Congratulations!

[Valid RSS] This is a valid RSS feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: http://feeds.foxnews.com/foxnews/tech

  1. <?xml version="1.0" encoding="UTF-8" standalone="yes"?>
  2. <rss xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  3.    <channel>
  4.        <title>Technology News Articles on Fox News</title>
  5.        <link>https://www.foxnews.com/tech</link>
  6.        <description>Explore all the news happening in the technology industry with Fox News. Check out the latest tech launches and computer tech updates going on today.</description>
  7.        <copyright>Copyright 2025 FOX News Network</copyright>
  8.        <language>en-us</language>
  9.        <pubDate>Mon, 14 Jul 2025 15:00:42 -0400</pubDate>
  10.        <image>
  11.            <url>https://global.fncstatic.com/static/orion/styles/img/fox-news/logos/fox-news-desktop.png</url>
  12.            <title>Technology News Articles on Fox News</title>
  13.            <link>https://www.foxnews.com/tech</link>
  14.        </image>
  15.        <atom:link rel="self" href="https://moxie.foxnews.com/google-publisher/tech.xml" type="application/rss+xml"/>
  16.        <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/" xmlns:atom="http://www.w3.org/2005/Atom" />
  17.        
  18.            
  19.                
  20.                    <item>
  21.                        <link>https://www.foxnews.com/tech/why-you-should-think-twice-before-joining-power-saver-program</link>
  22.                        <guid isPermaLink="true">https://www.foxnews.com/tech/why-you-should-think-twice-before-joining-power-saver-program</guid>
  23.                        <title>Why you should think twice before joining a power saver program</title>
  24.  
  25.                        <description>Despite the benefits, residential power saver programs come with several potential drawbacks and concerns that have been raised by both customers and experts.</description>
  26.                        
  27.                        
  28.                            <content:encoded>&lt;p&gt;Power saver programs are utility-sponsored demand response initiatives that help &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/innovation&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;reduce electricity usage&lt;/a&gt; during periods of peak demand. These programs typically target central air conditioners (AC) and heat pumps, since cooling equipment drives spikes in summer energy demand. In exchange for incentives such as bill credits or rebates, participating homeowners allow the utility to temporarily adjust or cycle their HVAC systems on hot days. &lt;/p&gt;&lt;p&gt;But it’s not all that straightforward. I recently received an email from Leah, an HVAC professional based in Rio Rancho, New Mexico.&lt;/p&gt;&lt;p&gt;&lt;i&gt;&quot;I would like to see an article about the push for Smart Thermostats, and the convergence of the utilities&apos; attempts to control air conditioning usage to conserve energy.&quot;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;He pointed to a growing push for smart thermostats and what he sees as an effort by utilities to take more control over air conditioning use, all under the banner of energy conservation.&lt;/p&gt;&lt;p&gt;Let’s discuss the power saver programs in detail, including their pros, cons and everything else you need to know. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Most residential power saver programs function by temporarily reducing air conditioner usage at participating homes during peak periods (usually summer afternoons). In most cases, the utility &lt;a href=&quot;https://www.foxnews.com/tech&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;installs a control device&lt;/a&gt; on the outdoor AC unit’s compressor. During a peak event, a radio signal from the utility will cycle the compressor off and on at set intervals. Legacy programs like Xcel Energy’s Saver’s Switch use this method.&lt;/p&gt;&lt;p&gt;Another method utilities use is controlling thermostats. You’re asked to enroll your Wi-Fi smart thermostat in a bring-your-own-thermostat program. During a demand response event, the utility or program operator remotely raises the thermostat setpoint for a few hours. This causes the AC to run less. Most of these programs allow you to override the change via the thermostat or app; however, emergency events may temporarily disable this option.&lt;/p&gt;&lt;p&gt;Power saver programs provide several benefits for both participating consumers and the wider community. First, there are bill savings and incentives. Participants receive direct financial rewards, ranging from annual bill credits of up to $40 to up-front enrollment bonuses of $25-$100.&lt;/p&gt;&lt;p&gt;These programs also result in collective demand reduction during peak times, helping prevent grid overloads and blackouts. By coordinating energy reductions across thousands of homes, utilities can avoid firing up expensive peaker plants or purchasing high-priced electricity on the open market.&lt;/p&gt;&lt;p&gt;Reducing peak demand can also help avoid turning on older, more polluting fossil-fuel generators. That means fewer CO₂ emissions and lower air pollution on the hottest days, when health risks are already high.