sensitive details like account numbers and your Social Security number.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/data-broker-opt-out-steps-every-retiree-should-take-today&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;THE DATA BROKER OPT-OUT STEPS EVERY RETIREE SHOULD TAKE TODAY&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The first month is when the most damaging data gets published. So your first job is damage control.&lt;/p&gt;&lt;p&gt;Obituaries are the single most accessible data source scammers use after a death. A traditional obituary lists full names, survivor relationships, hometowns and sometimes even ages. That&apos;s a complete family map, and in the wrong hands, it can be a powerful weapon.&lt;/p&gt;&lt;p&gt;You don&apos;t have to skip the obituary. But consider removing or abbreviating the exact home city (use the region instead), names of minor grandchildren and the surviving spouse&apos;s first and last name combined with their address. &quot;Carol of Cleveland&quot; is safer than &quot;Carol Patterson of 114 Birchwood Lane, Cleveland.&quot;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/how-remove-your-personal-info-from-people-search-sites&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE-SEARCH SITES&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Before you can remove anything, you need to see what&apos;s already there.&lt;/p&gt;&lt;p&gt;Go to Spokeo, Whitepages, BeenVerified and Intelius. Search your name and your spouse&apos;s name. What you find will likely include your address, phone number, &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/email&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;email&lt;/a&gt; addresses, relatives&apos; names and property records.&lt;/p&gt;&lt;p&gt;This snapshot is your starting point. Take screenshots. You&apos;ll need them.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/10-signs-your-personal-data-being-sold-online&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;10 SIGNS YOUR PERSONAL DATA IS BEING SOLD ONLINE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;It takes two minutes, and it&apos;s free. Go to &lt;a href=&quot;https://www.foxnews.com/category/tech/companies/google&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;google&lt;/a&gt;.com/alerts and create alerts for:&lt;/p&gt;&lt;p&gt;If your information gets published anywhere new, you&apos;ll get an email notification. This is your early warning system.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/remove-personal-info-web-stop-coming-back&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;REMOVE YOUR PERSONAL INFO FROM THE WEB — STOP IT FROM COMING BACK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;By now, your information has had weeks to spread. Manual opt-outs are worth doing, but here&apos;s the reality: there are &lt;a href=&quot;https://www.foxnews.com/tech/data-brokers-accused-hiding-opt-out-pages-from-google&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;hundreds of data broker sites&lt;/a&gt;. Each one has its own removal process. Many require you to submit ID, wait days for confirmation and then re-submit when your data reappears, because it will.&lt;/p&gt;&lt;p&gt;Prioritize manual opt-outs from the sites that appear in your Google search results. These carry the most weight because scammers often start with whatever Google surfaces first.&lt;/p&gt;&lt;p&gt;You can find these exposures quickly and easily with Incogni&apos;s free scanner. This tool will scan the web for your personal information and email you a report with a list of results you can start with.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/how-hand-off-data-privacy-responsibilities-older-adults-trusted-loved-one&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;If you&apos;d rather go about it on your own, some of the most common sites include:&lt;/p&gt;&lt;p&gt;Each one will ask you to verify your email. Follow through on every confirmation; unconfirmed requests don&apos;t get processed.&lt;/p&gt;&lt;p&gt;Keep in mind that removing your information takes time and persistence. There are hundreds of data broker sites, and many of them re-list your information after it has been removed, especially when new public records become available.&lt;/p&gt;&lt;p&gt;Because of that, some people choose to use automated data removal services that send ongoing opt-out requests on their behalf. These services can help reduce the workload by continuously monitoring and removing listings as they reappear.&lt;/p&gt;&lt;p&gt;No matter which approach you take, consistency matters. Checking your information regularly and following up on removals helps limit what scammers can find.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;This step is urgent, and most people skip it entirely.&lt;/p&gt;&lt;p&gt;Data broker profiles almost always contain the exact answers to your bank&apos;s security questions. Mother&apos;s maiden name. Previous address. City where you were born. Scammers use these to impersonate you and access your accounts.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-hackers-can-learn-about-you-from-data-broker-file&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT HACKERS CAN LEARN ABOUT YOU FROM A DATA BROKER FILE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Call your bank, brokerage and insurance companies. Ask to update your knowledge-based authentication questions. Use answers that are completely made up, something only you know and store them in a password manager. Don&apos;t use any answer that appears anywhere in a data broker profile.&lt;/p&gt;&lt;p&gt;By now, the most urgent exposure has been addressed. These final steps close the remaining gaps and protect you in the long term.&lt;/p&gt;&lt;p&gt;A credit freeze prevents new credit accounts from being opened in your name. It&apos;s free at all three major bureaus: Equifax, Experian and TransUnion.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/how-safeguard-your-credit-score-retirement-fraud-identity-theft-rise-among-seniors&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HOW TO SAFEGUARD YOUR CREDIT SCORE IN RETIREMENT AS FRAUD AND IDENTITY THEFT RISE AMONG SENIORS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Critically: freeze your &lt;strong&gt;spouse&apos;s credit too&lt;/strong&gt;. After a death, &lt;a href=&quot;https://www.foxnews.com/tech/how-protect-loved-ones-identity-after-death&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;identity thieves&lt;/a&gt; frequently open new accounts in the deceased person&apos;s name before the credit bureaus are updated. This is called ghosting, and it can haunt an estate for years.&lt;/p&gt;&lt;p&gt;To freeze a deceased spouse&apos;s credit, contact each bureau individually and provide the death certificate. It&apos;s a few phone calls. It&apos;s worth every minute.&lt;/p&gt;&lt;p&gt;Families can submit a request to limit access to a deceased person&apos;s Social Security data in certain contexts. Visit&lt;strong&gt; ssa.gov&lt;/strong&gt; for current guidance. This won&apos;t scrub the record entirely, but limiting access to the Death Master File reduces the pool of parties who can use it to enrich your data broker profile.&lt;/p&gt;&lt;p&gt;This isn&apos;t directly a data privacy step, but it protects you from a related threat. Scammers who know about an estate sometimes pose as financial advisors, attorneys or government representatives to intercept beneficiary changes. Confirm all account changes directly through institutions you contact yourself, never through a number someone else gives you.&lt;/p&gt;&lt;p&gt;By this stage, your data is more controlled. Now the focus shifts to stopping scams before they escalate. Start by setting clear expectations with your family. Let them know you will never ask for money through an unexpected call, text or email. Creating a simple code word or check-in rule can stop panic-driven decisions, which is exactly what scammers rely on.&lt;/p&gt;&lt;p&gt;Next, slow down any urgent financial request. Scammers create pressure to force quick action. If someone claims there is a payout, problem or deadline, pause and verify it using a phone number or website you trust, not one they provide. It also helps to keep a short list of your financial institutions and their official contact details in one place. That way, you always know how to reach them directly without relying on incoming calls or messages.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/inside-scammers-day-how-target-you&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Finally, be cautious in real-time conversations. Scammers often build trust by collecting small details over multiple interactions. Keeping answers brief and avoiding unnecessary personal details makes it that much harder.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Get a free scan to find out if your personal information is already out on the web&lt;/strong&gt;: &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;The first few months after losing a spouse bring enough decisions without adding fraud risks on top. Yet that is when your personal information spreads the fastest. Public records and data broker sites can quietly build a profile that scammers use against you. Early action makes a real difference. Limiting what gets published, removing existing data and securing your accounts all reduce your exposure. Even small steps, like updating security questions or freezing credit, can stop a scam before it starts. You do not need to handle everything at once. Start with a simple search of your name and review what appears. From there, take control at your own pace and protect what matters most.&lt;/p&gt;&lt;p&gt;If someone can piece together your personal life within days of a loss, how much of your information are you comfortable leaving online? Let us know by writing to us at CyberGuy.com&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/02/931/523/person-typing-on-computer-1.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">06dcab0f-6405-5b9b-9f3b-a2ae5084fdb8</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/politics/executive/social-security</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fbi</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>  <category domain="foxnews.com/taxonomy">fox-news/special/sponsored/experian</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Sun, 03 May 2026 10:23:02 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/diy-identity-protection-vs-paid-services-works-2026</link> <guid isPermaLink="true">https://www.foxnews.com/tech/diy-identity-protection-vs-paid-services-works-2026</guid> <title>DIY identity protection vs paid services: What works in 2026</title> <description>The Conduent breach, called the largest in U.S. history by Texas AG Ken Paxton, exposed millions of records. Here&amp;apos;s how to protect your identity now.</description>   <content:encoded>&lt;p&gt;Earlier this year, more than 25 million Americans began receiving letters from a company most of them had never heard of. The sender was Conduent Business Services, a contractor that processes benefits records and human resources data for state Medicaid programs, employer health plans and government agencies. Between October 2024 and January 2025, ransomware operators pulled names, &lt;a href=&quot;https://www.foxnews.com/category/politics/house-of-representatives/social-security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Social Security&lt;/a&gt; numbers, dates of birth, home addresses, medical diagnosis codes and health insurance claim numbers out of Conduent&apos;s systems. In February 2026, Texas Attorney General Ken Paxton called it the largest data breach in U.S. history.&lt;/p&gt;&lt;p&gt;The letters ended the way most of these letters end, with an apology, a phone number and an offer of one year of free credit monitoring. Once &lt;a href=&quot;https://www.foxnews.com/tech/5-myths-about-identity-theft-put-your-data-risk&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;your data is already out&lt;/a&gt;, can you realistically protect your identity on your own, or has it become something most people are better off outsourcing?&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/fake-ssa-email-alert-spot-scam-fast&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;FAKE SSA EMAIL ALERT: SPOT THIS SCAM FAST&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Plus, you&apos;ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/politics/executive/law&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Federal law&lt;/a&gt; and tools from the Federal Trade Commission cover more ground than many people realize. None of these cost anything. When used together, they close the most common entry points fraudsters target.&lt;/p&gt;&lt;p&gt;Start by freezing your credit at all three bureaus. A freeze blocks new accounts from being opened in your name. It has been free at Equifax, &lt;a href=&quot;https://www.foxnews.com/category/special/sponsored/experian&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Experian&lt;/a&gt; and TransUnion since 2018. You can lift it temporarily when you need to apply for credit.&lt;/p&gt;&lt;p&gt;Next, get an Identity Protection PIN from the IRS at irs.gov/identity-theft-fraud-scams/get-an-identity-protection-pin. This six-digit code blocks fraudulent tax returns filed using your Social Security number. The IRS issues a new one each year.&lt;/p&gt;&lt;p&gt;You should also check your credit reports regularly. Equifax, Experian and TransUnion now offer free weekly access through AnnualCreditReport.com. Checking once every few months can help you catch suspicious activity early.&lt;/p&gt;&lt;p&gt;It also helps to bookmark&lt;strong&gt; &lt;/strong&gt;IdentityTheft.gov. The site creates a personalized recovery plan, generates the affidavit creditors require and provides prefilled dispute letters.&lt;/p&gt;&lt;p&gt;Another simple step is opting out of prescreened credit offers. This removes you from mailing lists lenders use for unsolicited credit and insurance offers. You can do this online at OptOutPrescreen at &lt;i&gt;optoutprescreen.com&lt;/i&gt;, which is run by the major credit bureaus. The process takes just a few minutes. Choose a five-year opt-out for a quick fix, or print and mail the form for a permanent opt-out. Once processed, you should see fewer &quot;pre-approved&quot; offers in your mailbox. &lt;/p&gt;&lt;p&gt;Finally, turn on two-factor authentication (2FA) for every financial, government and benefits account. Even if someone steals your password, they cannot access your account without the second factor.&lt;/p&gt;&lt;p&gt;For many people, these steps create a strong baseline.&lt;/p&gt;&lt;p&gt;The do-it-yourself approach works until something goes wrong. That is where the gap becomes clear.&lt;/p&gt;&lt;p&gt;According to the Identity Theft Resource Center&apos;s 2025 Consumer Impact Report, the average victim spent more than 200 hours and $1,343 out of pocket &lt;a href=&quot;https://www.foxnews.com/tech/think-youre-safe-identity-theft-could-wipe-out-your-entire-lifes-savings&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;recovering from identity theft&lt;/a&gt;. About one in five reported losses above $100,000. Many also reported significant emotional stress.&lt;/p&gt;&lt;p&gt;The financial impact adds up quickly at a national level. A February 2026 report from the U.S. Senate Joint Economic Committee estimates identity theft tied to major data broker breaches has cost Americans more than $20 billion over the past decade. That estimate includes incidents like Equifax, Exactis, National Public Data and TransUnion.&lt;/p&gt;&lt;p&gt;Free tools also have clear limits. They will not monitor the dark web for your data or &lt;a href=&quot;https://www.foxnews.com/tech/think-you-can-delete-your-data-yourself-heres-why-youre-probably-wrong&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;remove your personal details&lt;/a&gt; from data broker sites. They also cannot contact creditors or dispute fraudulent accounts on your behalf.&lt;/p&gt;&lt;p&gt;Instead, you handle every step yourself. &lt;i&gt;&lt;strong&gt;&lt;u&gt;IdentityTheft.gov&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt; gives you a roadmap, but you still have to make the calls, file the paperwork and follow up repeatedly.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/ssa-impersonation-scams-getting-more-personal&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;SSA IMPERSONATION SCAMS ARE GETTING MORE PERSONAL&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;For anyone whose data was exposed in a breach like Conduent or National Public Data, free tools alone leave real gaps. That is where paid identity protection services come in.&lt;/p&gt;&lt;p&gt;These services run continuous scans for your name, Social Security number, email and bank accounts on the dark web, as well as across &lt;a href=&quot;https://www.foxnews.com/tech/make-2026-your-most-private-year-yet-removing-broker-data&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;data broker and people search&lt;/a&gt; sites that resell your home address and family ties. They submit opt-out requests on your behalf and repeat the process when your information shows up again. When fraud happens, many services assign a case manager who works with credit bureaus, banks and creditors to help resolve the issue.&lt;/p&gt;&lt;p&gt;Some plans also include identity theft insurance and dedicated fraud resolution support, which can help cover certain losses and reduce the time it takes to recover.&lt;/p&gt;&lt;p&gt;Paid services have limits. No service can prevent every breach, and even the best monitoring only helps shorten recovery time. The do-it-yourself approach can still work if you are comfortable managing your own checklist. However, for families, for anyone already exposed in past breaches and for those who want less hands-on involvement, adding a paid service on top of free protections can make the process easier to manage.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;See my tips and best picks on Best Identity Theft Protection at CyberGuy.com&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Most people can handle the basics of identity protection on their own, at least at first. Free tools cover the biggest risks and help block common types of fraud. However, the situation changes once your data is exposed in a major breach. At that point, monitoring, cleanup and follow-up can turn into a long and frustrating process. That is where paid services can make a real difference. They reduce the workload, track exposure across more sources and step in when fraud happens. Still, no service eliminates risk completely. The decision comes down to how much time you want to invest and how much support you would need if something goes wrong. For many households, a layered approach works best. Start with the free protections, then decide if adding a paid service fits your situation.&lt;/p&gt;&lt;p&gt;If your identity were stolen tomorrow, would you have the time and patience to fix it yourself?  Let us know by writing to us at &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved. &lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/01/931/523/couple-identity-theft-victims.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">792dbedd-034b-5a7f-a43e-8daaffce37fd</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/politics/executive/social-security</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>  <category domain="foxnews.com/taxonomy">fox-news/special/sponsored/experian</category>  <category domain="foxnews.com/taxonomy">fox-news/politics/regulation/consumers</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Sat, 02 May 2026 14:15:47 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/jetblue-lawsuit-raises-airline-pricing-questions</link> <guid isPermaLink="true">https://www.foxnews.com/tech/jetblue-lawsuit-raises-airline-pricing-questions</guid> <title>JetBlue lawsuit raises airline pricing questions</title> <description>A proposed class action lawsuit claims JetBlue used tracking tools to monitor browsing activity and adjust flight prices without customer consent.</description>   <content:encoded>&lt;p&gt;Booking a flight can feel like a guessing game. You search once, spot a decent price, come back later and suddenly it is higher. Most people shrug and assume demand changed. Now, a new lawsuit against JetBlue is challenging that idea.&lt;/p&gt;&lt;p&gt;The proposed class action claims the airline tracked a customer&apos;s behavior during the booking process for the purpose of setting or adjusting ticket prices. &lt;/p&gt;&lt;p&gt;According to the complaint, that data was collected without clear consent and may have included browsing activity and other user characteristics. The lawsuit also alleges that customers were not informed if their data was being &lt;a href=&quot;https://www.foxnews.com/tech/airlines-secretly-sold-us-travelers-data-homeland-security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;shared or sold to third parties&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;JetBlue strongly disputes the allegation. The airline says fares depend on demand and seat availability, not personal browsing behavior. Still, the case taps into a growing concern that goes far beyond one airline.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/5-worrisome-privacy-clauses-hidden-smart-home-devices&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;5 WORRISOME PRIVACY CLAUSES HIDDEN IN SMART HOME DEVICES&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;The lawsuit, filed by &lt;a href=&quot;https://www.foxnews.com/category/us/us-regions/northeast/new-york&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;New York&lt;/a&gt; resident Andrew Phillips in federal court in New York, alleges that JetBlue monitored user activity on its website using tracking tools while he searched for flights. According to the complaint, that data was used to help adjust prices in real time.&lt;/p&gt;&lt;p&gt;It also claims that when a user searched for a flight, left the site and later returned to complete the booking, the fare increased. The filing suggests this may have been tied to tracking technology rather than normal pricing changes.&lt;/p&gt;&lt;p&gt;The complaint further alleges that this data was collected without clear disclosure and that users may not have been aware of how their &lt;a href=&quot;https://www.foxnews.com/tech/data-brokers-accused-hiding-opt-out-pages-from-google&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;information was being gathered or used&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&quot;Consumers should not have to have their &lt;a href=&quot;https://www.foxnews.com/category/us/personal-freedoms/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;privacy&lt;/a&gt; rights violated to participate in the digital race for airline tickets,&quot; the lawsuit alleges.&lt;/p&gt;&lt;p&gt;The airline disputes these claims. In a public statement, JetBlue said it does not use personal data or browsing history to set individual prices and that all customers have access to the same fares at the same time. &lt;/p&gt;&lt;p&gt;CyberGuy reached out to JetBlue for additional comment but did not hear back before our deadline.&lt;/p&gt;&lt;p&gt;The lawsuit centers on a concept called surveillance pricing. That refers to companies using personal data to adjust prices for different people. Surveillance pricing extends beyond airlines. It has become a broader concern as more companies rely on AI and advanced analytics.&lt;/p&gt;&lt;p&gt;In theory, two people could search for the same flight at the same time and see different prices based on factors like location, device type or browsing history. Companies rarely confirm this practice outright, but consumer advocates have raised concerns for years.&lt;/p&gt;&lt;p&gt;Airlines have long used dynamic pricing, which changes fares based on demand. The key question here is whether personal data plays a role in that calculation.&lt;/p&gt;&lt;p&gt;Many carriers now rely on &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;artificial intelligence&lt;/a&gt; to analyze booking patterns, predict demand shifts and adjust fares in real time. We recently reported on this shift, showing how AI is reshaping the way travelers book flights and how prices are set across the industry. These systems can process large amounts of data at once, including route demand, seasonal trends and competitor pricing.&lt;/p&gt;&lt;p&gt;While airlines say this improves efficiency, it can also make pricing feel less predictable to the average traveler. That is what makes the current lawsuit stand out. It raises the question of whether AI-driven pricing could go a step further by factoring in more detailed data about how people search and book, something airlines like JetBlue say they do not use for individual pricing.