&lt;/p&gt;&lt;p&gt;Despite the benefits, residential power saver programs come with several potential drawbacks and concerns that have been raised by both customers and experts.&lt;/p&gt;&lt;p&gt;&lt;i&gt;&quot;In New Mexico, where I live and work, our electric utility, PNM, offers a &apos;Power Saver&apos; program. Customers can opt in to have a box mounted to their condenser, which disrupts the signal between the furnace and the condenser during peak consumption hours, effectively shutting it down,&quot;&lt;/i&gt; Leah tells me. &lt;/p&gt;&lt;p&gt;&lt;i&gt;&quot;It’s not great for the condenser, and we often get calls from customers who don’t fully understand what they signed up for and are confused when their AC stops working. Now, there’s a push to gain access to Wi-Fi-enabled thermostats to achieve the same goal. They want to control our ACs.&quot;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Understandably, many &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;people are uncomfortable&lt;/a&gt; with utilities taking over their cooling systems, especially in extreme heat. Take the 2022 incident with Xcel Energy in Colorado. During an energy emergency, 22,000 smart thermostat users were temporarily locked out of adjusting their ACs. Many had never experienced a no-override event before and were understandably frustrated. While rare, these incidents raise valid concerns about control and consent.&lt;/p&gt;&lt;p&gt;There are also technical concerns. Frequent short cycling of AC compressors can lead to increased wear and tear. Every startup strains the compressor motor, and repeated on-off cycles within a short period may reduce efficiency or shorten the unit&apos;s lifespan, although this depends on the system and the frequency of the events.&lt;/p&gt;&lt;p&gt; &lt;a href=&quot;https://www.foxnews.com/tech/how-432-robots-relocating-7500-ton-historic-building&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HOW 432 ROBOTS ARE RELOCATING A 7,500-TON HISTORIC BUILDING&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Some people enrolled in thermostat adjustment programs without realizing it. This leads to &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;confusion and frustration&lt;/a&gt; when their air conditioning is unexpectedly limited. Often, this happens because smart thermostats come with default opt-in settings or vague incentive language that can be confusing.&lt;/p&gt;&lt;p&gt;In Texas in 2021, many residents saw their smart thermostats rise above 78°F during an ERCOT conservation alert. They later found out they had unknowingly agreed to let utilities make temperature adjustments.&lt;/p&gt;&lt;p&gt;These programs also raise important data privacy concerns. Wi-Fi-enabled thermostats collect and transmit sensitive information, including occupancy patterns, temperature preferences and when a home is likely unoccupied.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Cybersecurity&lt;/a&gt; is another issue. Like any internet-connected device, smart thermostats can be vulnerable to hacking or malicious remote commands. So far, no major breaches have impacted AC demand programs, but privacy advocates say the risks are real and growing.&lt;/p&gt;&lt;p&gt;Whether you&apos;re thinking about signing up or are already enrolled, these steps will help you stay in control, protect your comfort and avoid unwanted surprises:&lt;/p&gt;&lt;p&gt;Before you join any power saver or thermostat program, read the terms completely. Ensure you understand the extent of the utility&apos;s control, whether you can override changes and how frequently adjustments may occur. Always choose manual enrollment during smart home app setup instead of letting it enroll you automatically.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-is-ai-artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT IS ARTIFICIAL INTELLIGENCE (AI)?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Use a Wi-Fi thermostat that makes it easy to override changes during demand response events. Many models let you opt out temporarily or permanently through the app or the device itself. Learn how to do this before a peak event occurs, so you&apos;re not caught off guard.&lt;/p&gt;&lt;p&gt;Find expert-reviewed smart thermostats that put you in control at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/SmartThermostats&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Turn on alerts from your utility so you receive notifications about peak demand events by email, text or app. Check your utility’s website for schedules or forecasts and opt out in advance if needed. Staying informed gives you more control over how your system behaves.&lt;/p&gt;&lt;p&gt;Use strong passwords for your thermostat and home Wi-Fi. Turn on two-factor authentication (2FA) if available. Consider using a password manager to generate and store complex passwords.&lt;/p&gt;&lt;p&gt;Get more details about my best expert-reviewed Password Managers of 2025 at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Passwords&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Keep your thermostat’s software updated to protect it from potential security risks or remote interference.