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/300000-chrome-users-hit-fake-ai-extensions&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;300,000 CHROME USERS HIT BY FAKE AI EXTENSIONS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Part of the lawsuit points to a social media exchange that quickly drew attention. A customer posted about a $230 jump in ticket price after checking a flight the day before while trying to book travel for a funeral.&lt;/p&gt;&lt;p&gt;In response, JetBlue suggested clearing cookies or using an incognito window. The comment was later deleted. According to the lawsuit, that response appeared to acknowledge that browsing behavior could influence pricing.&lt;/p&gt;&lt;p&gt;JetBlue disputes that interpretation. The airline said the reply came from a customer service employee and was a mistake. It also stated that clearing cookies or using &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;private browsing&lt;/a&gt; would not change the fares available for purchase.&lt;/p&gt;&lt;p&gt;Even so, the exchange struck a nerve. For many travelers, it reinforced a long-standing suspicion that repeated searches or personal data might affect what they pay, even as airlines deny using that information for pricing.&lt;/p&gt;&lt;p&gt;Before assuming the worst, it helps to understand how airline pricing works today. Airlines use complex systems that adjust fares constantly. Prices can change within minutes based on demand, available seats, route popularity and competitor pricing.&lt;/p&gt;&lt;p&gt;If a flight starts filling up, the price usually rises. That means a price jump after you return to a search does not automatically point to tracking. It could simply reflect someone else booking a seat or increased demand.&lt;/p&gt;&lt;p&gt;Still, the lawsuit raises a valid concern about transparency. Travelers rarely know what factors are driving the price they see.&lt;/p&gt;&lt;p&gt;JetBlue says it does not tailor prices based on your digital footprint. According to the airline, you are not paying more because you searched twice or used a specific device. Instead, fares shift based on broader factors like seat availability, timing and demand on a route.&lt;/p&gt;&lt;p&gt;That said, prices can still feel unpredictable. Comparing options across platforms remains one of the best ways to avoid overpaying. Acting quickly when you find a fare you like can also make a difference, especially on popular routes.&lt;/p&gt;&lt;p&gt;If you are concerned about tracking, simple steps like using private browsing or switching devices may help limit how much of your activity is visible during repeated searches.&lt;/p&gt;&lt;p&gt;Some travelers also use a VPN to mask their location. While airlines like JetBlue say pricing does not depend on personal data like IP address or browsing history, a VPN can still add a layer of privacy by reducing how much information is shared during the booking process.&lt;/p&gt;&lt;p&gt;&lt;i&gt;&lt;strong&gt;For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, &lt;/strong&gt;&lt;/i&gt;&lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/mac&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;i&gt;&lt;strong&gt;Mac&lt;/strong&gt;&lt;/i&gt;&lt;/a&gt;&lt;i&gt;&lt;strong&gt;, Android and iOS devices at CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;If you have ever felt like flight prices change in ways that do not quite make sense, you are not alone. This lawsuit taps into a bigger question about &lt;a href=&quot;https://www.foxnews.com/tech/10-signs-your-personal-data-being-sold-online&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;how much companies know&lt;/a&gt; about us and how that information gets used. Airlines like JetBlue say personal data isn’t part of pricing. Still, the way prices change can feel confusing and unpredictable. For now, the best move is to compare prices, take your time and do not assume the first fare you see is the best one.&lt;/p&gt;&lt;p&gt;Are you comfortable with surveillance pricing, or does it cross a line for you? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/02/931/523/jet-blue-flight-ground.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">8e4c9bd7-eae0-576b-b369-3f470569beb6</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>  <category domain="foxnews.com/taxonomy">fox-news/newsedge/consumer</category>  <category domain="foxnews.com/taxonomy">fox-news/travel</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>  <category domain="foxnews.com/taxonomy">fox-news/travel/general/airlines</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Sat, 02 May 2026 08:33:46 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/adt-data-breach-exposes-customer-information</link> <guid isPermaLink="true">https://www.foxnews.com/tech/adt-data-breach-exposes-customer-information</guid> <title>ADT data breach exposes customer information</title> <description>ADT confirms a new data breach exposing customer names, phone numbers and addresses. The cybercrime group ShinyHunters claims it stole millions of records.</description>   <content:encoded>&lt;p&gt;ADT has confirmed a new &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/tech/topics/security&quot;&gt;data breach&lt;/a&gt;, and it comes with a familiar twist. A well-known cybercrime group is reportedly demanding money and threatening to leak data if it does not get paid.&lt;/p&gt;&lt;p&gt;The group behind it, ShinyHunters, says it stole more than 10 million records. ADT has not confirmed that number, but it says attackers accessed customer data.&lt;/p&gt;&lt;p&gt;According to the company, &quot;ADT&apos;s cybersecurity systems detected unauthorized access to a limited set of customer and prospective customer data on April 20, and the company&apos;s response protocols activated immediately, terminating the intrusion, launching a forensic investigation with leading third-party cybersecurity experts, and notifying &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/politics/executive/law&quot;&gt;law enforcement&lt;/a&gt;.&quot;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/tech/google-confirms-data-stolen-breach-known-hacker-group&quot;&gt;&lt;strong&gt;GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;ADT says, &quot;The investigation confirmed that the information involved was limited to names, phone numbers, and addresses. In a small percentage of cases, dates of birth and the last four digits of &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/politics/house-of-representatives/social-security&quot;&gt;Social Security&lt;/a&gt; numbers or Tax IDs were included. &lt;/p&gt;&lt;p&gt;Here is the part that may bring some relief. ADT tells CyberGuy, &quot;Critically, no payment information, including bank accounts or &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/finance&quot;&gt;credit cards&lt;/a&gt;, was accessed, and customer security systems were not affected or compromised in any way.&quot;&lt;/p&gt;&lt;p&gt;Still, this kind of personal data carries real value. Even without full Social Security numbers, attackers can use it to build convincing scams that feel personal.&lt;/p&gt;&lt;p&gt;This breach may have started with a phone call. ShinyHunters told BleepingComputer it used a voice phishing attack, often called &lt;a target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot; href=&quot;https://www.foxnews.com/tech/one-click-cost-father-4-million-bitcoin-vishing-scammers&quot;&gt;&lt;u&gt;vishing&lt;/u&gt;&lt;/a&gt;, to compromise an employee&apos;s Okta single sign-on account. The group claims that access allowed it to steal data from ADT&apos;s Salesforce system. ADT has confirmed unauthorized access to customer and prospective customer data, but it has not publicly confirmed that specific attack method. This approach has become more common. Instead of hacking systems directly, attackers target people. One successful interaction can unlock multiple systems at once.&lt;/p&gt;&lt;p&gt;In a statement to CyberGuy, ADT said its response worked as intended.&lt;/p&gt;&lt;p&gt;&quot;ADT&apos;s protocols performed as designed: the breach was identified quickly, the threat was contained, and the scope was limited,&quot; the company said. &quot;ADT has directly notified all impacted individuals and will offer complimentary &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/tech/5-myths-about-identity-theft-put-your-data-risk&quot;&gt;identity protection services as appropriate&lt;/a&gt;. Protecting customers is not just a priority; it is the foundation of what ADT does. The company remains committed to investing in and strengthening the cybersecurity infrastructure that its customers and their families depend on.&quot;&lt;/p&gt;&lt;p&gt;&lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/tech/ransomware-attack-exposes-social-security-numbers-major-gas-station-chain&quot;&gt;&lt;strong&gt;RANSOMWARE ATTACK EXPOSES SOCIAL SECURITY NUMBERS AT MAJOR GAS STATION CHAIN&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;On the surface, this breach may seem limited. No financial data. No system control. That sounds contained. The reality is more complicated.&lt;/p&gt;&lt;p&gt;Names, phone numbers and addresses create a powerful starting point for scams. Add even partial Social Security data, and the risk increases. Criminals can use that information to &lt;a target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot; href=&quot;https://www.foxnews.com/tech/florida-retiree-lost-200k-fake-paypal-refund-scam&quot;&gt;&lt;u&gt;impersonate companies&lt;/u&gt;&lt;/a&gt;, reset accounts or trick victims into handing over more sensitive details.&lt;/p&gt;&lt;p&gt;This also raises a bigger issue. Even companies focused on security can become targets. That should change how you think about your own exposure. &lt;/p&gt;&lt;p&gt;This isn&apos;t the first time ADT has dealt with a data breach. The company &lt;a target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot; href=&quot;https://www.foxnews.com/tech/adt-hacked-your-home-security-system-really-secure&quot;&gt;&lt;u&gt;disclosed incidents&lt;/u&gt;&lt;/a&gt; in August and October of 2024 that exposed customer and employee information.&lt;/p&gt;&lt;p&gt;When breaches happen more than once, it raises questions about internal security practices and how attackers keep finding a way in.&lt;/p&gt;&lt;p&gt;At the same time, it highlights a broader trend. Cybercriminal groups like &lt;a target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot; href=&quot;https://www.foxnews.com/tech/cargurus-breach-linked-shinyhunters-exposes-12-4m-records&quot;&gt;&lt;u&gt;ShinyHunters&lt;/u&gt;&lt;/a&gt; are focusing on identity systems and employee access instead of traditional hacking methods.&lt;/p&gt;&lt;p&gt;After a breach like this, the goal is to reduce how much attackers can do with your information and make yourself a harder target going forward. &lt;/p&gt;&lt;p&gt;If someone claims to be from a company like ADT, pause before responding. Scammers often use real details to sound convincing. Hang up and contact the company directly using a verified number. &lt;/p&gt;&lt;p&gt;Consider using a personal data removal service. These tools help remove your information from data broker sites, which reduces what scammers can find about you online. &lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;em&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot;&gt;Identity theft&lt;/a&gt; monitoring can alert you to suspicious activity tied to your name or Social Security number early, which gives you a chance to act before damage spreads. &lt;strong&gt;See my tips and best picks on Best Identity Theft Protection at &lt;em&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Use a password manager to create and store strong, unique passwords. If you reused passwords anywhere, especially on &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/tech/technologies/email&quot;&gt;email&lt;/a&gt; or banking accounts, update them right away to prevent account takeovers. &lt;strong&gt;Check out the best expert-reviewed password managers of 2026 at &lt;em&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;&lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/tech/healthcare-data-breach-hits-system-storing-patient-records&quot;&gt;&lt;strong&gt;HEALTHCARE DATA BREACH HITS SYSTEM STORING PATIENT RECORDS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Adding an extra login step, such as two-factor authentication (&lt;a target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot; href=&quot;https://www.foxnews.com/tech/what-two-factor-authentication-should-enable-it&quot;&gt;&lt;u&gt;2FA&lt;/u&gt;&lt;/a&gt;), makes it much harder for attackers to break into your accounts, even if they have your credentials.&lt;/p&gt;&lt;p&gt;Make sure your devices run updated security &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/tech/topics/software&quot;&gt;software&lt;/a&gt;. Many modern tools can detect suspicious activity before it turns into a bigger problem.&lt;/p&gt;&lt;p&gt;If your Social Security number or even part of it may be involved, consider placing a credit freeze with the major bureaus. This prevents new accounts from being opened in your name without your approval.&lt;/p&gt;&lt;p&gt;Keep an eye on bank accounts, credit cards and important logins for unusual activity. Even small, unfamiliar charges or login alerts can be an early warning sign. &lt;/p&gt;&lt;p&gt;Install and maintain strong antivirus software on your devices. It can detect suspicious activity, block malware and help stop threats before they gain access to your data. &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at &lt;em&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Attackers often try to reset your passwords using information they already have. If you get unexpected password reset emails or codes, treat them as a warning sign, not a routine message.&lt;/p&gt;&lt;p&gt;While ADT is one of the largest home security companies in the United States, the recent breach of customer information highlights potential vulnerabilities despite the company&apos;s assurance that &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/tech/topics/smart-and-safe-tech&quot;&gt;home security systems&lt;/a&gt; were not compromised. There are many other options in the market, whether you prefer a professionally installed system or a do-it-yourself one.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;For reference, you can check out my guide on the best home security systems at &lt;em&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;, where I’ve listed four of my favorite options. You might also want to find out if your home insurance offers a discount for installing robust security protection. &lt;/p&gt;&lt;p&gt;If your data was part of this breach, the risk does not end with the initial incident. In many cases, it is just getting started. You may begin to see more targeted scam calls or emails. Messages might include your name or reference your address to appear legitimate. That level of detail can make even cautious people hesitate. Even if you have never used ADT, this is a reminder of how often personal data circulates behind the scenes. Once it is out there, it can be reused in ways you never expected. The bigger takeaway is simple. Breaches like this are less about a single company and more about how exposed personal data has become across the board.&lt;/p&gt;&lt;p&gt;Should companies like ADT be doing a better job protecting your data, especially after repeated breaches? Let us know by writing to us at &lt;strong&gt;&lt;em&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/05/931/523/adt-security-sign-outside-home.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">fb97476e-5cfa-5c79-852e-f15ebe42a31b</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Fri, 01 May 2026 12:30:43 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/ai-newsletter-anthropic-model-too-dangerous-go-public</link> <guid isPermaLink="true">https://www.foxnews.com/tech/ai-newsletter-anthropic-model-too-dangerous-go-public</guid> <title>Fox News AI Newsletter: The AI model that&apos;s too dangerous to go public</title> <description>Anthropic built an AI model called Mythos so effective at finding software vulnerabilities that the company decided it is too dangerous for public release.</description>   <content:encoded>&lt;p&gt;IN TODAY&apos;S NEWSLETTER:&lt;/p&gt;&lt;p&gt;- &lt;strong&gt;Anthropic has an AI model that&apos;s too dangerous to go public&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;- &lt;strong&gt;Melania Trump turns White House tennis pavilion into AI lab for students&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;- &lt;strong&gt;Florida murder suspect asked ChatGPT about dumping human remains days before killings: docs&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;LOCKS WIDE OPEN: &lt;/strong&gt;&lt;a href=&quot;https://www.foxnews.com/tech/anthropics-mythos-ai-found-2000-unknown-software-vulnerabilities-seven-weeks-testing&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;Anthropic&apos;s Mythos AI model, too dangerous to release publicly, is changing digital security faster than anyone is ready for&lt;/strong&gt;&lt;/a&gt; – There is a new AI model called Mythos. Anthropic built it for defensive cybersecurity research. It is so effective at finding software vulnerabilities that Anthropic decided the general public cannot have it.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;FUNDAMENTAL SHIFT: &lt;/strong&gt;&lt;a href=&quot;https://www.foxbusiness.com/technology/from-rogue-ai-blackmailing-humans-condensing-school-days-ai-revolution-already-reshaping-life&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;From rogue AI blackmailing humans to condensing school days, AI revolution already reshaping life&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; – &lt;/strong&gt;Fox Business explores how the artificial intelligence revolution is already fundamentally reshaping everyday life, ranging from alarming scenarios of rogue AI blackmailing humans to innovative applications condensing traditional school days.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;DIVERSITY FIGHT: &lt;/strong&gt;&lt;a href=&quot;https://www.foxnews.com/politics/trump-doj-jumps-musk-xai-court-battle-diversity-fight-heats-up&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;Trump DOJ jumps into Musk xAI court battle&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; – &lt;/strong&gt;The Trump Department of Justice has formally intervened in a high-profile court battle involving Elon Musk&apos;s artificial intelligence company xAI, as a broader legal and political fight over corporate diversity initiatives rapidly heats up.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;FIRST LADY FUTURE: &lt;/strong&gt;&lt;a href=&quot;https://www.foxnews.com/politics/melania-trump-embraces-ai-education-initiative-white-house-tech-push-shes-been-champion&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;Melania Trump embraces AI education initiative in White House tech push she&apos;s been championing&lt;/strong&gt;&lt;/a&gt; – First lady Melania Trump is actively embracing a new artificial intelligence education initiative as part of a broader White House technology push that she has long been championing.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;PRICE PAIN SPREADS: &lt;/strong&gt;&lt;a href=&quot;https://www.foxnews.com/politics/ai-boom-tests-gops-midterm-affordability-pitch-price-pain-spreads&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;AI boom tests GOP&apos;s midterm affordability pitch&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; – &lt;/strong&gt;The rapid artificial intelligence boom and its associated energy costs are beginning to test the Republican Party&apos;s midterm pitch on affordability as price pain spreads among voters.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;CHILLING QUERY: &lt;/strong&gt;&lt;a href=&quot;https://www.foxnews.com/us/florida-murder-suspect-asked-chatgpt-dumping-human-remains-days-killings-docs&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;Florida murder suspect asked ChatGPT about dumping human remains days before killings: docs&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; – &lt;/strong&gt;Newly released court documents reveal that a Florida murder suspect allegedly asked the artificial intelligence program ChatGPT for advice on dumping human remains just days before the killings occurred.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;RACE IS ON: &lt;/strong&gt;&lt;a href=&quot;https://www.foxnews.com/media/kevin-oleary-details-massive-utah-ai-data-center-rival-chinas-tech-dominance&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;Kevin O&apos;Leary details massive Utah AI data center to rival China&apos;s tech dominance&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; – &lt;/strong&gt;Business mogul Kevin O&apos;Leary detailed plans for a massive artificial intelligence data center in Utah designed specifically to rival China&apos;s growing global tech dominance.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;TECH FIGHT: &lt;/strong&gt;&lt;a href=&quot;https://www.foxbusiness.com/media/former-apple-ceo-sees-openai-poses-largest-competitive-threat-tech-giant-years&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;Former Apple CEO sees OpenAI posing largest competitive threat to tech giant in years&lt;/strong&gt;&lt;/a&gt; – Former Apple CEO John Sculley is sounding the alarm on artificial intelligence, warning that OpenAI poses the largest competitive threat the massive tech giant has faced in years.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;BOUNCING BACK:&lt;/strong&gt; &lt;a href=&quot;https://www.foxbusiness.com/economy/us-economy-q1-2026-advance&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;US economic growth rebounds as AI buildout and consumer spending fuel first quarter&lt;/strong&gt;&lt;/a&gt; – U.S. economic growth rebounded in the first quarter of the year from a sluggish fourth quarter, according to the Commerce Department&apos;s latest estimate.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;JOB IMPACT: &lt;/strong&gt;&lt;a href=&quot;https://www.foxbusiness.com/technology/zuckerberg-says-meta-layoffs-tied-ai-spending-wont-rule-out-future-cuts&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;Zuckerberg says Meta layoffs tied to AI spending, won&apos;t rule out future cuts&lt;/strong&gt;&lt;/a&gt; – Meta CEO Mark Zuckerberg has explicitly tied recent staff layoffs to the company&apos;s massive spending on artificial intelligence, while pointedly refusing to rule out the possibility of future workforce cuts.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;HEAVYWEIGHT LEGAL BATTLE: &lt;/strong&gt;&lt;a href=&quot;https://www.foxbusiness.com/fox-news-tech/elon-musk-tells-court-he-was-fool-funding-openai-report&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;Elon Musk tells court he was fool for funding OpenAI: report&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; – &lt;/strong&gt;Tech billionaire Elon Musk told a court that he was a &quot;fool&quot; for his early financial role in funding the artificial intelligence research organization OpenAI.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;LEARNING ON THE JOB: &lt;/strong&gt;&lt;a href=&quot;https://www.foxnews.com/tech/meta-tracks-workers-train-ai-agents&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;Meta tracks workers to train AI agents&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt; – &lt;/strong&gt;Social media giant Meta is actively tracking its own workers and analyzing their internal communications in an effort to train its advanced new artificial intelligence agents.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;FOLLOW FOX NEWS ON SOCIAL MEDIA&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.facebook.com/FoxNews&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Facebook&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.instagram.com/foxnews/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Instagram&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/c/FoxNews/featured&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;YouTube&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://x.com/FoxNews&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;X&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.linkedin.com/company/fox-news-channel/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;LinkedIn&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;SIGN UP FOR OUR OTHER NEWSLETTERS&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/newsletters&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox News First&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/newsletters&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox News Opinion&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/newsletters&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox News Lifestyle&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/newsletters&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox News Health&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;DOWNLOAD OUR APPS&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox Business&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxweather.com/app&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox Weather&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxsports.com/mobile&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox Sports&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://tubitv.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Tubi&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;WATCH FOX NEWS ONLINE&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/go&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox News Go&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;STREAM FOX NATION&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://nation.foxnews.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Fox Nation&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;here&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/05/931/524/anthropic-ceo-dario-amodei-fox-news-002.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="524" />   <category domain="foxnews.com/metadata/dc.identifier">7043b820-6b9b-54ef-a749-a5b36de9ede3</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>  <category domain="foxnews.com/taxonomy">fox-news/columns/artificial-intelligence-newsletter</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Fri, 01 May 2026 10:29:35 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/unitree-g1-humanoid-robot-ice-skates-rollerblades</link> <guid isPermaLink="true">https://www.foxnews.com/tech/unitree-g1-humanoid-robot-ice-skates-rollerblades</guid> <title>Unitree G1 humanoid robot ice skates and Rollerblades</title> <description>Watch Unitree&amp;apos;s G1 humanoid robot glide on Rollerblades and ice skates, pulling off spins and flips while staying perfectly balanced in real time.</description>   <content:encoded>&lt;p&gt;We&apos;ve seen &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/robots&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;robots&lt;/a&gt; walk, run, climb stairs and even recently finish a half-marathon. What we haven&apos;t seen until now is a robot gliding across the ice like an Olympic skater or spinning on one leg on Rollerblades without losing balance.&lt;/p&gt;&lt;p&gt;That is exactly what &lt;a href=&quot;https://www.foxnews.com/tech/humanoid-robot-stuns-perfect-side-flip-acrobatics&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Unitree Robotics just showed&lt;/a&gt; with its G1 humanoid robot. In newly released footage, the robot moves on Rollerblades and ice skates while keeping its posture steady through coordinated wheel and leg control. It&apos;s pretty amazing to watch.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/elon-musk-teases-future-run-robots&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;ELON MUSK TEASES A FUTURE RUN BY ROBOTS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;When you actually watch the video, a few moments really stand out. It starts with the robot leaning into the motion, almost stepping as it propels itself forward on two wheels, shifting its weight from side to side as if one wheel is leading the next. Its arms move up and down to stay balanced, giving it a rhythm that feels closer to walking than rolling, like it&apos;s constantly adjusting in real time.&lt;/p&gt;&lt;p&gt;Then it pulls off a series of spins and an impressive flip, landing clean on two wheels and continuing without missing a beat. No hesitation.&lt;/p&gt;&lt;p&gt;Next, it switches to Rollerblades and moves with the same level of control. It glides, does some fancy footwork, changes direction and even lifts one leg while spinning and staying balanced like it&apos;s second nature. That alone would be impressive.&lt;/p&gt;&lt;p&gt;But the real wow moment comes at the end. On ice, the robot starts doing smooth twirls, almost like it’s figure skating, while holding its posture without slipping. That’s when you start to see how far &lt;a href=&quot;https://www.foxnews.com/tech/humanoid-robots-hit-mass-production-china&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;these humanoid robots&lt;/a&gt; have come.&lt;/p&gt;&lt;p&gt;Most humanoid robots face the same problem. Staying upright while doing anything dynamic pushes the limits of control systems. The G1 changes that equation by blending two approaches. It combines wheeled efficiency with legged adaptability. That means it can roll when speed matters and step when terrain gets tricky.&lt;/p&gt;&lt;p&gt;In the demo, the robot transitions smoothly between these modes. It executes continuous motion instead of stopping to rebalance. You see 360-degree turns, controlled spins and &lt;a href=&quot;https://www.foxnews.com/tech/chinese-humanoid-robot-lands-worlds-first-front-flip&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;even front flips&lt;/a&gt;, all without a visible pause.&lt;/p&gt;&lt;p&gt;That level of fluidity points to improvements in real-time control, balance correction and motion planning. These are areas that have held humanoid robots back for years, until now.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/robots-learn-1000-tasks-one-day-from-single-demo&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;ROBOTS LEARN 1,000 TASKS IN ONE DAY FROM A SINGLE DEMO&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The hardware behind the G1 explains why it can pull this off. Unitree designed the system as a full-stack platform for &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;AI training and deployment.&lt;/a&gt; That means the robot collects its own data, learns from simulation and applies those lessons in the real world.&lt;/p&gt;&lt;p&gt;The robot comes in two main versions. The Standard model focuses on stationary tasks. The Flagship version adds a wheeled base that can reach about 3.3 feet per second.&lt;/p&gt;&lt;p&gt;Both variations share a humanoid structure with up to 19 degrees of freedom. Each arm has seven degrees of freedom and can handle about 6.6 pounds. A flexible waist allows wide motion ranges, which helps with balance during dynamic movement.&lt;/p&gt;&lt;p&gt;Vision comes from a binocular camera in the head, along with wrist &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/cameras&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;cameras&lt;/a&gt; for close-up work. The system can use different grippers, including dexterous hands for more precise tasks.&lt;/p&gt;&lt;p&gt;At the core, the Flagship model runs on an NVIDIA Jetson Orin NX module with up to 100 TOPS of compute. That level of onboard processing supports real-time decision-making during complex movement.&lt;/p&gt;&lt;p&gt;Battery life can stretch up to six hours, depending on how hard the robot is working.&lt;/p&gt;&lt;p&gt;For years, robotics has leaned in two directions. Wheeled machines move efficiently but struggle with obstacles. Legged robots handle complex environments but use more energy and move more slowly.&lt;/p&gt;&lt;p&gt;Unitree&apos;s approach tries to merge both. By adding wheels to a humanoid frame, the G1 can move quickly across flat surfaces and still adapt when conditions change. That hybrid design also reduces wear on joints and improves &lt;a href=&quot;https://www.foxnews.com/category/energy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;energy efficiency&lt;/a&gt; over long distances.&lt;/p&gt;&lt;p&gt;It also opens the door to new types of tasks. A robot like this could move through a warehouse, switch to precise manipulation at a workstation and then roll to the next job without slowing down.&lt;/p&gt;&lt;p&gt; &lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/new-mobile-robot-helps-seniors-walk-safely-prevent-falls&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;NEW MOBILE ROBOT HELPS SENIORS WALK SAFELY AND PREVENT FALLS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The skating is what grabs you first. It is fun to watch and hard to ignore. What stands out after a few seconds is how steady the robot stays the whole time. It keeps moving, keeps adjusting and never looks close to losing control. That is a big change from the stop-and-go motion we are used to seeing. If this keeps improving, and I know it will, you are going to see robots that can move through real environments without slowing down or needing constant input.&lt;/p&gt;&lt;p&gt;So here is the question. If robots can move this fluidly today, how long before they start working alongside you without missing a step and are you OK with that? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/05/931/523/ice-skating-humanoid-robot.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">9aea7390-0316-5f69-9c5f-8d020043eeb1</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/innovation</category>  <category domain="foxnews.com/taxonomy">fox-news/tech</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/cameras</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/robots</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Fri, 01 May 2026 07:19:55 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/are-insurance-apps-watching-you</link> <guid isPermaLink="true">https://www.foxnews.com/tech/are-insurance-apps-watching-you</guid> <title>Are insurance apps watching you?</title> <description>Insurance apps promise savings but may access your driving, location and health data. Find out how to control permissions and protect your privacy.</description>   <content:encoded>&lt;p&gt;Most people download an insurance app for a simple reason. They want a discount. Maybe it is a safe driving program. Maybe it is a &lt;a href=&quot;https://www.foxnews.com/category/health/wellness&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;wellness incentive.&lt;/a&gt; Either way, the pitch sounds simple. Share a little data and save a little money. But what exactly are you sharing?&lt;/p&gt;&lt;p&gt;Jan emailed us with a question that many people have probably wondered about:&lt;/p&gt;&lt;p&gt;Jan, you’re not alone. Many insurance companies now offer programs that promise lower premiums if you install their app and agree to share certain types of data. That can include how you drive, where you travel and, in some cases, limited &lt;a href=&quot;https://www.foxnews.com/category/health/nutrition-and-fitness/fitness&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;health or fitness information&lt;/a&gt; if the app connects to systems like Apple Health. The key point is that these programs are usually optional, and the data sharing is part of the trade.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/top-20-apps-tracking-you-every-day&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;TOP 20 APPS TRACKING YOU EVERY DAY&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The good news is that you can often limit &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/apps&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;what these apps can see.&lt;/a&gt; The bigger question is whether the discount is worth the access.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Plus, you&apos;ll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/p&gt;&lt;p&gt;CyberGuy has previously covered telematics programs where insurers track driving behavior through smartphone apps or connected car data. Those programs monitor things like speed, braking patterns and the time of day you drive. In another report, we explained how your car may be &lt;a href=&quot;https://www.foxnews.com/tech/worth-saving-money-let-car-insurance-company-track-your-every-move&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;sharing driving data with insurance companies&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;We&apos;ve also reported on &lt;a href=&quot;https://www.foxnews.com/tech/how-your-car-might-be-selling-you-out-to-insurers&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;how apps collect and sell personal data&lt;/u&gt;&lt;/a&gt;, including sensitive health information many users assume stays private. What has not always been discussed together is the broader pattern. Insurance companies are increasingly using smartphone apps to gather behavior data about both how you drive and how you live. Your phone becomes the measurement tool. For you, that raises a simple question. How much personal data are you willing to trade for a discount?&lt;/p&gt;&lt;p&gt;The details vary depending on the program. However, many insurance apps collect several types of information.&lt;/p&gt;&lt;p&gt;For driving programs, apps may monitor:&lt;/p&gt;&lt;p&gt;The goal is to calculate a driving score. Safer drivers may receive a discount when the policy renews. Some insurance apps also ask for access to other phone data, such as Motion &amp;amp; Fitness or camera permissions.&lt;/p&gt;&lt;p&gt;On the health side, programs may connect to health and fitness platforms. If you grant permission, the app may read data such as:&lt;/p&gt;&lt;p&gt;It is important to understand that apps typically cannot see this data unless you grant access during setup. Still, many people click through permission screens quickly and later wonder what they agreed to share.&lt;/p&gt;&lt;p&gt;Location data alone can reveal a surprising amount about a person&apos;s life. It can show where you live, where you work and where you travel every day. Driving patterns can also reveal how often you are on the road at night or during busy traffic periods.&lt;/p&gt;&lt;p&gt;Health and fitness data can paint an even more personal picture. That does not mean insurers are secretly spying on everything in your phone. But the more permissions you grant, the more insight the app may gain into your routines and habits.&lt;/p&gt;&lt;p&gt;That is why we encourage you to &lt;a href=&quot;https://www.foxnews.com/tech/5-tech-terms-shape-your-online-privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;review app permissions carefully&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;In most cases, yes. Insurance companies typically frame these programs as voluntary discount opportunities. If you enroll, you agree to share certain data that helps calculate a risk score.&lt;/p&gt;&lt;p&gt;If the data shows safe driving or healthy activity levels, you may receive a discount at renewal. However, if you decide you are uncomfortable with the tracking, you can usually opt out. Just keep in mind that the associated discount may disappear.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/blue-shield-exposed-4-7m-patients-health-data-google-2&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;BLUE SHIELD EXPOSED 4.7M PATIENTS’ HEALTH DATA TO GOOGLE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The good news for Jan and anyone else wondering about this is that you can adjust permissions on your phone. These controls exist on both &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/iphone&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;iPhone&lt;/a&gt; and Android devices. A smart approach is to review every permission the app requests and only allow what is truly necessary.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On iPhone:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Find the insurance app and adjust its access. You can often set location access to:&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/android&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;On Android:&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;S&lt;i&gt;ettings may vary depending on your Android phone’s manufacturer&lt;/i&gt;&lt;/p&gt;&lt;p&gt;or&lt;/p&gt;&lt;p&gt;Find the insurance app and choose a more limited option, such as:&lt;/p&gt;&lt;p&gt;These settings help &lt;a href=&quot;https://www.foxnews.com/tech/how-stop-someone-tracking-you-your-phone&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;prevent constant background location tracking&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;If an insurance app connects to &lt;strong&gt;Apple Health or &lt;/strong&gt;&lt;a href=&quot;https://www.foxnews.com/category/tech/companies/google&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;Google Health Connect&lt;/strong&gt;,&lt;/a&gt; you can manage that separately.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On iPhone:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Select the insurance app to see what information it can read. You can turn off specific categories of health data.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On Android:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;S&lt;i&gt;ettings may vary depending on your Android phone’s manufacturer&lt;/i&gt;&lt;/p&gt;&lt;p&gt;There, you can see which apps have permission to read or write health and fitness data, such as activity or workout information. You can turn those permissions off if you prefer.&lt;/p&gt;&lt;p&gt;While you are already in your phone&apos;s Settings reviewing permissions, it is also worth checking access to:&lt;/p&gt;&lt;p&gt;Only allow the permissions the app truly needs to function. This follows a simple security principle called &lt;strong&gt;least privilege&lt;/strong&gt;. Give an app the minimum access it needs to work. Not every permission it asks for. For example, a driving app may need motion data to measure braking. But it may not need continuous location tracking or access to health records. By limiting permissions, you reduce how much information the app collects.&lt;/p&gt;&lt;p&gt;This brings us back to Jan&apos;s question. Is a 10% discount worth the trade? For some people, the answer is yes. If you are comfortable sharing driving data and the program is transparent about how it works, the savings can add up. For others, the trade may feel too intrusive. The most important thing is understanding what the app can access and deciding whether the benefit outweighs the data you share. A discount can be helpful. But &lt;a href=&quot;https://www.foxnews.com/tech/9-online-privacy-risks-you-probably-dont-know-about&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;privacy has value too&lt;/a&gt;. &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/5-myths-about-identity-theft-put-your-data-risk&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Insurance apps are only one way companies can collect information about you. &lt;a href=&quot;https://www.foxnews.com/tech/stop-data-brokers-from-selling-your-information-online&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Data brokers also gather location&lt;/a&gt; patterns, behavioral details, and personal information from apps and online activity. Using a data removal service can help reduce how much of that information is available online.&lt;/p&gt;&lt;p&gt;While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren&apos;t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It&apos;s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Get a free scan to find out if your personal information is already out on the web: &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Insurance apps reflect a bigger shift in how companies assess risk. Instead of relying only on traditional factors like age or claims history, insurers can now measure behavior through the device in your pocket. That can reward safe drivers and active lifestyles. It can also create new privacy questions that many of you never expected to face when you downloaded an app. Jan&apos;s instinct to question what the app could access was exactly right. Before accepting a discount, take a few minutes to review permissions and decide what level of tracking you are comfortable with. Your phone holds a lot of personal information. It is worth making sure you stay in control of it.&lt;/p&gt;&lt;p&gt;Here is the question for you: Would you trade detailed data about your driving or health for a lower insurance bill? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Plus, you&apos;ll get instant access to my Ultimate Scam Survival Guide free when you join.  &lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/01/931/523/digital-privacy-photo-1.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">5b29c82f-3806-51e8-a3a6-4d086dc30164</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/health/health-care</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/smartphones</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/apps</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/gps</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Thu, 30 Apr 2026 14:19:47 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/meta-tracks-workers-train-ai-agents</link> <guid isPermaLink="true">https://www.foxnews.com/tech/meta-tracks-workers-train-ai-agents</guid> <title>Meta tracks workers to train AI agents</title> <description>Meta is tracking employee mouse clicks, keystrokes and screen habits to train AI models, raising new questions about workplace monitoring and privacy.</description>   <content:encoded>&lt;p&gt;Inside Meta, the &lt;a href=&quot;https://www.foxnews.com/category/tech/companies/facebook&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;parent company of Facebook,&lt;/a&gt; Instagram and WhatsApp, employees&apos; everyday clicks, shortcuts and screen habits are now part of how the company trains its artificial intelligence systems.&lt;/p&gt;&lt;p&gt;Meta has started rolling out internal software that tracks how &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/computers&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;employees use their computers,&lt;/a&gt; including how they move through apps and complete routine tasks. The company says this data will help build smarter AI tools, but it also raises new questions about how far workplace monitoring should go.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/how-to-opt-out-ai-data-collection-popular-apps&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HOW TO OPT OUT OF AI DATA COLLECTION IN POPULAR APPS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The system is called the Model Capability Initiative, or MCI. It runs on work apps and &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/websites&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;websites&lt;/a&gt; used by employees.&lt;/p&gt;&lt;p&gt;Here is what it tracks:&lt;/p&gt;&lt;p&gt;Meta says the idea is simple. If AI is supposed to act like a human using a computer, it needs real examples of how people actually work.&lt;/p&gt;&lt;p&gt;&quot;If we&apos;re building agents to help people complete everyday tasks using computers, our models need real examples of how people actually use them - things like mouse movements, clicking buttons, and navigating dropdown menus,&quot; a Meta spokesperson told CyberGuy. &quot;To help, we&apos;re launching an internal tool that will capture these kinds of inputs on certain applications to help us train our models. There are safeguards in place to protect sensitive content, and the data is not used for any other purpose.&quot;&lt;/p&gt;&lt;p&gt;The company insists that data collected through this tool is used only for model training, not for employee performance reviews, and managers do not have access to it. Company devices were already subject to monitoring, and this isn’t unique to Meta. &lt;/p&gt;&lt;p&gt;Meta isn’t collecting this information just for insight. It is feeding it into a broader push to build &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;artificial intelligence&lt;/a&gt; agents that can handle work tasks. In an internal memo, Meta&apos;s CTO Andrew Bosworth described a future where AI agents do most of the work while humans guide and review.&lt;/p&gt;&lt;p&gt;The company is already reorganizing around that idea. Internal programs like &quot;AI for Work,&quot; now called the Agent Transformation Accelerator, are designed to bring AI into daily workflows across teams.&lt;/p&gt;&lt;p&gt;Meta believes this approach will make operations faster and more efficient. The trade-off is that human work becomes &lt;a href=&quot;https://www.foxnews.com/category/tech/understanding-ai&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;training data&lt;/a&gt; for the systems that may replace parts of it.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/meta-employee-accused-accessing-private-images&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;META EMPLOYEE ACCUSED OF ACCESSING PRIVATE IMAGES&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Workplace monitoring has been around for years, but this takes it a step further. For example, tracking keystrokes and clicks in real time creates a level of oversight that companies have more often used with gig workers than office employees. As a result, employers can now watch day-to-day activity more closely.&lt;/p&gt;&lt;p&gt;At the same time, a legal gray area exists. In the &lt;a href=&quot;https://www.foxnews.com/category/us&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;United States&lt;/a&gt;, companies generally have broad authority to monitor employees as long as they provide notice. Because of that, employers have significant room to expand how they collect data.&lt;/p&gt;&lt;p&gt;However, outside the U.S., the rules can be stricter, and some regions place tighter limits on how companies collect and use employee data.&lt;/p&gt;&lt;p&gt;Even so, knowing someone is tracking your activity at this level can change how you work, how you communicate and how much autonomy you feel on the job.&lt;/p&gt;&lt;p&gt;Meta is hardly alone in pushing toward automation. Companies across Silicon Valley are investing heavily in AI systems that can write code, organize data and assist with decision-making. At the same time, many are cutting jobs or reshaping roles.&lt;/p&gt;&lt;p&gt;Meta plans to reduce its workforce by about 10 percent globally. &lt;a href=&quot;https://www.foxnews.com/category/tech/companies/amazon&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Amazon&lt;/a&gt; has also trimmed tens of thousands of corporate roles in recent months.&lt;/p&gt;&lt;p&gt;The message is clear. AI has evolved beyond a tool that helps employees. It is increasingly positioned as a replacement for certain types of work.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/jobs-most-risk-from-ai-according-microsoft&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;JOBS THAT ARE MOST AT RISK FROM AI, ACCORDING TO MICROSOFT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Even if you do not work at Meta, this shift has wider implications. First, workplace monitoring is expanding beyond factories and delivery jobs into office environments. That could become standard across industries.&lt;/p&gt;&lt;p&gt;Second, your everyday work habits may become valuable data. Companies are realizing that human behavior is one of the most useful training resources for AI.&lt;/p&gt;&lt;p&gt;The line between assisting and replacing workers is getting thinner. Tools that start as helpers often evolve into something more autonomous over time.&lt;/p&gt;&lt;p&gt;If your job involves repetitive computer tasks, it is worth paying attention to how AI is being trained to handle them.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;.&lt;/p&gt;&lt;p&gt;Meta&apos;s move marks a turning point. AI no longer relies only on public data or curated datasets. It now learns directly from how people work in real time. That shift raises practical questions about productivity and efficiency. It also brings deeper &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;concerns about privacy,&lt;/a&gt; control and the future role of human workers. Companies argue they need this data to build better tools. At the same time, employees now help train systems that could eventually replace parts of their roles.&lt;/p&gt;&lt;p&gt;If your daily work became training data for AI that could eventually do your job, would you be comfortable with that? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/meta-denver-office-cafeteria-fox-news-001.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">a239dbca-9625-5eac-945d-cffdc52473fb</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/companies/facebook</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>  <category domain="foxnews.com/taxonomy">fox-news/us/economy/jobs</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Thu, 30 Apr 2026 10:14:33 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/amtrak-data-breach-exposes-millions-customer-records</link> <guid isPermaLink="true">https://www.foxnews.com/tech/amtrak-data-breach-exposes-millions-customer-records</guid> <title>Amtrak data breach exposes millions of customer records</title> <description>A dataset attributed to Amtrak appeared on Have I Been Pwned, reportedly exposing customer emails, names, addresses and support interaction records.</description>   <content:encoded>&lt;p&gt;Booking a train ticket is usually something most people don&apos;t think twice about. Now it could come with &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;real privacy risks&lt;/a&gt; after a reported data exposure tied to Amtrak.&lt;/p&gt;&lt;p&gt;A newly surfaced dataset linked to the company has appeared on Have I Been Pwned, a widely used site that tracks and verifies &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/hackers&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;data breaches&lt;/a&gt;, suggesting customer information may now be circulating online. The company has not confirmed the full scope, but the situation is already drawing attention from security researchers.&lt;/p&gt;&lt;p&gt;For travelers, the bigger issue isn’t just what was taken. It is how that data can be used next.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/149-million-passwords-exposed-massive-credential-leak&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The breach was added to Have I Been Pwned on April 17, 2026, after a dataset attributed to Amtrak appeared online. According to that listing, the dataset includes more than 2.1 million unique accounts.&lt;/p&gt;&lt;p&gt;The exposed information listed by Have I Been Pwned includes &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/email&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;email addresses&lt;/a&gt;, names, physical addresses and customer support records.&lt;/p&gt;&lt;p&gt;Separate reports suggest the total number of records could be significantly higher, with some estimates reaching up to 9.4 million, though that figure has not been confirmed by Amtrak.&lt;/p&gt;&lt;p&gt;Support interactions can reveal travel habits, preferences and past issues. That gives attackers more context to work with.&lt;/p&gt;&lt;p&gt;The group linked to the attack, &lt;a href=&quot;https://www.foxnews.com/tech/cargurus-breach-linked-shinyhunters-exposes-12-4m-records&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;&lt;u&gt;ShinyHunters&lt;/u&gt;&lt;/a&gt;, has a pattern. They often target cloud-based customer systems, especially platforms like Salesforce.&lt;/p&gt;&lt;p&gt;These systems store huge amounts of customer data in one place. That makes them efficient for businesses and valuable for attackers.&lt;/p&gt;&lt;p&gt;Attacks like this often involve exploiting access to cloud-based customer relationship management (CRM) environments rather than breaching internal networks directly.&lt;/p&gt;&lt;p&gt;In many cases, the breach does not require breaking into a company&apos;s internal network. Instead, attackers exploit weak access controls, misconfigured settings or compromised credentials tied to cloud services.&lt;/p&gt;&lt;p&gt;Once inside, they can extract large datasets quickly and demand payment before releasing the data publicly.&lt;/p&gt;&lt;p&gt;Not all data breaches carry the same level of risk. This one stands out because of the type of information involved.&lt;/p&gt;&lt;p&gt;Basic contact details can already be used for spam. Add customer service history, and the situation changes. Attackers can reference real interactions to make their messages feel legitimate.&lt;/p&gt;&lt;p&gt;You might get an email that mentions a past trip, a refund request or a delayed train. It looks familiar. That is what makes it dangerous.&lt;/p&gt;&lt;p&gt;These tailored &lt;a href=&quot;https://www.foxnews.com/tech/dont-click-that-link-how-to-spot-prevent-phishing-attacks-in-your-inbox&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;&lt;u&gt;phishing attempts &lt;/u&gt;&lt;/a&gt;are far more convincing than generic scams.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/scammers-build-profile-using-data-brokers&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HOW SCAMMERS BUILD A PROFILE ON YOU USING DATA BROKERS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;If your data is part of this breach, the immediate risk isn’t someone logging into your account. The bigger concern is impersonation.&lt;/p&gt;&lt;p&gt;Attackers can use your information to build trust quickly. They may pose as Amtrak support, a &lt;a href=&quot;https://www.foxnews.com/travel&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;travel partner&lt;/a&gt; or even a financial institution tied to a booking.&lt;/p&gt;&lt;p&gt;That increases the chance you click a link, share more details or approve a transaction without realizing what is happening.&lt;/p&gt;&lt;p&gt;Even if you have never had an issue before, this kind of exposure changes your risk profile.&lt;/p&gt;&lt;p&gt;We reached out to Amtrak for comment, but did not hear back before our deadline.&lt;/p&gt;&lt;p&gt;This breach highlights a larger issue with &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;how companies manage data&lt;/a&gt; today. Many rely heavily on cloud platforms to store and organize customer information. These tools are efficient, but they also concentrate risk in one place.&lt;/p&gt;&lt;p&gt;A single misconfiguration or compromised login can open the door to millions of records.&lt;/p&gt;&lt;p&gt;As more businesses move to software-as-a-service (SaaS) platforms, attackers are following. The pattern is becoming more common, not less. &lt;/p&gt;&lt;p&gt;To see if your email was affected, visit &lt;i&gt;Have I Been Pwned at &lt;strong&gt;&lt;u&gt;haveibeenpwned.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;. It is the first and official source for this newly added dataset.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/insurance-data-breach-exposes-sensitive-info-1-6-million-people&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;INSURANCE DATA BREACH EXPOSES SENSITIVE INFO OF 1.6 MILLION PEOPLE&lt;/strong&gt; &lt;/a&gt;&lt;/p&gt;&lt;p&gt;If your data may be part of this breach, a few smart moves now can lower your risk and help you stay ahead of scams that often follow.&lt;/p&gt;&lt;p&gt;If you reuse passwords, this is the moment to change that. A single leaked password can unlock multiple accounts. Use a password manager to generate and store complex passwords so you are not relying on memory or repeating the same login. Start with your email account first, since it can be used to reset passwords across many of your other accounts. &lt;strong&gt;Check out the best expert-reviewed password managers of 2026 at CyberGuy.com.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Two-factor authentication (&lt;a href=&quot;https://www.foxnews.com/tech/what-two-factor-authentication-should-enable-it&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;&lt;u&gt;2FA&lt;/u&gt;&lt;/a&gt;) adds a second layer of protection. Even if someone gets your password, they still need a code from your phone or app. Focus on email, banking and travel accounts first since those are common targets after breaches.&lt;/p&gt;&lt;p&gt;Be extra cautious with emails or messages that reference past trips or support requests. That level of detail can make scams feel real. Avoid clicking links or downloading attachments unless you are certain of the source. When in doubt, go directly to the company&apos;s official website.&lt;/p&gt;&lt;p&gt;Check your bank accounts and &lt;a href=&quot;https://www.foxnews.com/category/finance&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;credit cards&lt;/a&gt; regularly for unusual charges. Look for login alerts or password reset notifications you did not request. The faster you catch something, the easier it is to contain.&lt;/p&gt;&lt;p&gt;Strong antivirus software does more than scan for viruses. It can block malicious links, detect suspicious downloads and stop phishing attempts before they reach you. Keeping your devices protected adds an important layer between you and attackers trying to exploit stolen data. &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at &lt;u&gt;CyberGuy.com&lt;/u&gt;.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/data-broker-blunder-more-than-600000-sensitive-files-exposed-data-services-leak&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Data brokers collect and sell&lt;/a&gt; your personal information, which increases your exposure after a breach. A data removal service can help reduce how much of your information is circulating online and make it harder for scammers to build detailed profiles about you. &lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Get a free scan to find out if your personal information is already out on the web: CyberGuy.com/FreeScan&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;An identity monitoring service can track your personal information across databases and alert you to suspicious activity. That includes new accounts opened in your name or signs that your data is being misused. &lt;strong&gt;See my tips and best picks on Best Identity Theft Protection at &lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;A credit freeze prevents anyone from opening new accounts in your name without your approval. It is one of the most effective ways to stop &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;identity theft&lt;/a&gt; after a breach. You can place a freeze for free with the major credit bureaus and lift it anytime when needed.&lt;/p&gt;&lt;p&gt;The Amtrak breach is still unfolding, and key details remain unclear. What is clear is the direction these attacks are heading. They are becoming more targeted, more personal and harder to spot. For consumers, that means staying alert even when something looks familiar. For companies, it means tightening controls around the systems that hold the most sensitive data. You do not need to panic, but you do need to pay attention.&lt;/p&gt;&lt;p&gt;With breaches like this happening again and again, are companies doing enough to protect your personal information? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/amtrak-passenger-30th-station-fox-news-001.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">fb590603-de74-5be3-9a23-0040a5800f35</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>  <category domain="foxnews.com/taxonomy">fox-news/us/personal-freedoms/privacy</category>  <category domain="foxnews.com/taxonomy">fox-news/travel</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Wed, 29 Apr 2026 13:00:49 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/waymo-teams-waze-spot-potholes-faster</link> <guid isPermaLink="true">https://www.foxnews.com/tech/waymo-teams-waze-spot-potholes-faster</guid> <title>Waymo teams up with Waze to spot potholes faster</title> <description>Waymo and Waze team up to detect potholes in real time using robotaxi sensors and driver reports, helping cities fix dangerous road damage more quickly.</description>   <content:encoded>&lt;p&gt;You know that moment. You are &lt;a href=&quot;https://www.foxbusiness.com/category/transportation&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;driving along,&lt;/a&gt; and everything feels smooth. Then all of a sudden, your car hits a pothole you never saw coming.&lt;/p&gt;&lt;p&gt;It is frustrating. It can also be expensive and dangerous. Repairs add up fast, and unexpected road damage can lead to crashes.&lt;/p&gt;&lt;p&gt;Now, Waymo and Waze are trying to tackle that problem &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/innovation&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;in a new way.&lt;/a&gt; Instead of waiting for people to report potholes after the fact, they want to detect them as they happen and help cities respond faster.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/researchers-create-revolutionary-ai-fabric-predicts-road-damage-before-happens&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;RESEARCHERS CREATE REVOLUTIONARY AI FABRIC THAT PREDICTS ROAD DAMAGE BEFORE IT HAPPENS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Waymo&apos;s robotaxis already spend hours on the road each day. While they drive, they constantly scan their surroundings &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/cameras&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;using cameras,&lt;/a&gt; sensors and onboard software. That same technology is now being used to identify potholes.&lt;/p&gt;&lt;p&gt;When a Waymo vehicle detects a road issue, that information is shared through Waze&apos;s &quot;Waze for Cities&quot; platform. Cities and transportation departments can access the data at no cost. At the same time, the information shows up in the Waze app so drivers can see alerts as they approach a problem area.&lt;/p&gt;&lt;p&gt;There is also a human layer built in. Waze users can confirm or flag potholes, which helps improve accuracy over time. That combination of machine detection and real-world feedback creates a more reliable picture of road conditions. &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/politics/state-and-local&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Most cities&lt;/a&gt; still rely on residents to report potholes through 311 systems or online forms. Crews then investigate and decide what to fix first. That process takes time and often leaves gaps. Some potholes go unreported. Others are reported too late. In many cases, cities end up reacting instead of getting ahead of the problem.&lt;/p&gt;&lt;p&gt;This new approach changes that. By using real-time data from vehicles already on the road, cities can see where issues are forming and respond more quickly. It also helps them spot patterns, which can improve how they plan repairs and allocate resources.&lt;/p&gt;&lt;p&gt;The partnership is still in its early phase, but it is already active in several major metro areas. The rollout includes the &lt;a href=&quot;https://www.foxnews.com/category/us/san-francisco&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;San Francisco Bay Area&lt;/a&gt; along with Los Angeles, Phoenix, Austin and Atlanta. These are places where Waymo already operates, which makes it easier to collect consistent data.&lt;/p&gt;&lt;p&gt;Even at this early stage, the system has already identified around 500 potholes across those cities. That gives you a sense of how much road damage can go unnoticed without constant monitoring.&lt;/p&gt;&lt;p&gt;Over time, the companies plan to expand into more regions, including areas where weather conditions make potholes more common.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/private-autonomous-pods-could-redefine-ride-sharing&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;PRIVATE AUTONOMOUS PODS COULD REDEFINE RIDE-SHARING&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Potholes may feel like a minor annoyance, but they have real consequences. They can &lt;a href=&quot;https://www.foxnews.com/category/auto&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;damage tires, affect alignment&lt;/a&gt; and lead to costly repairs. In some cases, they contribute to accidents, especially when drivers swerve to avoid them or hit them at high speeds.&lt;/p&gt;&lt;p&gt;There is also a fairness issue. Areas that rely on resident reports may see uneven maintenance. Some neighborhoods get quicker fixes while others wait longer simply because fewer reports come in.&lt;/p&gt;&lt;p&gt;By combining automated detection with user input, this system aims to close those gaps and give cities a more complete view of road conditions.&lt;/p&gt;&lt;p&gt;You may not think much about the technology behind road maintenance, but it directly affects your daily drive. If this approach expands, it could lead to fewer surprise potholes and quicker repairs on roads you use every day. It may also mean better alerts in navigation apps, which gives you more time to react and avoid damage.&lt;/p&gt;&lt;p&gt;There is also a long-term benefit. Better data can help cities maintain roads more efficiently, which can reduce wear and tear on your car and lower the risk of unexpected repairs. At a broader level, it shows how data collected for one purpose can improve something completely different. In this case, the same systems that &lt;a href=&quot;https://www.foxnews.com/tech/robotaxi-price-war-has-started-heres-everything-you-need-know&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;guide self-driving cars&lt;/a&gt; could make everyday driving safer for everyone.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/travel/air-taxis-cut-hour-long-commutes-minutes-riders-may-shocked-price&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;AIR TAXIS CUT HOUR-LONG COMMUTES TO MINUTES, RIDERS MAY BE SHOCKED BY THE PRICE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;This might sound like a small idea at first. But it points to something much bigger. For years, cities have been playing catch-up when it comes to road maintenance. They rely on slow reports and limited data, which means problems often get fixed late or missed entirely. Now, that could start to change. With Waymo cars constantly scanning the roads, cities can tap into a steady stream of real-world data without having to build a whole new system from scratch. If this pilot works, it could change how cities stay on top of road repairs. And it is another example of how private tech is starting to shape public infrastructure in ways most people never see. That can be a good thing. But it also raises a bigger question about where that line should be drawn.&lt;/p&gt;&lt;p&gt;Have potholes ever cost you money or damage, and do you think tech like this could actually make a difference? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/12/931/523/waymo-san-francisco.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">f27596fe-1bda-589c-b4c9-173c8a4d52dc</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/innovation</category>  <category domain="foxnews.com/taxonomy">fox-news/tech</category>  <category domain="foxnews.com/taxonomy">fox-news/auto</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Wed, 29 Apr 2026 08:45:42 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/runway-space-challenge-brings-spaceflight-closer</link> <guid isPermaLink="true">https://www.foxnews.com/tech/runway-space-challenge-brings-spaceflight-closer</guid> <title>Runway-to-Space Challenge brings spaceflight closer</title> <description>A new U.S. competition lets teams fly payloads on a reusable spaceplane, offering rapid access to microgravity and changing how space research works.</description>   <content:encoded>&lt;p&gt;For years, &lt;a href=&quot;https://www.foxnews.com/category/science/air-and-space/spaceflight&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;getting anything into space&lt;/a&gt; has been slow and expensive. You prepare for months, sometimes years, and you often get one shot to run your experiment. If something does not work, you wait again. That model is starting to change.&lt;/p&gt;&lt;p&gt;A new U.S. competition called the Runway-to-Space Spaceplane Challenge is opening the door to a different way of doing space research. Instead of relying on traditional rocket launches, teams will be able to fly payloads on a reusable spaceplane that takes off and lands on a runway. It sounds simple, but it could reshape how &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/innovation&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;innovation&lt;/a&gt; happens.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/space-capsule-marks-milestone-bringing-cargo-back-from-orbit&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;SPACE CAPSULE MARKS MILESTONE FOR BRINGING CARGO BACK FROM ORBIT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;The program is built around the Aurora spaceplane from Dawn Aerospace, operating out of the Infinity One &lt;a href=&quot;https://www.foxnews.com/category/us/us-regions/southwest/oklahoma&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Oklahoma&lt;/a&gt; Spaceport. This vehicle can reach the edge of space, traveling at speeds above Mach 3.5 and climbing to altitudes of about 62 miles. During each flight, payloads can experience a short window of microgravity that lasts just over two minutes.&lt;/p&gt;&lt;p&gt;On its own, that may sound similar to other suborbital missions. What makes this different is how often it can fly. The Aurora is designed for rapid turnaround, which means it can land, be prepared again and return to flight much faster than a traditional launch system. That shift removes one of the biggest bottlenecks in space research.&lt;/p&gt;&lt;p&gt;The Aurora spaceplane has already completed more than 60 missions, with a focus on making access to the edge of space more routine and scalable.&lt;/p&gt;&lt;p&gt;&quot;Meaningful access to microgravity typically means going to orbit, which is expensive, slow, and often out of reach for early-stage ideas,&quot; said Stefan Powell, CEO of Dawn Aerospace. &quot;Aurora changes that by giving teams a fast, lower-cost way to access microgravity and iterate within months. It&apos;s not a substitute for long-duration missions, but it enables experiments that would otherwise never leave the ground, turning ideas that might never have flown into viable missions that can ultimately progress to orbit.&quot;&lt;/p&gt;&lt;p&gt;That idea of faster iteration is what makes this program stand out. It gives researchers a way to test concepts, adjust them and return to flight without long delays.&lt;/p&gt;&lt;p&gt;Former NASA Administrator Jim Bridenstine also sees the bigger picture.&lt;/p&gt;&lt;p&gt;&quot;This competition is about capturing the imagination of scientists, engineers and researchers, while also enabling a new way of working, where research can move faster, iterate more frequently, and strengthen U.S. leadership in space-enabled science and industry.&quot;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/politics/us-general-warns-russia-may-developing-nuclear-anti-satellite-weapon-orbit&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;US GENERAL WARNS RUSSIA MAY BE DEVELOPING NUCLEAR ANTI-SATELLITE WEAPON IN ORBIT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Think about how commercial aviation works. Planes land, refuel and take off again in a matter of hours. That same rhythm is now being applied to space access. Instead of designing a perfect experiment for a single launch, researchers can test, adjust and fly again. That creates a more flexible process where ideas can evolve in real time.&lt;/p&gt;&lt;p&gt;This matters because many early-stage concepts never make it to space. The cost and complexity are simply too high. With a reusable system, smaller teams have a better chance to test bold ideas without waiting years between attempts. It does not replace &lt;a href=&quot;https://www.foxnews.com/tech/space-capsule-how-we-live-work-orbit-future&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;long missions in orbit&lt;/a&gt;, but it fills a gap that has existed for decades.&lt;/p&gt;&lt;p&gt;The challenge is being led by the Oklahoma Space Industry Development Authority, which is working to expand the state&apos;s role in the &lt;a href=&quot;https://www.foxnews.com/tech/china-vs-spacex-race-space-ai-data-centers&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;growing space economy&lt;/a&gt;. There is real investment behind that effort. The spaceport is undergoing major upgrades to support more advanced operations, including new infrastructure designed specifically for spaceplane missions.&lt;/p&gt;&lt;p&gt;Programs like this reflect a broader push to speed up space research and make it more responsive. When teams can test ideas more frequently, progress tends to follow. The timeline reflects that long view. Applications open in April 2026 and close in September, with flights expected to begin in 2027. That gives teams time to prepare payloads while the supporting infrastructure continues to expand.&lt;/p&gt;&lt;p&gt;If you are wondering who can actually take part, the program is structured to center on Oklahoma institutions while still allowing broader collaboration. Applications must be led by an Oklahoma-based university or research institution, though out-of-state partners can join as collaborators. The application window opens April 16, 2026, and closes Sept. 25, 2026, at 5 p.m. CT.&lt;/p&gt;&lt;p&gt;Selected teams will be able to fly payloads weighing up to 33 pounds. Each mission can reach altitudes of about 62 miles, exceed Mach 3.5 and provide up to 127 seconds of microgravity. Flights are expected to begin in mid- to late 2027, giving teams about a year to prepare.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/first-electric-passenger-plane-lands-jfk-milestone-flight&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;FIRST ELECTRIC PASSENGER PLANE LANDS AT JFK IN MILESTONE FLIGHT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Even if you are not working in aerospace, this shift could still affect you. When access to space becomes faster and more flexible, innovation tends to accelerate. Research that once took years can move forward in shorter cycles. That can influence everything from materials science to weather forecasting.&lt;/p&gt;&lt;p&gt;It also signals a broader change. Space is moving away from rare, high-stakes missions and toward a model that supports &lt;a href=&quot;https://www.foxnews.com/tech/space-startup-unveils-1-hour-orbital-delivery-system&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;routine experimentation&lt;/a&gt;. That usually leads to more competition and more rapid breakthroughs. Over time, those breakthroughs often show up in everyday technology, even if the connection is not always obvious.&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you&apos;ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Spaceflight has always pushed the limits of what is possible, but the process has remained slow for a long time. The Runway-to-Space Challenge points to a future where reaching the edge of space becomes more practical and repeatable. That alone could unlock ideas that have been sitting on the sidelines. If space starts to operate more like aviation, the pace of discovery could change in ways that ripple far beyond the aerospace industry.&lt;/p&gt;&lt;p&gt;If spaceflight becomes routine enough for constant testing, how quickly should we expect new technologies to move from experiments to everyday life? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;CyberGuy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/dawn-aerospace-spaceplane.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">d9321a8b-3a02-55b0-be7b-266e45a0f4f7</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/innovation</category>  <category domain="foxnews.com/taxonomy">fox-news/science/air-and-space</category>  <category domain="foxnews.com/taxonomy">fox-news/science/air-and-space/spaceflight</category>  <category domain="foxnews.com/taxonomy">fox-news/science/air-and-space/nasa</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Tue, 28 Apr 2026 16:00:50 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/ameriprise-data-breach-hits-48000-customers</link> <guid isPermaLink="true">https://www.foxnews.com/tech/ameriprise-data-breach-hits-48000-customers</guid> <title>Ameriprise data breach hits 48,000 customers</title> <description>Ameriprise Financial says a data breach exposed personal data of nearly 48,000 people. Learn what happened and the steps you should take to stay safe.</description>   <content:encoded>&lt;p&gt;If you have an account with Ameriprise Financial, this is one of those moments where it makes sense to slow down and pay close attention.&lt;/p&gt;&lt;p&gt;A &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;data breach&lt;/a&gt; disclosed last month exposed the personal information of nearly 48,000 people across the United States.&lt;/p&gt;&lt;p&gt;While the company says &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;no money was stolen,&lt;/a&gt; that does not mean there is no risk. In many cases, this is when the real problems begin.&lt;/p&gt;&lt;p&gt;Let&apos;s walk through what happened, what may be at stake and what you should do next.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/banking-tech-data-breach-exposes-672k-ransomware-attack&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;BANKING TECH DATA BREACH EXPOSES 672K IN RANSOMWARE ATTACK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The incident dates back to March 2, 2026. Ameriprise says it detected unauthorized access on March 18, about 16 days later, according to a filing with the Maine attorney general. In simple terms, someone gained access to stored company data and files. The company says it blocked that access once discovered and brought in outside cybersecurity experts to investigate.&lt;/p&gt;&lt;p&gt;Ameriprise also said there were no unauthorized transactions or movement of funds, and business operations continued without disruption. That may sound reassuring at first. However, breaches like this are rarely about immediate theft. Instead, the risk often shows up later.&lt;/p&gt;&lt;p&gt;The notification letters say the attacker accessed &quot;certain stored data and files&quot; that may include personal information. That can vary depending on the individual. In breaches like this, it often includes names, addresses and financial account details. In some cases, it may also involve &lt;a href=&quot;https://www.foxnews.com/category/politics/house-of-representatives/social-security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Social Security&lt;/a&gt; numbers or other identifiers.&lt;/p&gt;&lt;p&gt;At the same time, court filings tied to the case raised additional concerns. Two lawsuits alleged that a group known as &lt;a href=&quot;https://www.foxnews.com/tech/cargurus-breach-linked-shinyhunters-exposes-12-4m-records&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;&lt;u&gt;ShinyHunters&lt;/u&gt;&lt;/a&gt; claimed responsibility and threatened to release more than 200 gigabytes of internal data. Those lawsuits were later dropped without prejudice, which means they could be refiled. As a result, the legal side of this story may not be over.&lt;/p&gt;&lt;p&gt;&quot;This relates to a recent incident that involved unauthorized access to certain stored data and files. Importantly, there was no disruption to business operations,&quot; an Ameriprise Financial spokesperson told CyberGuy. &quot;We are taking appropriate actions, including notifying the limited number of individuals with personally identifiable information (PII) impacts and offering them credit and identity monitoring.&quot;&lt;/p&gt;&lt;p&gt;That response is standard after a breach. It can help you spot suspicious activity sooner, but it does not stop every type of fraud.&lt;/p&gt;&lt;p&gt;It is also worth noting that Ameriprise has reported multiple data security incidents over the past several years. That context may raise additional concerns for some customers.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/cargurus-breach-linked-shinyhunters-exposes-12-4m-records&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;CARGURUS BREACH LINKED TO SHINYHUNTERS EXPOSES 12.4M RECORDS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;This is the part many of us overlook. When you hear that no funds were moved, it is easy to assume everything is fine. In reality, &lt;a href=&quot;https://www.foxnews.com/tech/149-million-passwords-exposed-massive-credential-leak&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;stolen personal data often becomes&lt;/a&gt; valuable later.&lt;/p&gt;&lt;p&gt;That information can be used for &lt;a href=&quot;https://www.foxnews.com/tech/identity-theft-losses-surge-70-older-americans&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow&quot;&gt;&lt;u&gt;identity theft&lt;/u&gt;&lt;/a&gt; or account takeovers. It can also fuel highly convincing phishing scams. In some cases, it ends up tied to fraudulent loan or credit applications. So while nothing may happen right away, the exposure can create risk that lingers.&lt;/p&gt;&lt;p&gt;Breaches like this are becoming more common, even at large financial firms that invest heavily in security. However, that does not mean you are powerless. It does mean you should assume your data could be exposed at some point and take steps to protect yourself ahead of time. Being proactive now can help you avoid bigger problems down the road. So here are some steps that can help reduce your risk and give you more control.&lt;/p&gt;&lt;p&gt;Start with your email since it connects to almost every account you have. Use a strong password and turn on two-factor authentication (&lt;a href=&quot;https://www.foxnews.com/tech/what-two-factor-authentication-should-enable-it&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;&lt;u&gt;2FA)&lt;/u&gt;&lt;/a&gt; to lock it down.&lt;/p&gt;&lt;p&gt;Check your bank and &lt;a href=&quot;https://www.foxnews.com/category/us/economy/investment&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;investment&lt;/a&gt; accounts regularly. Look for unfamiliar transactions, even small ones, since fraud often starts quietly.&lt;/p&gt;&lt;p&gt;Placing a credit freeze with the major bureaus can make it much harder for someone to open new accounts in your name. &lt;/p&gt;&lt;p&gt;If you reuse passwords, now is the time to change that habit. A password manager can help you create and store secure logins. &lt;strong&gt;Check out the best expert-reviewed password managers of 2026 at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/scams-arent-illegal-but-should-be&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;SCAMS THAT AREN&apos;T ILLEGAL (BUT SHOULD BE)&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Add two-factor authentication (&lt;a href=&quot;https://www.foxnews.com/tech/what-two-factor-authentication-should-enable-it&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;&lt;u&gt;2FA&lt;/u&gt;&lt;/a&gt;) wherever possible, especially for financial accounts and any service tied to your identity.&lt;/p&gt;&lt;p&gt;Consider using a personal data removal service to reduce the amount of your information that is publicly available. This can limit targeted scams that rely on detailed personal profiles. &lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting&lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt; Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;After breaches, &lt;a href=&quot;https://www.foxnews.com/tech/beware-fake-credit-card-account-restriction-scams&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;phishing attempts tend to increase&lt;/a&gt;. Messages may look legitimate, so take a moment to verify before clicking links or sharing information. Using strong antivirus software can also help detect malicious links or downloads before they cause harm. &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Identity theft services can alert you to suspicious activity tied to your personal data. They are not perfect, but they can help you respond faster. They can also monitor dark web marketplaces where stolen information is often traded. &lt;strong&gt;See my tips and best picks on Best Identity Theft Protection at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;The Ameriprise breach is a reminder that even trusted financial institutions can become targets. The company says no money was taken, and that matters. Still, the exposure of personal data can carry long-term risk. While this story may fade from headlines, the impact can last much longer for those affected. Paying attention now can save you from dealing with fraud later.&lt;/p&gt;&lt;p&gt;If your financial firm told you your data was exposed, but your money was safe, would you feel reassured or more concerned? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/01/931/523/couple-identity-theft-victims.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">774c876e-eb64-509b-b8c4-518c2d44ce61</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>  <category domain="foxnews.com/taxonomy">fox-news/finance</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Tue, 28 Apr 2026 10:51:05 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/fake-ssa-email-alert-spot-scam-fast</link> <guid isPermaLink="true">https://www.foxnews.com/tech/fake-ssa-email-alert-spot-scam-fast</guid> <title>Fake SSA email alert: Spot this scam fast</title> <description>A dangerous phishing email disguised as a Social Security Administration notice tricks users into downloading malware. Here is how to spot the scam.</description>   <content:encoded>&lt;p&gt;The &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/email&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;email looks polished.&lt;/a&gt; It uses official logos, formal language and a serious warning about your account. That&apos;s exactly what makes it so dangerous. It&apos;s the kind of message many of us would open without a second thought, especially when it mentions security and a government agency. Candace T did pause. She took a closer look and trusted her gut before clicking anything. She wrote to us with three important words:&lt;/p&gt;&lt;p&gt;She&apos;s right. This email tries hard to look like it came from the &lt;a href=&quot;https://www.foxnews.com/category/politics/house-of-representatives/social-security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Social Security Administration,&lt;/a&gt; complete with official branding and a serious tone. But once you slow down, the warning signs start to show. Let&apos;s break it down so you know exactly what to watch for.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Plus, you&apos;ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/ssa-impersonation-scams-getting-more-personal&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;SSA IMPERSONATION SCAMS ARE GETTING MORE PERSONAL&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The message says there is a &quot;Security Notice to Active Your Information&quot; tied to a case number. It urges you to download a security update by a specific date to keep your account safe. There&apos;s a big &quot;Download now&quot; button front and center. That&apos;s the hook. This is a &lt;a href=&quot;https://www.foxnews.com/tech/dont-fall-bank-phishing-scam-trick&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;classic phishing setup&lt;/a&gt; designed to get you to click before you think.&lt;/p&gt;&lt;p&gt;Here are the warning signs that show this email is not what it claims to be.&lt;/p&gt;&lt;p&gt;The email comes from a random address that has nothing to do with the Social Security Administration. Official emails from government agencies come from .gov domains. This one does not.&lt;/p&gt;&lt;p&gt;The subject line says &quot;Security Notice to Active Your Information.&quot; It should say &quot;activate,&quot; not &quot;active.&quot; Small errors like this are often a giveaway that something is not right and can signal a scam email.&lt;/p&gt;&lt;p&gt;The email warns, &quot;You are required to download your updated statement by April 14, 2026.&quot; It pushes you to act quickly with a firm deadline. Scammers rely on that pressure, so you do not take the time to verify. Real government notices rarely demand immediate action through email.&lt;/p&gt;&lt;p&gt;The email urges you to click a &quot;Download Now&quot; button to get your &quot;updated statement.&quot; This is a huge warning sign. The message is trying to get you to download and install a file which could contain &lt;a href=&quot;https://www.foxnews.com/tech/new-email-scam-uses-hidden-characters-slip-past-filters&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;malware that gives attackers access&lt;/a&gt; to your device or personal data.&lt;/p&gt;&lt;p&gt;The Social Security logo and layout are designed to build trust. Scammers copy these elements to make emails look legitimate. The message even includes a line that says, &quot;This email was sent to you by the Social Security Administration and was produced and distributed at the expense of U.S. taxpayers.&quot; That kind of official-sounding language is meant to reassure you, but it does not mean the email is real.&lt;/p&gt;&lt;p&gt;The Social Security Administration has made this clear: They do not ask for sensitive information or send &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/software&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;software&lt;/a&gt; downloads through email. That alone tells you this message is not legitimate.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/social-security-administration-phishing-scam-targets-retirees&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;SOCIAL SECURITY ADMINISTRATION PHISHING SCAM TARGETS RETIREES&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;If you click the &quot;Download now&quot; button, a few things could happen:&lt;/p&gt;&lt;p&gt;In many cases, you won&apos;t even realize it happened until later.&lt;/p&gt;&lt;p&gt;These emails work because they mix fear with familiarity. People trust names like Social Security. They worry about their accounts. That combination makes it easier to trick someone into clicking. The design looks polished. The message feels urgent. The goal is simple: get you to act before you think. &lt;/p&gt;&lt;p&gt;These simple steps can help you avoid falling for this type of phishing email.&lt;/p&gt;&lt;p&gt; &lt;strong&gt;1) Pause before you act&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;If an email asks you to download something or act fast, stop and take a breath. &lt;a href=&quot;https://www.foxnews.com/tech/how-tell-login-alert-real-scam&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Urgency is one of&lt;/a&gt; the biggest scam tactics.&lt;/p&gt;&lt;p&gt;Look closely at the email domain. &lt;a href=&quot;https://www.foxnews.com/category/us/economy/public-sector&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Government agencies&lt;/a&gt; use .gov addresses. Anything else is a red flag. &lt;/p&gt;&lt;p&gt;If the email claims to be from a government agency, contact that agency through its official website or phone number to confirm. &lt;/p&gt;&lt;p&gt;Do not click links or &lt;a href=&quot;https://www.foxnews.com/tech/docusign-email-scam-targets-healthcare-workers&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;download attachments from unexpected emails&lt;/a&gt;. Instead, go directly to the official website by typing the address yourself.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/aware-extortion-scam-emails-claiming-your-data-stolen&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;BE AWARE OF EXTORTION SCAM EMAILS CLAIMING YOUR DATA IS STOLEN&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Install strong antivirus software and keep it updated. It can help block malicious downloads and warn you before you open something dangerous. &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp;amp; iOS devices at &lt;/strong&gt;&lt;a href=&quot;http://Cyberguy.com&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Consider using a data removal service to reduce how much of your personal information is exposed online. Less data available means less for scammers to exploit. &lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;/strong&gt;&lt;a href=&quot;http://Cyberguy.com&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Make sure your phone and computer have the latest updates. &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/hackers&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Security patches&lt;/a&gt; fix vulnerabilities that scammers often target.&lt;/p&gt;&lt;p&gt;Enable alerts for important accounts so you can spot unusual activity quickly if something goes wrong.&lt;/p&gt;&lt;p&gt;Forward scam emails to the Social Security Administration&apos;s Office of Inspector General at &lt;strong&gt;oig.ssa.gov/report&lt;/strong&gt; or report them through the SSA fraud hotline. You can also mark the message as spam in your inbox. Reporting scams helps protect others and can assist investigators in stopping these attacks.&lt;/p&gt;&lt;p&gt;Candace trusted her instincts and flagged this email right away. That quick pause likely saved her from a bigger problem. Scammers are getting better at making messages look real. But the red flags are still there if you know where to look.&lt;/p&gt;&lt;p&gt;If a message looks real and feels urgent, would you pause or click first?  Let us know by writing to us at &lt;a href=&quot;http://Cyberguy.com&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 &lt;a href=&quot;http://CyberGuy.com&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;CyberGuy.com&lt;/a&gt;.  All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/12/931/523/email-scam-photo-3.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">f99a6c28-d0bf-5649-812b-c968707e5a0a</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/email</category>  <category domain="foxnews.com/taxonomy">fox-news/politics/house-of-representatives/social-security</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>  <category domain="foxnews.com/taxonomy">fox-news/us/personal-freedoms/privacy</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Mon, 27 Apr 2026 13:02:21 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/maryland-moves-ban-surveillance-pricing-grocery-stores</link> <guid isPermaLink="true">https://www.foxnews.com/tech/maryland-moves-ban-surveillance-pricing-grocery-stores</guid> <title>Maryland moves to ban surveillance pricing in grocery stores</title> <description>Maryland will become the first U.S. state to ban surveillance pricing at grocery stores, with the new law set to take effect on October 1, 2026.</description>   <content:encoded>&lt;p&gt;You grab a box of cereal off the shelf. Your neighbor grabs the exact same box at the exact same store on the exact same day. She pays less. You pay more. Why? Because the &lt;a href=&quot;https://www.foxnews.com/category/politics/regulation/consumers&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;store&apos;s algorithm&lt;/a&gt; decided you would.&lt;/p&gt;&lt;p&gt;That scenario sounds like a conspiracy theory. It isn&apos;t. Retailers have been quietly using this kind of pricing for years, and now one state has finally had enough.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/us/us-regions/northeast/maryland&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Maryland&lt;/a&gt; is set to become the first U.S. state to ban surveillance pricing in retail grocery stores and certain grocery delivery platforms. Governor Wes Moore has said he will sign the Protection from Predatory Pricing Act into law after the state legislature passed it, and the rule will take effect on October 1, 2026.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-hackers-can-learn-about-you-from-data-broker-file&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT HACKERS CAN LEARN ABOUT YOU FROM A DATA BROKER FILE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Surveillance pricing goes by a few names: dynamic pricing and personalized pricing are the common ones, but the concept is the same regardless of what you call it.&lt;/p&gt;&lt;p&gt;A store &lt;a href=&quot;https://www.foxnews.com/tech/stop-data-brokers-from-selling-your-information-online&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;collects data on you&lt;/a&gt; as an individual shopper. It looks at how often you browse certain products, what neighborhood you live in and whether a competitor is nearby, what your income and family size appear to be, and your dietary habits. Then it uses all of that to decide how much you specifically are willing to pay and charges you accordingly.&lt;/p&gt;&lt;p&gt;One Kroger shopper in Oregon decided to find out exactly what her grocery store knew about her. She submitted a data request under a state privacy law and received a 62-page profile in return. Most of the inferences in that profile were wrong. That&apos;s the part that should make your stomach drop. Retailers are charging people based on guesses, and those guesses are frequently inaccurate. &lt;/p&gt;&lt;p&gt;The timing here matters. Maryland didn&apos;t pass this bill in a vacuum. Major retailers, including Walmart, have been rolling out &lt;a href=&quot;https://www.foxnews.com/tech/retail-prices-can-jump-seconds-high-tech-store-price-tags&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;&lt;u&gt;digital price tags &lt;/u&gt;&lt;/a&gt;on store shelves. Unlike paper tags, these electronic displays can update instantly. Pair that capability with predictive pricing software, and a store can change what you&apos;re charged in real-time based on whatever the algorithm decides at that moment.&lt;/p&gt;&lt;p&gt;Governor Moore pointed to the financial pressure already squeezing working families and argued that new technology should not become another tool for squeezing them harder. &lt;a href=&quot;https://www.foxnews.com/category/newsedge/consumer&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Consumer Reports&lt;/a&gt; actively lobbied for the bill, which speaks to how significant the consumer protection concern really is. Still, the organization was honest about the result: the final version of the law falls short of what advocates originally wanted.&lt;/p&gt;&lt;p&gt;The Protection from Predatory Pricing Act sets some clear ground rules for large grocery retailers. Stores must keep their prices fixed for at least one full business day. That eliminates the possibility of prices spiking by the hour based on demand signals or individual shopper data.&lt;/p&gt;&lt;p&gt;Retailers are also prohibited from using surveillance data, &lt;a href=&quot;https://www.foxnews.com/tech/data-brokers-accused-hiding-opt-out-pages-from-google&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;shopping history, ethnicity or income&lt;/a&gt; to set different prices for different customers at the same time.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/us/economy/consumerism&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Loyalty programs&lt;/a&gt; and promotional offers are still allowed. That exemption was a concession to the retail industry, and it&apos;s one of the places where critics say the law starts to lose its teeth.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/retail-prices-can-jump-seconds-high-tech-store-price-tags&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;RETAIL PRICES CAN JUMP IN SECONDS WITH HIGH-TECH STORE PRICE TAGS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Maryland may have moved first, but it won&apos;t be alone for long. &lt;a href=&quot;https://www.foxnews.com/category/us/us-regions/west/california&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;California&lt;/a&gt;, Colorado, Illinois, New Jersey and other states are exploring similar legislation, while New York has already enacted a related pricing transparency law.&lt;/p&gt;&lt;p&gt;What happens next in those states will be telling. Advocates are hoping they avoid the exemptions that weakened Maryland&apos;s version. Each new bill is an opportunity to close the loopholes the retail industry has worked hard to create.&lt;/p&gt;&lt;p&gt;Consumers have been subject to dynamic &lt;a href=&quot;https://www.foxnews.com/category/travel/general/airlines&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;pricing in airlines,&lt;/a&gt; rideshares and e-commerce platforms for years. Grocery stores represent something different, a daily necessity where price manipulation hits people with the least financial flexibility the hardest.&lt;/p&gt;&lt;p&gt;No matter where you live, this law matters to your wallet. If you shop in Maryland, the change is immediate. Starting October 1, 2026, you have a legal right to the same shelf price as every other shopper who walks in that day, regardless of what data the store has collected on you. If you shop anywhere else in the country, pay attention because your state may not be far behind. California, Colorado, Illinois, New Jersey and other states are exploring similar legislation, while New York has already taken steps toward pricing transparency. The momentum is real, and Maryland just handed those states a working template to build from.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/10-things-stop-paying-save-money-now&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;10 THINGS TO STOP PAYING FOR TO SAVE MONEY NOW&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;That said, wherever you shop right now, the exemptions in Maryland&apos;s law are worth understanding. The Maryland Retail Alliance pushed hard against this bill and successfully carved out several exceptions during the legislative process. Consumer Reports flagged one irony in particular: loyalty program prices are exempt, which means stores could shift pricing in ways that favor members and potentially disadvantage non-members, effectively punishing non-members rather than rewarding members.&lt;/p&gt;&lt;p&gt;The enforcement side is also limited in ways that should concern any consumer. If a retailer violates the law, you cannot sue them yourself under these specific provisions of the law. Only the Maryland &lt;a href=&quot;https://www.foxnews.com/category/politics/attorney-general&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Attorney General&lt;/a&gt; has that authority. And before the AG can take action, the retailer gets a written notice and a 45-day window to correct the violation with no legal consequences. First-time violators face fines of up to $10,000. Repeat offenders face up to $25,000 in fines.&lt;/p&gt;&lt;p&gt;For a major grocery chain generating hundreds of millions in revenue, those fines barely register.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my quiz here: &lt;i&gt;&lt;strong&gt;CyberGuy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Maryland&apos;s law is imperfect, and advocates said so publicly. But an imperfect first law still moves the needle. It establishes that surveillance pricing in grocery stores is a problem worth legislating, gives other states a legal framework to improve on, and puts retailers on notice that the &lt;a href=&quot;https://www.foxnews.com/category/us/economy/regulation&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;political appetite for regulation&lt;/a&gt; is growing. The bill&apos;s weaknesses are actually useful in that way. They show exactly where the next round of advocacy needs to focus: stronger enforcement, consumer standing to sue, and tighter language around loyalty pricing exemptions. And if you live outside Maryland? Watch what your own state legislators do next. The grocery industry will lobby hard to add the same loopholes everywhere. Knowing what those loopholes look like is half the battle. Change tends to start in one place before it spreads. Maryland went first. Your state could be next.&lt;/p&gt;&lt;p&gt;If a retailer already holds a 62-page profile on you and most of what&apos;s in it is wrong, do you trust that the same technology is setting your prices fairly, and would you even know if it wasn&apos;t? Let us know your thoughts by writing to us at &lt;i&gt;&lt;strong&gt;CyberGuy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/maryland-surveillance-pricing-law.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">a3863d02-14fe-5736-8b8d-a7fbb3a02389</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/us/us-regions/northeast/maryland</category>  <category domain="foxnews.com/taxonomy">fox-news/politics/state-and-local/governors</category>  <category domain="foxnews.com/taxonomy">fox-news/politics/regulation/consumers</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Mon, 27 Apr 2026 07:13:46 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/hospice-fraud-uses-stolen-identities-fake-patients</link> <guid isPermaLink="true">https://www.foxnews.com/tech/hospice-fraud-uses-stolen-identities-fake-patients</guid> <title>Hospice fraud uses stolen identities for fake patients</title> <description>A $267 million Medi-Cal hospice fraud ring allegedly used stolen personal data from the dark web to bill California for end-of-life care never given.</description>   <content:encoded>&lt;p&gt;Earlier this month, the &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/us/us-regions/west/california&quot;&gt;California&lt;/a&gt; Attorney General&apos;s office filed charges against 21 people tied to a $267 million Medi-Cal hospice fraud ring.&lt;/p&gt;&lt;p&gt;The case, dubbed Operation Skip Trace, accuses the defendants of buying &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/tech/5-myths-about-identity-theft-put-your-data-risk&quot;&gt;stolen personal information on the dark web&lt;/a&gt;, enrolling those identities in Medi-Cal through Covered California, and running 14 shell hospice companies that billed the state for end-of-life care that was never provided.&lt;/p&gt;&lt;p&gt;The patients were not dying. In many cases, they did not even live in California. They were names and Social Security numbers pulled from data breaches and turned into billing line items.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/us/la-medicare-fraud-doctor-provider-number-billing-probe&quot;&gt;&lt;strong&gt;DOCTOR DENIES KNOWING ABOUT RAMPANT LA-AREA MEDICARE FRAUD USING HIS PROVIDER NUMBER&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Scammers pay people to put hospice companies in their names, even though they do not run them. This hides the real operators and gives the group a licensed business it can use to submit bills. Behind the scenes, others buy stolen personal information from &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot;&gt;dark web marketplaces&lt;/a&gt;. This includes names, dates of birth, Social Security numbers and addresses.&lt;/p&gt;&lt;p&gt;They then use that information to enroll people in Medi-Cal through Covered California and list them as terminally ill hospice patients. Next, the companies submit claims for visits, prescriptions and daily care tied to those names. They never provide any services. Because hospice care pays a flat daily rate, the billing continues as long as the identity stays active.&lt;/p&gt;&lt;p&gt;Operation Skip Trace is the latest in a string of hospice fraud cases that federal and state officials have been tracking for years. The typical hospice in &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/us/los-angeles&quot;&gt;Los Angeles County&lt;/a&gt; bills Medicare roughly $29,000 per patient, more than double the national average. Of the roughly 1,800 hospices operating in LA County, more than 700 have triggered multiple fraud red flags, according to state auditors.&lt;/p&gt;&lt;p&gt;On March 23, 2026, the U.S. House Committee on Oversight and Government Reform sent a letter to California Governor &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/person/gavin-newsom&quot;&gt;Gavin Newsom&lt;/a&gt; requesting documents on the state&apos;s oversight of federally funded hospice programs. Committee members cited a &quot;well-documented history of fraud,&quot; including agencies enrolling beneficiaries without their knowledge and overbilling Medicare.&lt;/p&gt;&lt;p&gt;The Centers for Medicare &amp;amp; Medicaid Services estimates that Los Angeles County alone accounts for roughly $3.5 billion in hospice fraud. Newsom&apos;s office said California has revoked more than 280 hospice licenses, maintained a moratorium on new providers and has hundreds more operators under investigation.&lt;/p&gt;&lt;p&gt;&lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/tech/google-search-led-costly-scam-call&quot;&gt;&lt;strong&gt;GOOGLE SEARCH LED TO A COSTLY SCAM CALL&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Most &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot;&gt;identity theft&lt;/a&gt; stories focus on credit cards, tax returns or new loans. Those usually show up on your credit report. Hospice fraud works differently. Scammers can use your information inside a Medicare or Medi-Cal billing system without triggering a credit alert or hard inquiry. That means it can go unnoticed.&lt;/p&gt;&lt;p&gt;Watch for warning signs like Medicare Summary Notices listing services you never received, Medi-Cal enrollment letters in your name or explanation-of-benefits statements from providers you have never visited.&lt;/p&gt;&lt;p&gt;If you apply for coverage later, you could face a denial because records show you are already enrolled in another state. If your &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/tech/hospital-cyberattacks-threaten-patient-safety&quot;&gt;data was exposed in a breach&lt;/a&gt;, it may already be circulating on the dark web.&lt;/p&gt;&lt;p&gt;The Centers for Medicare &amp;amp; Medicaid Services recommends reviewing your Medicare Summary Notice each quarter through MyMedicare.gov. If you are enrolled in Medi-Cal, check your Covered California account for unexpected activity and report anything suspicious to the California Department of Health Care Services through its Stop Medi-Cal Fraud line.&lt;/p&gt;&lt;p&gt;Suspected Medicare fraud can be reported to 1-800-MEDICARE or directly to the HHS Office of Inspector General at oig.hhs.gov/fraud. The Senior Medicare Patrol offers free help reviewing statements and filing reports in every state. If you notice unfamiliar charges or enrollment activity, place a fraud alert with Equifax, Experian and TransUnion. Medical identity theft often overlaps with other types of fraud.&lt;/p&gt;&lt;p&gt;Hospice fraud schemes like Operation Skip Trace often begin long before billing ever happens. The personal data used is typically traded on dark web marketplaces after large data breaches. Services like Aura monitor these marketplaces and data broker listings for exposed personal information, including Social Security numbers, driver&apos;s licenses, and email addresses. They also track public record changes, such as address updates that may signal fraudulent enrollment, and monitor credit files across &lt;span suggestionid=&quot;5b6f8698-0d81-4038-9800-486d923a473a&quot; highlighted=&quot;false&quot; suggestiontype=&quot;_STYLE&quot; isinsertion=&quot;false&quot; class=&quot;_suggestionUnderline_ry3km_1229 _editorialSuggestion_ry3km_1238&quot; data-suggestion-id=&quot;5b6f8698-0d81-4038-9800-486d923a473a&quot; data-is-insertion=&quot;false&quot; data-suggestion-type=&quot;_STYLE&quot; data-highlighted=&quot;false&quot; contenteditable=&quot;false&quot;&gt;Equifax, Experian, and TransUnion&lt;/span&gt;.&lt;/p&gt;&lt;p&gt;If suspicious activity is detected, users receive support from fraud resolution specialists who help contact agencies, prepare documentation, and dispute unauthorized accounts. Plans may also include identity theft insurance for eligible recovery costs.&lt;/p&gt;&lt;p&gt;No service can prevent every misuse of a stolen identity. But when fraud happens inside systems you rarely check, like Medicare or Medi-Cal, early alerts can make a critical difference.&lt;/p&gt;&lt;p&gt;Credit monitoring services track activity across the major credit bureaus and alert you when something changes. That gives you a chance to act quickly by freezing your credit, disputing unfamiliar accounts or contacting the lender.&lt;/p&gt;&lt;p&gt;Many services monitor your credit across Equifax, Experian and TransUnion and send alerts soon after activity is reported, so you are not waiting for a daily update to spot a problem.&lt;/p&gt;&lt;p&gt;Some tools also let you lock your credit file with a single tap, which can help stop new applications before they are approved.&lt;/p&gt;&lt;p&gt;Beyond credit reports, certain services monitor other personal data that may be exposed in breaches or sold online. That can include email addresses, phone numbers, driver&apos;s license details and even medical IDs, all of which can be used in identity theft schemes.&lt;/p&gt;&lt;p&gt;While no service can prevent every type of fraud, having real-time alerts and broader monitoring can help you catch suspicious activity earlier and limit the damage.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;See my tips and best picks on Best Identity Theft Protection at &lt;/strong&gt;CyberGuy.com&lt;/p&gt;&lt;p&gt;This case shows how identity theft is evolving. It is no longer just about draining bank accounts or opening credit cards. Scammers are now turning people into invisible patients inside systems most of us never check. That shift makes this fraud harder to detect and slower to stop. The best defense is to know where your information can appear and to check systems you would not normally review.&lt;/p&gt;&lt;p&gt;If someone could use your identity for months without you knowing, would you ever catch it before the damage is done?  Let us know by writing to us at &lt;strong&gt;&lt;em&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/10/931/523/3-hackers-leak-childrens-data-in-major-nursery-breach-outro.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">58ef77f6-e306-591f-8921-83f7f004d8ed</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/health/health-care</category>  <category domain="foxnews.com/taxonomy">fox-news/person/gavin-newsom</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>  <category domain="foxnews.com/taxonomy">fox-news/politics/minnesota-fraud-exposed</category>  <category domain="foxnews.com/taxonomy">fox-news/us/us-regions/west/california</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Sun, 26 Apr 2026 12:02:55 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/could-get-paid-googles-android-data-lawsuit</link> <guid isPermaLink="true">https://www.foxnews.com/tech/could-get-paid-googles-android-data-lawsuit</guid> <title>You could get paid from Google’s Android data lawsuit</title> <description>A $135 million settlement claims Google&amp;apos;s Android system allegedly transferred cellular data in the background without users knowing or consenting.</description>   <content:encoded>&lt;p&gt;If you use an Android phone, there is a good chance this case affects you. &lt;a href=&quot;https://www.foxnews.com/category/tech/companies/google&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Google has agreed&lt;/a&gt; to a $135 million settlement over claims that its &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/android&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Android system&lt;/a&gt; used people&apos;s cellular data without permission. The part that caught our attention is when it allegedly happened.&lt;/p&gt;&lt;p&gt;According to the lawsuit, these data transfers could take place in the background, even when your phone was not in use. Most people assume that if their screen is off, nothing is happening. That isn&apos;t always the case.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/hackers-abuse-google-cloud-send-trusted-phishing-emails&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;At the center of this case is how Android handled background activity. The lawsuit claims Android devices were sending information back to Google servers without clear &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;user consent&lt;/a&gt;. This reportedly happened over &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/cellular&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;cellular networks,&lt;/a&gt; which means it may have used data you were paying for.&lt;/p&gt;&lt;p&gt;That detail matters. If something runs over Wi Fi, most people do not think twice about it. Cellular data is different. It is limited for many users and often tied to monthly costs.&lt;/p&gt;&lt;p&gt;The plaintiffs argue that Google could have restricted these transfers to Wi Fi. Instead, they say the system used cellular connections, which shifted the cost to users. Google has denied wrongdoing but agreed to settle the case.&lt;/p&gt;&lt;p&gt;&quot;We are pleased to resolve this case, which mischaracterized standard industry practices that keep Android safe. We&apos;re providing additional disclosures to give people more information about how our services work,&quot; José Castañeda, a Google spokesperson, told CyberGuy.&lt;/p&gt;&lt;p&gt;This case covers a huge number of people. If you used an Android device on a cellular network at any point after November 12, 2017, there is a good chance you are part of the group. The only major exception is if you are already included in a similar case called Csupo v. Google LLC. Estimates suggest around 100 million users could qualify. That makes this one of the larger consumer tech settlements tied to everyday phone use.&lt;/p&gt;&lt;p&gt;Before you start planning how to spend it, this is likely to be a modest payment. The settlement fund is $135 million. When that is divided across millions of people, the amount per person will depend on how many claims are filed. In most cases like this, payments tend to be small. Think of it as getting reimbursed for something you did not realize was costing you.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/allstate-sued-secretly-tracking-selling-45-million-americans-location-data&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;ALLSTATE SUED FOR ALLEGEDLY TRACKING AND SELLING 45M AMERICANS&apos; LOCATION DATA&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The process is already underway, but it is simpler than most people expect. In many cases, you do not need to file a full claim form to be included. If you qualify, you are already part of the settlement unless you choose to opt out.&lt;/p&gt;&lt;p&gt;That said, there are a few steps worth taking to make sure you actually get paid.&lt;/p&gt;&lt;p&gt;There are a couple of important dates to keep in mind. The deadline to opt out or object to the settlement is May 29, 2026. The final approval hearing is scheduled for June 23, 2026. If the court approves the deal, payments will follow after that process wraps up.&lt;/p&gt;&lt;p&gt;This case taps into something bigger than one payout. Smartphones are designed to stay connected at all times. That includes background activity that most people never see. While that constant connection powers useful features, it also creates gray areas around consent and cost.&lt;/p&gt;&lt;p&gt;Situations like this raise a simple question. How much do you really know about what your phone is doing behind the scenes? It also puts pressure on companies to be clearer about how data is used and when it is being transmitted.&lt;/p&gt;&lt;p&gt;We reached out to Google for comment, but did not hear back before our deadline. &lt;/p&gt;&lt;p&gt;Even if the payout ends up being small, the takeaway here matters more than the money. Your phone may be using data in ways you do not notice. That includes apps you rarely open and system services running in the background. Taking a few minutes to check your settings can give you more control.&lt;/p&gt;&lt;p&gt;&lt;i&gt;(Settings may vary depending on device manufacturer)&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Samsung/Android: Go to &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;Connections&lt;/strong&gt; &amp;gt; &lt;strong&gt;Data usage&lt;/strong&gt; &amp;gt; &lt;strong&gt;Mobile data usage &lt;/strong&gt;&amp;gt;  then tap &lt;strong&gt;an app&lt;/strong&gt; to see its data use and background activity.&lt;/p&gt;&lt;p&gt;(Settings may vary depending on device manufacturer)&lt;/p&gt;&lt;p&gt;Samsung/Android: Go to &lt;strong&gt;Settings &amp;gt; Connections &amp;gt; Data usage &amp;gt; Mobile data usage &amp;gt; &lt;/strong&gt;tap an &lt;strong&gt;app&lt;/strong&gt; &amp;gt; toggle &lt;strong&gt;Allow background data usage&lt;/strong&gt; off&lt;/p&gt;&lt;p&gt;This stops the app from using cellular data when you are not actively using it.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Reduce data use for updates and backups&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;(Settings may vary depending on device manufacturer)&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Go to &lt;strong&gt;Settings &amp;gt; Software update &amp;gt; Auto download &amp;gt; Using Wi-Fi only&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;For apps, open the &lt;strong&gt;Google Play Store&lt;/strong&gt; &amp;gt; tap your &lt;strong&gt;profile&lt;/strong&gt; &amp;gt; &lt;strong&gt;Settings &amp;gt; Network preferences &amp;gt; App download preference&lt;/strong&gt; &amp;gt; choose &lt;strong&gt;Over Wi-Fi only &amp;gt; OK&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;These small changes can help you avoid using cellular data without realizing it and give you more visibility into what your phone is doing behind the scenes.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my quiz here: CyberGuy.com&lt;/p&gt;&lt;p&gt;This case is a reminder that the devices we rely on every day are doing more than we see. Most of the time, that works in your favor. Sometimes, it raises questions about transparency and control. Google chose to settle without admitting fault. That leaves room for debate about what really happened. It also highlights how quickly technology can outpace what users expect or understand. As phones become even more connected, these kinds of cases will likely keep coming.&lt;/p&gt;&lt;p&gt;Should companies like Google be allowed to use your cellular data in the background without clear permission, even if it powers features you rely on every day? Let us know your thoughts by writing to us at CyberGuy.com&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/tech-giants-anti-scam-accord-2.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">c87ac3c9-8a69-5504-a980-2536dafc9315</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/smartphones</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/android</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/companies/google</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/cellular</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Sun, 26 Apr 2026 11:13:31 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/scammers-build-profile-using-data-brokers</link> <guid isPermaLink="true">https://www.foxnews.com/tech/scammers-build-profile-using-data-brokers</guid> <title>How scammers build a profile on you using data brokers</title> <description>Your personal information is on data broker sites for anyone to find. Learn how scammers exploit this data and how to remove yourself from these databases.</description>   <content:encoded>&lt;p&gt;Go to any &lt;a href=&quot;https://www.foxnews.com/tech/one-thing-scammers-check-targeting-online&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;people finder site&lt;/a&gt; right now and type in your name. What comes back might shock you: your age, home address, phone number, the names of your relatives, where you used to live and even what your property is worth.&lt;/p&gt;&lt;p&gt;You didn&apos;t put that there, and you never consented to it. Still, it&apos;s out there, and anyone with an internet connection can see it.&lt;/p&gt;&lt;p&gt;Scammers figured this out a long time ago. Since then, they&apos;ve &lt;a href=&quot;https://www.foxnews.com/tech/inside-scammers-day-how-target-you&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;turned it into a system&lt;/a&gt; for targeting you, your parents and your kids.&lt;/p&gt;&lt;p&gt;So how does it actually work, and more importantly, what can you do to stop it?&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/how-remove-your-personal-info-from-people-search-sites&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE SEARCH SITES&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Before a criminal sends a phishing email or makes a call, they do their homework. Importantly, they don&apos;t need to hack anything. Instead, they use the same public websites that anyone can access.&lt;/p&gt;&lt;p&gt;In less than 10 minutes, a scammer can build a detailed profile on you using data broker sites like Spokeo, Whitepages, BeenVerified and Intelius. Here&apos;s what that profile looks like and how they build it step by step.&lt;/p&gt;&lt;p&gt;It starts simply. A scammer types your name into a search site. Within seconds, they see results like:&lt;/p&gt;&lt;p&gt;John M. Patterson | Age: 61 | Cleveland, OH&lt;/p&gt;&lt;p&gt;That is the starting point. Many sites show partial data for free. That is often enough to confirm identity. Full reports cost only a few dollars, so access is easy. Scammers can repeat this process hundreds of times a day, building detailed profiles with very little effort.&lt;/p&gt;&lt;p&gt;Next, this is where things get personal. Data broker profiles show more than your name. They reveal your family network.&lt;/p&gt;&lt;p&gt;That often includes:&lt;/p&gt;&lt;p&gt;As a result, scammers can target more than one person. For example, they may learn that your elderly parent lives alone or your child just moved. Because of that, scams like the &lt;a href=&quot;https://www.foxnews.com/tech/top-12-elderly-fraud-scams-2024&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;grandparent scam &lt;/u&gt;&lt;/a&gt;feel real instead of random.&lt;/p&gt;&lt;p&gt;At this point, your address history becomes critical. It is not just about where you live. Instead, scammers use it to:&lt;/p&gt;&lt;p&gt;For example, referencing a past address makes a caller sound legitimate. That detail alone can lower suspicion.&lt;/p&gt;&lt;p&gt;More importantly, data brokers also reveal financial clues. These may include:&lt;/p&gt;&lt;p&gt;This information comes from public records, not hacking. Because of this, scammers tailor their approach. Higher-income targets may see&lt;a href=&quot;https://www.foxnews.com/tech/how-scammers-exploit-your-data-pre-approved-retirement-scams&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt; investment scams&lt;/u&gt;&lt;/a&gt;. &lt;/p&gt;&lt;p&gt;Others may get job or&lt;a href=&quot;https://www.foxnews.com/tech/rental-scams-avoid-being-victim&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt; rental scams &lt;/u&gt;&lt;/a&gt;instead.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/google-search-led-costly-scam-call&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;GOOGLE SEARCH LED TO A COSTLY SCAM CALL&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Before launching a scam, criminals often double-check everything. They don&apos;t rely on just one site. Instead, they compare multiple data broker profiles, social media accounts and public records to confirm details are accurate.&lt;/p&gt;&lt;p&gt;For example, they may:&lt;/p&gt;&lt;p&gt;Because of this, the profile becomes more reliable. That extra step is what turns a guess into something that feels real.&lt;/p&gt;&lt;p&gt;At that point, they have everything they need. They know your name, family, address and financial details. Now the scam becomes highly specific.&lt;/p&gt;&lt;p&gt;By the time you hear from them, they already know enough to sound like someone you trust.&lt;/p&gt;&lt;p&gt;As a result, the scam feels believable.&lt;/p&gt;&lt;p&gt;This has already landed in court. The U.S. Department of Justice has prosecuted companies like Epsilon, Macromark Inc. and KBM Group for &lt;a href=&quot;https://www.foxnews.com/tech/stop-data-brokers-from-selling-your-information-online&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;selling data to scammers&lt;/a&gt;. Epsilon alone paid $150 million to victims.&lt;/p&gt;&lt;p&gt;At the same time, data tied to the FBI Internet Crime Complaint Center shows more than half of &lt;a href=&quot;https://www.foxnews.com/tech/spring-clean-your-digital-footprint-why-retirees-scam-targets&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;fraud cases involving older Americans&lt;/a&gt; were linked to exposed personal data. That shows how serious this problem has become.&lt;/p&gt;&lt;p&gt;You do not need to sign up for these sites. Instead, your data comes from many sources, including:&lt;/p&gt;&lt;p&gt;Because of this, your information spreads quickly.&lt;/p&gt;&lt;p&gt;Even after removal, your data often comes back. Data brokers constantly update their databases. They buy and resell fresh records. Because of that, one-time removal is not enough.&lt;/p&gt;&lt;p&gt;The goal isn&apos;t to disappear completely. It&apos;s to make the profile messy enough, incomplete enough and hard enough to find that scammers move on to easier targets.&lt;/p&gt;&lt;p&gt;Here&apos;s what you can do:&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Get a free scan to find out if your personal information is already out on the web: &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;Cyberguy.com&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;This kind of scam works because it feels personal. When someone knows your name, your family and even where you used to live, your guard drops. That is exactly what criminals are counting on. &lt;/p&gt;&lt;p&gt;The uncomfortable truth is that your information is already out there, often in more places than you realize. You do not need to panic, but you do need to be proactive. The more you limit what is easily accessible, the harder it becomes for someone to build a convincing story around you. Start with a simple search of your own name. That one step can completely change how you think about &lt;a href=&quot;https://www.foxnews.com/tech/9-online-privacy-risks-you-probably-dont-know-about&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;your digital footprint&lt;/a&gt;. From there, take action to remove what you can and protect what you cannot.&lt;/p&gt;&lt;p&gt;If a stranger can build a detailed profile on your family in minutes, what does that say about how much of your life is already exposed online? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/02/931/523/person-typing-on-computer.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">047866a0-6ea3-5885-bd2d-0aa72ac0c7c7</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/companies/facebook</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fbi</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Sat, 25 Apr 2026 15:29:05 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/anthropics-mythos-ai-found-2000-unknown-software-vulnerabilities-seven-weeks-testing</link> <guid isPermaLink="true">https://www.foxnews.com/tech/anthropics-mythos-ai-found-2000-unknown-software-vulnerabilities-seven-weeks-testing</guid> <title>Anthropic&apos;s Mythos AI found over 2,000 unknown software vulnerabilities in just seven weeks of testing</title> <description>Anthropic&amp;apos;s Mythos AI discovered over 2,000 unknown software vulnerabilities in seven weeks, prompting the company to restrict its release to the public.</description>   <content:encoded>&lt;p&gt;There is a new AI model called Mythos. Anthropic built it for defensive cybersecurity research. It is so effective at finding &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/software&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;software vulnerabilities&lt;/a&gt; that Anthropic decided the general public cannot have it.  &lt;/p&gt;&lt;p&gt;Instead, it is letting a small circle of trusted partners like Microsoft and Google experiment with it first under controlled conditions, while researchers figure out what guardrails need to exist.&lt;/p&gt;&lt;p&gt;That decision alone should tell you something. When the company that built a tool decides the world is not ready for it, you pay attention. And when you understand what Mythos actually did during testing, that caution starts to make complete sense.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/windows-pcs-risk-new-tool-disarms-built-in-security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WINDOWS PCS AT RISK AS NEW TOOL DISARMS BUILT-IN SECURITY&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Seven weeks. One AI model. One team. More than 2,000 previously unknown software vulnerabilities were found. If you need a moment with that, take it. John Ackerly, CEO and co-founder of Virtru, a data security company, put that figure into perspective in a way that is hard to shake.&lt;/p&gt;&lt;p&gt;&quot;Mythos is absolutely a turning point for cybersecurity. Think about it. Mythos didn&apos;t pick a lock; it found thousands of locks that were never locked in the first place (that no one even knew existed) in software that the best human security researchers had studied for decades.&lt;/p&gt;&lt;p&gt;The math is staggering. One AI model, and one team, in seven weeks, found more than 2,000 zero-day vulnerabilities. That is 30% of the world&apos;s entire annual output prior to AI. When thousands of researchers get access to AI models like Mythos, a single year will surface exponentially more zero-days than the 360,000 recorded in all of software history.&lt;/p&gt;&lt;p&gt;Mythos and other AI models like it can now find and exploit software flaws at a speed and scale that is beyond containment. This means that the old approach of building stronger walls around systems and hoping they hold is becoming much less reliable. It also means that the manual &quot;find a vulnerability, patch the vulnerability&quot; process is not going to keep pace with a threat landscape bolstered by the speed and scale of AI.&lt;/p&gt;&lt;p&gt;The threat surface is now expanding faster than any wall can contain it. The only answer to this new dynamic is to protect the data itself, rather than prop up perimeter protection around it.&lt;/p&gt;&lt;p&gt;Thirty percent of the world’s annual output in seven weeks changes the game entirely.&lt;/p&gt;&lt;p&gt;Cybersecurity teams have used AI tools for years. So, what makes this different?&lt;/p&gt;&lt;p&gt;Ackerly explains it this way: &quot;What makes this different is the &lt;a href=&quot;https://www.foxnews.com/tech/first-autonomous-ai-agent-here-worth-risks&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;level of autonomy and speed&lt;/a&gt; it enables. Mythos is being described as a system that can discover vulnerabilities and even generate working exploits much faster than traditional human-led workflows. This model could make it easy for a bad actor to identify and exploit vulnerabilities in software, even if that bad actor isn&apos;t knowledgeable or trained.&quot;&lt;/p&gt;&lt;p&gt;That last part matters most. Before a tool like this, exploiting a serious software vulnerability required real technical skill. Mythos AI lowers that barrier significantly. A person with bad intentions and no technical background could potentially use a model like this to cause serious damage. The expertise gap that once offered some natural protection is closing.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/fake-paypal-email-let-hackers-access-computer-bank-account&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;FAKE PAYPAL EMAIL LET HACKERS ACCESS COMPUTER AND BANK ACCOUNT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Most cybersecurity spending, the overwhelming majority of it, goes toward what experts call perimeter defense. Think firewalls, network monitoring, endpoint security and intrusion detection. The entire strategy is built on one core idea of keeping the bad actors out, and the data inside stays safe.&lt;/p&gt;&lt;p&gt;Ackerly describes how that model is now breaking down.&lt;/p&gt;&lt;p&gt;&quot;The perimeter is the digital wall around your systems and the information you possess. For decades, cyber strategies have primarily focused on the idea that if you protected the perimeter well enough — if you built a strong enough wall — the sensitive data on the inside would stay safe,&quot; Ackerly said. &lt;/p&gt;&lt;p&gt;&quot;The industry has poured hundreds of billions of dollars into firewalls, endpoint detection, &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;network security&lt;/a&gt;, application security and other perimeter defenses. Traditional security architecture by itself cannot keep pace in this new world.&lt;/p&gt;&lt;p&gt;&quot;The Mythos development from Anthropic is making a hard truth very apparent: Time is running out for companies to prepare for this new reality. Shifting focus from &apos;protecting the perimeter&apos; to ‘protecting the data’ is critically important to mitigate data loss or compromise.&quot;&lt;/p&gt;&lt;p&gt;Hundreds of billions of dollars. And now the model those dollars were built on is becoming unreliable. It forces a full rethink.&lt;/p&gt;&lt;p&gt;This is the question everyone wants a straight answer to. Ackerly offers one that is more nuanced than a simple yes or no.&lt;/p&gt;&lt;p&gt;&quot;I wouldn&apos;t frame it as attackers automatically having an advantage. But, over time, it does mean that &apos;bad guys&apos; and &apos;good guys&apos; will have access to essentially the same tools. As a result, I do think defenders absolutely need a different strategy. If you assume the outer wall may fail, then the smarter move is to protect the data itself so it stays controlled even after a breach.&quot;&lt;/p&gt;&lt;p&gt;The playing field is leveling. And that may sound fair until you remember attackers only need to succeed once, while defenders have to succeed every time.&lt;/p&gt;&lt;p&gt;Speed is what makes Mythos AI genuinely alarming. Traditional cyberattacks move through a lifecycle. Reconnaissance takes time. Finding the right vulnerability takes more time. Building an exploit takes more time on top of that.&lt;/p&gt;&lt;p&gt;Ackerly explains what happens when AI compresses all of that.&lt;/p&gt;&lt;p&gt;&quot;&lt;a href=&quot;https://www.foxnews.com/tech/ai-now-powering-cyberattacks-microsoft-warns&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;AI is accelerating the threat&lt;/a&gt;. A model that can find and exploit vulnerabilities autonomously compresses the attack lifecycle from weeks to hours, or even minutes. Every layer of the traditional security stack now has to operate at machine speed. Manual security architectures cannot keep up.&lt;/p&gt;&lt;p&gt;&quot;But AI also makes data-centric security more powerful, not less so. When every piece of sensitive data is protected at the object-level, AI agents can enforce governance at scale by checking entitlements, applying attribute-based access controls, and auditing data flows in real time. The same capabilities that make Mythos a dangerous tool in the hands of &apos;bad guys&apos; make it a valuable tool in the hands of ‘good guys.’&quot;&lt;/p&gt;&lt;p&gt;The question organizations should be asking shifts from &quot;how do I build higher walls?&quot; to &quot;when the walls fail, is my data still protected?&quot; That is the question worth sitting with.&lt;/p&gt;&lt;p&gt;Most of the Mythos coverage has focused on corporate risk. But your bank account and medical records sit in those same vulnerable systems.&lt;/p&gt;&lt;p&gt;&quot;For everyday people, the first change is that breaches and scams could become more frequent, &lt;a href=&quot;https://www.foxnews.com/tech/ai-cybersecurity-risks-deepfake-scams-rise&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;more targeted, and harder to&lt;/a&gt; spot. If AI makes it easier to uncover weak points in the systems we all rely on, that can translate into more pressure on the services that hold our personal data, from email and cloud storage to health, banking, and retail platforms.&lt;/p&gt;&lt;p&gt;Consumers shouldn&apos;t assume a company is doing the right thing with their data. Now, they really can&apos;t assume a company&apos;s outer defenses are enough to protect their information.&lt;/p&gt;&lt;p&gt;This also highlights the importance of basic cyber hygiene like &lt;a href=&quot;https://www.foxnews.com/tech/10-simple-cybersecurity-resolutions-safer-2026&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;unique passwords and MFA&lt;/a&gt;, so that when breaches happen, the scope of impact on your own personal data is contained.&quot;&lt;/p&gt;&lt;p&gt;Your bank account, your medical records, your tax documents, your private messages. All of it already lives across dozens of platforms you trust to protect it. If those platforms&apos; outer defenses are no longer reliable, what exactly is standing between your data and someone who wants it?&lt;/p&gt;&lt;p&gt;Ackerly goes further on where the exposure actually lives. &quot;Data now travels across clouds, devices, partners, and borders. The risk isn&apos;t just one hacked server in one building anymore. It&apos;s all the places your data passes through or gets copied to along the way. &lt;/p&gt;&lt;p&gt;Anthropic made a choice that is rare in the AI industry. They built something powerful and then decided not to release it widely.&lt;/p&gt;&lt;p&gt;On that decision, Ackerly is direct. &quot;Anthropic&apos;s decision to withhold Mythos from general release is unprecedented and, frankly, responsible. Time will tell what these partners are able to do with regard to safety, but releasing it to the general public would certainly have been ill-advised and dangerous.&quot;&lt;/p&gt;&lt;p&gt;Unprecedented. That word deserves weight here. In an industry that races to release new tech, Anthropic stopped. That speaks volumes.&lt;/p&gt;&lt;p&gt;We reached out to Anthropic for a comment, but did not hear back before our deadline.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/third-party-breach-exposes-chatgpt-account-details&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The perimeter model is deteriorating, but that does not mean you are helpless. Individual behavior still matters, and it matters more now than it did before.&lt;/p&gt;&lt;p&gt;Ackerly&apos;s recommendation is this: &quot;Stop assuming the app, platform, or company perimeter can always protect your information, or that they will do the right thing with your data. People should be much more deliberate about &lt;a href=&quot;https://www.foxnews.com/tech/scammers-can-exploit-your-data-from-just-1-chatgpt-search&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;what data they share&lt;/a&gt;, where they store it, and who can access it. Protection needs to travel with the data, not just sit at the edge of a network. For you, that means choosing services that give you stronger control over your information and being more cautious about oversharing sensitive data in the first place. The data owner should always have governance over said data.&quot; So where do you start?&lt;/p&gt;&lt;p&gt;A password manager makes this realistic. If one platform gets breached, unique passwords keep the damage isolated to that one account.&lt;/p&gt;&lt;p&gt;&lt;u&gt;Multi-factor authentication (MFA)&lt;/u&gt; adds a layer that survives even when a password is compromised. It is one of the highest-impact steps an individual can take.&lt;/p&gt;&lt;p&gt;Outdated software is one of the most common entry points attackers use. Strong antivirus software catches threats your instincts might miss, and keeping apps and operating systems current closes the gaps that models like Mythos are built to find. &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp;amp; iOS devices at &lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Every app that holds your data is a potential exposure point. The less you overshare, the smaller your footprint becomes.&lt;/p&gt;&lt;p&gt;Data brokers collect and sell your personal information, often without you ever knowing. Data removal services find where your data is listed and request its removal. You cannot control every place your information travels, but you can shrink the trail it leaves behind. &lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Not all platforms treat your data the same way. Look for services that let you see, manage and limit how your information is used and where it goes.&lt;/p&gt;&lt;p&gt;Catching a breach early limits the damage significantly. Set up account alerts wherever your bank or financial platform allows it. A credit freeze costs nothing and stops new accounts from being opened in your name without your knowledge.&lt;/p&gt;&lt;p&gt;Ackerly warned that scams will get more targeted and harder to spot as AI lowers the barrier for bad actors. Scrutinize every link before you click it and treat unexpected emails or texts asking for login information as suspicious by default. If something feels off, it probably is.&lt;/p&gt;&lt;p&gt;The goal is to limit how much damage they can do. When you operate with that assumption, your decisions about data hygiene get sharper, and your exposure gets smaller.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. &lt;strong&gt;Take my Quiz here: &lt;u&gt;Cyberguy.com&lt;/u&gt;    &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Mythos did not create the vulnerability problem. It made the scale of it visible in a way that is no longer ignorable. The foundation of modern cybersecurity, the idea that strong enough walls will keep data safe, is being tested in real time by a technology that moves faster than any human team can. That is a consumer story as much as it is a corporate one. Your data lives in systems built on that old model. &lt;/p&gt;&lt;p&gt;And the moment to think differently about how it is protected is now, not after the next major breach makes the headlines. Anthropic made a responsible call by limiting access to Mythos. But the model exists. The capability is real. Other versions of it are being developed. The question for every organization and every individual becomes the same one Ackerly keeps returning to.&lt;/p&gt;&lt;p&gt;When the walls fail, and experts are telling us they will, what is actually protecting your data on the other side? Let us know your thoughts by writing to us at &lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/anthropic-mythos-ai-fox-news-001.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">5533ff14-7d95-57da-b025-689df3b2597b</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/companies/microsoft</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/companies/google</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Sat, 25 Apr 2026 15:25:57 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/ai-newsletter-next-dairy-queen-order-could-taken-ai</link> <guid isPermaLink="true">https://www.foxnews.com/tech/ai-newsletter-next-dairy-queen-order-could-taken-ai</guid> <title>Fox News AI Newsletter: Your next Dairy Queen order could be taken by AI</title> <description>Dairy Queen&amp;apos;s automated AI drive-thru initiative sparks customer concern as Meta lays off 8,000 workers and voters flag AI risks to privacy and pay.</description>   <content:encoded>&lt;p&gt;IN TODAY’S NEWSLETTER:&lt;/p&gt;&lt;p&gt;- Dairy Queen&apos;s new drive-thrus without humans spark backlash by frustrated customers&lt;/p&gt;&lt;p&gt;- Meta informs staff of layoffs affecting 8,000 employees amid AI push&lt;/p&gt;&lt;p&gt;- Fox News Poll: Voters see AI as a risk to privacy and paychecks&lt;/p&gt;&lt;p&gt;&lt;strong&gt;COLD OPEN:&lt;/strong&gt; &lt;a href=&quot;https://www.foxnews.com/food-drink/dairy-queens-new-drive-thrus-without-humans-spark-backlash-frustrated-customers&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Dairy Queen&apos;s new drive-thrus without humans spark backlash from frustrated customers&lt;/a&gt; – &lt;i&gt;Fast-food chain Dairy Queen is moving toward new, fully automated AI drive-thrus operating without human workers.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;TRUST DEFICIT:&lt;/strong&gt; &lt;a href=&quot;https://www.foxnews.com/politics/fox-news-poll-voters-see-ai-risk-privacy-paychecks&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Fox News Poll: Voters see AI risk to privacy, paychecks&lt;/a&gt; – A&lt;i&gt; Fox News Poll this week reveals growing anxiety among voters regarding artificial intelligence, with a significant portion expressing concerns that the rapidly advancing technology poses a direct threat to their personal privacy and future paychecks.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;DIGITAL HEIST:&lt;/strong&gt; &lt;a href=&quot;https://www.foxbusiness.com/politics/white-house-china-industrial-scale-ai-technology-theft-trump-xi-summit&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;White House accuses China of ‘industrial-scale’ AI technology theft ahead of Trump-Xi summit&lt;/a&gt; – A&lt;i&gt;head of the highly anticipated summit between former President Donald Trump and Chinese President Xi Jinping, the White House has raised alarms over China&apos;s industrial-scale theft of artificial intelligence technology.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;CCP THEFT:&lt;/strong&gt; &lt;a href=&quot;https://www.foxnews.com/politics/google-engineer-stole-ai-secrets-china-senate-hears-explosive-testimony&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Google engineer stole AI secrets for China, Senate hears explosive testimony&lt;/a&gt; – &lt;i&gt;In explosive testimony before the Senate, lawmakers heard alarming details about a Google engineer accused of stealing closely guarded artificial intelligence secrets on behalf of China, highlighting national security risks.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;CODE OR CRIME: &lt;/strong&gt;&lt;a href=&quot;https://www.foxbusiness.com/politics/florida-launches-criminal-probe-whether-chatbot-aided-suspect-deadly-campus-shooting&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Florida launches criminal probe into whether chatbot aided suspect in deadly campus shooting&lt;/a&gt; – &lt;i&gt;Florida officials have launched a criminal probe to determine whether an artificial intelligence chatbot provided assistance to a suspect involved in a deadly campus shooting, demonstrating a novel challenge for law enforcement.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;FINE PRINT FURY: &lt;/strong&gt;&lt;a href=&quot;https://www.foxnews.com/politics/schlossberg-unveils-plan-crack-new-frontier-ai-putting-squeeze-consumers-harbinger&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Schlossberg unveils plan to crack down on new frontier of AI putting squeeze on consumers&lt;/a&gt; – &lt;i&gt;In a move to protect the public from emerging tech threats, Schlossberg has unveiled a comprehensive plan aimed at cracking down on the new frontier of artificial intelligence that is currently putting a financial squeeze on everyday consumers..&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;CODED MORALITY: &lt;/strong&gt;&lt;a href=&quot;https://www.foxnews.com/politics/anthropics-moral-compass-architect-suggested-ai-overcorrection-could-address-historical-injustices%20&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Anthropic&apos;s &apos;moral compass&apos; architect suggested AI overcorrection could address historical injustices&lt;/a&gt; – &lt;i&gt;The architect behind the &quot;moral compass&quot; at the AI firm Anthropic has controversially suggested that implementing an artificial intelligence overcorrection could serve as a mechanism to address historical injustices.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;DIGITAL PREDATOR: &lt;/strong&gt;&lt;a href=&quot;https://www.foxnews.com/us/worker-swanky-country-club-accused-using-ai-create-explicit-photos-teen-police-&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Worker at swanky country club accused of using AI to create explicit photos of teen, police say&lt;/a&gt; – &lt;i&gt;Police say a worker at an exclusive, swanky country club has been accused of utilizing artificial intelligence tools to generate explicit and inappropriate photographs of a teenager.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;BOT BEHAVIOR: &lt;/strong&gt;&lt;a href=&quot;https://www.foxbusiness.com/media/expert-rips-irresponsible-ai-study-over-blackmail-scenerios&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Expert rips &apos;irresponsible&apos; AI study over blackmail scenarios&lt;/a&gt; – &lt;i&gt;A leading technology expert is pushing back against a recent academic study outlining hypothetical artificial intelligence blackmail scenarios, ripping the research as highly &quot;irresponsible&quot; for stoking unnecessary public panic.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;DOUBLE DOWN: &lt;/strong&gt;&lt;a href=&quot;https://www.foxnews.com/media/reese-witherspoon-doubles-ai-comments-adds-one-paying-say&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Reese Witherspoon doubles down on AI comments, adds no one is paying her to say it&lt;/a&gt; – &lt;i&gt;Hollywood actress Reese Witherspoon has doubled down on her controversial comments regarding the integration of artificial intelligence in the entertainment industry, emphatically adding that no one is paying her to endorse the technology.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;EFFICIENCY DRIVE: &lt;/strong&gt;&lt;a href=&quot;https://www.foxbusiness.com/technology/meta-informs-staff-layoffs-affecting-8000-employees-amid-ai-push&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Meta informs staff layoffs affecting 8,000 employees amid AI push&lt;/a&gt; – &lt;i&gt;Amid a massive strategic pivot toward artificial intelligence, Meta has informed its staff of impending layoffs expected to affect approximately 8,000 employees as the tech giant restructures its workforce.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;ROBOTIC SHOTS: &lt;/strong&gt;&lt;a href=&quot;https://www.foxnews.com/sports/49ers-turning-artificial-intelligence-ahead-nfl-draft-gm-says-laggards-already-behind&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;49ers turning to artificial intelligence at NFL Draft, GM says laggards are already behind&lt;/a&gt; – &lt;i&gt;The San Francisco 49ers are heavily integrating artificial intelligence into their scouting process ahead of the NFL Draft, with the team&apos;s general manager warning that franchises failing to adopt the technology are already falling behind, according to Fox News Digital.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;HANDS-FREE FEAST: &lt;/strong&gt;&lt;a href=&quot;https://www.foxnews.com/tech/alexa-lets-you-order-food-like-real-conversation%20&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Alexa lets you order food like a real conversation&lt;/a&gt; – &lt;i&gt;Amazon&apos;s Alexa is rolling out an updated artificial intelligence feature that enables users to order food by engaging in a seamless, real-time conversation with the virtual assistant.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;FREE THROW BOT: &lt;/strong&gt;&lt;a href=&quot;https://www.foxnews.com/tech/toyota-cue7-robot-shoots-hoops-using-ai&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Toyota&apos;s CUE7 robot shoots hoops using AI&lt;/a&gt; – &lt;i&gt;Toyota is showing off the impressive capabilities of its cutting-edge CUE7 robot, which utilizes advanced artificial intelligence algorithms to accurately shoot basketball hoops.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.facebook.com/FoxNews&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow&quot;&gt;Facebook&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.instagram.com/foxnews/&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow&quot;&gt;Instagram&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/c/FoxNews/featured&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow&quot;&gt;YouTube&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://x.com/FoxNews&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow&quot;&gt;X&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.linkedin.com/company/fox-news-channel/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/newsletters&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Fox News First&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/newsletters&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Fox News Opinion&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/newsletters&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Fox News Lifestyle&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/newsletters&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Fox News Health&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Fox Business&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxweather.com/app&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Fox Weather&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxsports.com/mobile&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;Fox Sports&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://tubitv.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Tubi&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/go&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Fox News Go&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/fox-nation&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Fox Nation&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/524/dairy-queen-restaurant-austin-fox-news-001.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="524" />   <category domain="foxnews.com/metadata/dc.identifier">ed255959-2230-5aae-aa73-974a6336da5e</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/columns/artificial-intelligence-newsletter</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/robots</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Fri, 24 Apr 2026 13:02:06 -0400</pubDate> </item>    <item> <link>https://www.foxnews.com/tech/fcc-router-rule-raises-questions-future-updates</link> <guid isPermaLink="true">https://www.foxnews.com/tech/fcc-router-rule-raises-questions-future-updates</guid> <title>FCC router rule raises questions about future updates</title> <description>The FCC&amp;apos;s new router policy targets future device approvals over national security concerns, but the real risk involves long-term software updates.</description>   <content:encoded>&lt;p&gt;A new move from the &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/tech/topics/fcc&quot;&gt;Federal Communications Commission&lt;/a&gt; is being framed as a national security step. But if you already have a router at home, the bigger question is simple: how long will it keep getting security updates?&lt;/p&gt;&lt;p&gt;The FCC recently updated its &quot;Covered List&quot; to include &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/politics/your-internet-router-could-china-linked-fcc-cracks-down-unacceptable-security-risks&quot;&gt;routers produced in foreign countries&lt;/a&gt;, which blocks new models of that covered equipment from being approved for sale in the U.S.&lt;/p&gt;&lt;p&gt;At the same time, the FCC made something else clear. This change does not affect routers you already own, and it does not stop retailers from continuing to sell models that were previously approved.&lt;/p&gt;&lt;p&gt;So nothing shuts off overnight. However, the policy introduces a new layer of uncertainty around how long some devices will continue receiving updates.&lt;/p&gt;&lt;p&gt;&lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/tech/your-home-wi-fi-really-safe-think-again&quot;&gt;&lt;strong&gt;IS YOUR HOME WI-FI REALLY SAFE? THINK AGAIN&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;The policy focuses on future device approvals, not the devices already in your home.&lt;/p&gt;&lt;p&gt;Here is what the FCC says in plain terms:&lt;/p&gt;&lt;p&gt;This action is tied to &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/politics/executive/national-security&quot;&gt;national security concerns&lt;/a&gt; about supply chain risks, not a product-by-product security test of individual routers. The key takeaway is this: your current router is not banned, recalled or disabled.&lt;/p&gt;&lt;p&gt;The real issue is not about using your router today. It is about future &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/tech/topics/software&quot;&gt;software&lt;/a&gt; and firmware updates. Alongside the policy change, the FCC issued a temporary waiver. That waiver allows existing routers to continue receiving updates that patch vulnerabilities, maintain functionality and ensure compatibility with operating systems. Right now, that waiver runs through at least March 1, 2027.&lt;/p&gt;&lt;p&gt;That date is not a guaranteed cutoff. The FCC has said it will re-evaluate the policy before then and may extend or modify the waiver. So the situation is still evolving.&lt;/p&gt;&lt;p&gt;Your router is the gateway to &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/tech/smart-home-hacking-fears-whats-real-whats-hype&quot;&gt;everything connected in your home&lt;/a&gt;. Phones, laptops, smart TVs and cameras all depend on it. When a vulnerability is discovered, a software update is usually what fixes it.&lt;/p&gt;&lt;p&gt;If updates slow down or stop, the risk builds over time. That does not mean your router suddenly becomes unsafe. But it can become easier for attackers to exploit known flaws.&lt;/p&gt;&lt;p&gt;Even the FCC acknowledged this in its waiver, noting that continued updates help mitigate harm to consumers and support essential security functions. So the concern is not immediate. It is about what happens over time if support policies change.&lt;/p&gt;&lt;p&gt;&lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/tech/browser-extensions-put-millions-google-chrome-users-risk&quot;&gt;&lt;strong&gt;BROWSER EXTENSIONS PUT MILLIONS OF GOOGLE CHROME USERS AT RISK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;One important wrinkle is that the FCC has already begun granting conditional approvals for some devices. In April 2026, the agency approved certain products from NETGEAR and Adtran to continue operating under specific conditions through October 1, 2027.&lt;/p&gt;&lt;p&gt;That shows this is not a one-size-fits-all rule. Instead, it is an evolving policy where some devices may continue receiving support while others may face tighter restrictions.&lt;/p&gt;&lt;p&gt;The FCC says the decision is based on national security concerns, including supply chain vulnerabilities and &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/tech/chinese-hackers-target-us-telecoms-what-you-need-know-protect-your-data&quot;&gt;potential cybersecurity risks&lt;/a&gt; tied to certain foreign-produced equipment.&lt;/p&gt;&lt;p&gt;At the same time, the policy includes a path for exceptions. Companies can seek conditional approvals through federal agencies, and regulators can revisit the rules as more information becomes available.&lt;/p&gt;&lt;p&gt;That means the final impact will likely depend on how those decisions play out over time.&lt;/p&gt;&lt;p&gt;Until there is more clarity, a few simple steps can help keep your home network secure.&lt;/p&gt;&lt;p&gt;First, find your &lt;strong&gt;router&apos;s exact model number&lt;/strong&gt;. You can usually see it on a label on the bottom or back of the device. Next, go to the manufacturer&apos;s website, such as NETGEAR, Linksys or TP-Link, and search for &lt;strong&gt;that model.&lt;/strong&gt; Open its &lt;strong&gt;support page&lt;/strong&gt; and look for sections like &lt;strong&gt;Support, Downloads, Firmware or End of Life&lt;/strong&gt;. Then, check for &lt;strong&gt;a support timeline,&lt;/strong&gt; the date of the most recent firmware update or any notes saying the product is no longer supported. If you cannot find clear information, that is a warning sign that your router may not receive regular security updates. &lt;/p&gt;&lt;p&gt;Next, log into your &lt;strong&gt;router settings.&lt;/strong&gt; To do this, open a &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/category/tech/technologies/browsers&quot;&gt;web browser&lt;/a&gt; and type your router&apos;s &lt;strong&gt;IP address&lt;/strong&gt; into the address bar. Common ones include 192.168.1.1 or 192.168.0.1. Then sign in using your &lt;strong&gt;admin username and password&lt;/strong&gt;. Once you are in, look for sections labeled &lt;strong&gt;Firmware, Software Update &lt;/strong&gt;or &lt;strong&gt;Administration.&lt;/strong&gt; Check for available &lt;strong&gt;updates&lt;/strong&gt; and&lt;strong&gt; install them&lt;/strong&gt; if needed. If your router supports automatic updates, turn that on. This helps close security gaps quickly without you having to check manually. If you are not sure where to find these settings, you can also use your router&apos;s mobile app if it has one, which often makes updates easier.&lt;/p&gt;&lt;p&gt;&lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/tech/get-faster-wi-fi-simple-home-fixes&quot;&gt;&lt;strong&gt;GET FASTER WI-FI WITH THESE SIMPLE HOME FIXES&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;If your router is already a few years old, start planning for a replacement. Do not wait until updates stop. Instead, look for models with clearly stated support timelines. &lt;strong&gt;Check out our picks for the Top Routers for best security at &lt;/strong&gt;&lt;a target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot; href=&quot;http://cyberguy.com&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;cyberguy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt; &lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Your router is the first line of defense. However, your devices matter too. Keep your phone, computer and tablet updated. Also, use strong antivirus software to help catch threats that slip through. &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp;amp; iOS devices at &lt;/strong&gt;&lt;a target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot; href=&quot;http://Cyberguy.com&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;From time to time, check what is connected to your network. You can do this in your router settings under &quot;Connected Devices&quot; or in your router&apos;s app. If you see anything unfamiliar, remove it right away.&lt;/p&gt;&lt;p&gt;Create a &lt;a target=&quot;_blank&quot; rel=&quot;noopener&quot; href=&quot;https://www.foxnews.com/tech/dont-use-your-home-wi-fi-before-fixing-security-risks&quot;&gt;strong Wi-Fi password&lt;/a&gt; and a separate admin password for your router. Avoid using default credentials. A password manager can help you generate and store secure logins. &lt;strong&gt;Check out the best expert-reviewed password managers of 2026 at &lt;/strong&gt;&lt;a target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot; href=&quot;http://Cyberguy.com&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;First, log into your router settings using a web browser. Type your router&apos;s IP address, such as &lt;strong&gt;192.168.1.1&lt;/strong&gt; or &lt;strong&gt;192.168.0.1&lt;/strong&gt;, into the address bar and sign in with your admin credentials. Next, look for settings labeled &lt;strong&gt;Remote Access, Remote Management, Web Access from WAN, or Cloud Access&lt;/strong&gt;. These are often found under sections like &lt;strong&gt;Advanced, Administration or Security&lt;/strong&gt;. Then, turn that setting off and save your changes. This prevents your router from being accessed from outside your home network. If you cannot find the option, check your router&apos;s mobile app or the manufacturer&apos;s support page. Some routers hide this setting or disable it by default.&lt;/p&gt;&lt;p&gt;First, unplug your router from the power outlet. Wait about &lt;strong&gt;30 seconds&lt;/strong&gt; to let it fully shut down. Next, plug it back in and wait a few minutes for it to reconnect to the internet. You can also restart your router through its settings. Log in, then look for options like &lt;strong&gt;Reboot or Restart&lt;/strong&gt; under sections such as &lt;strong&gt;Administration or System&lt;/strong&gt;. Doing this every few weeks can help apply updates and clear temporary issues that may affect performance or security. If your router supports scheduled reboots, you can turn that on to automate the process.&lt;/p&gt;&lt;p&gt;This is not a situation where your internet suddenly becomes unsafe. There is no recall. There is no shutdown. Your router will not stop working on a specific date. However, there is a new question mark that did not exist before. The Federal Communications Commission has created a system where future updates for some devices could depend on how the rules evolve. That puts more importance on something most people rarely think about: how long their router will stay supported. For now, you still have time. The current waiver runs into 2027, and regulators have signaled they may revisit the policy before then. The smart move is simple. Know what you own, keep it updated and stay aware as this situation develops.&lt;/p&gt;&lt;p&gt;As policies around your home tech change, how much responsibility should fall on regulators versus the companies that keep your devices updated? Let us know by writing to us at &lt;a target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot; href=&quot;http://Cyberguy.com&quot;&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Copyright 2026 &lt;a target=&quot;_blank&quot; rel=&quot;noopener noreferrer nofollow&quot; href=&quot;http://CyberGuy.com&quot;&gt;CyberGuy.com&lt;/a&gt;.  All rights reserved.&lt;/p&gt;</content:encoded>    <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/fcc-router-rule-1.jpeg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />   <category domain="foxnews.com/metadata/dc.identifier">02f9d928-e5ab-5fd9-a151-6e04b281abc6</category> <category domain="foxnews.com/metadata/prism.channel">fnc</category> <category domain="foxnews.com/metadata/dc.source">Fox News</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>  <category domain="foxnews.com/taxonomy">fox-news/newsedge/consumer</category>  <category domain="foxnews.com/taxonomy">fox-news/us</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/wifi</category>  <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fcc</category>   <category domain="foxnews.com/section-path">fox-news/tech</category>  <category domain="foxnews.com/content-type">article</category> <pubDate>Fri, 24 Apr 2026 09:17:31 -0400</pubDate> </item>              </channel></rss>