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;GET FOX BUSINESS ON THE GO BY CLICKING HERE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;If the program doesn&apos;t work for you, learn how to remove your thermostat from it. Utilities usually offer opt-out instructions through their website or app. You may also need to adjust settings or factory reset your thermostat.&lt;/p&gt;&lt;p&gt;For more ways to save on your power bill or to see if opting out makes sense for your budget, visit &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/SaveonPower&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Keep an eye on how your AC performs during demand events. If you notice unusual behavior like frequent short cycling or your home becomes uncomfortably warm, it might be time to reconsider your participation. &lt;/p&gt;&lt;p&gt;For more ways on how to keep your home cool and comfortable, check out &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/KeepCool&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Power saver programs can help reduce grid stress and offer small financial incentives, but they come with trade-offs. Customers may experience reduced comfort, equipment wear, and loss of control, sometimes without realizing they’ve opted in. There are also valid concerns around data privacy and security. These programs need clearer communication and better safeguards if they’re going to be widely accepted.&lt;/p&gt;&lt;p&gt;Is the promise of energy savings worth giving up privacy and control over your home&apos;s temperature? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>
  29.                        
  30.  
  31.                        
  32.                            
  33.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/2-why-you-should-think-twice-before-joining-a-power-saver-program-body.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  34.                            
  35.                        
  36.  
  37.                        <category domain="foxnews.com/metadata/dc.identifier">775e40cc-bc52-5ecc-9b47-0b33c1711333</category>
  38.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  39.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  40.  
  41.                        
  42.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  43.                        
  44.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
  45.                        
  46.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
  47.                        
  48.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/innovation</category>
  49.                        
  50.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
  51.                        
  52.                            <category domain="foxnews.com/taxonomy">fox-news/lifestyle</category>
  53.                        
  54.                            <category domain="foxnews.com/taxonomy">fox-news/real-estate</category>
  55.                        
  56.  
  57.                        
  58.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  59.                        
  60.                        <category domain="foxnews.com/content-type">article</category>
  61.  
  62.                        <pubDate>Mon, 14 Jul 2025 15:00:42 -0400</pubDate>
  63.                    </item>
  64.                
  65.            
  66.                
  67.                    <item>
  68.                        <link>https://www.foxnews.com/tech/ai-machine-change-tattoo-art-forever</link>
  69.                        <guid isPermaLink="true">https://www.foxnews.com/tech/ai-machine-change-tattoo-art-forever</guid>
  70.                        <title>Will an AI machine change tattoo art forever?</title>
  71.  
  72.                        <description>The Blackdot AI tattoo machine is quiet. It&amp;apos;s steady. And according to early users, it hurts a lot less.</description>
  73.                        
  74.                        
  75.                            <content:encoded>&lt;p&gt;Every tattoo starts with a single black dot. That tiny mark is the base for every design, no matter how complex. And now, thanks to a new &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;AI tattoo machine&lt;/a&gt;, that dot is more perfect than ever. Welcome to the future of tattooing.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Blackdot is not just a new tool. It&apos;s a complete reimagining of how tattoos are created. This device doesn&apos;t look like a traditional tattoo machine. It&apos;s a sleek, robotic arm powered by artificial intelligence. It uses &lt;a href=&quot;https://www.foxnews.com/tech&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;computer vision&lt;/a&gt;, lasers and a microscope to apply ink with surgical precision. The dots it places are about the size of a human hair. Blackdot is currently in studios like Bang Bang in New York City. It&apos;s designed to create ultra-detailed tattoos quickly, cleanly and with less pain than traditional methods. And yes, it still uses real needles and real ink. But the way it works is totally different.&lt;/p&gt;&lt;p&gt;Once a human operator starts the process, the machine scans your skin. It then gets to work, placing ink with incredible accuracy. It&apos;s quiet. It&apos;s steady. And according to early users, it hurts a lot less. That&apos;s because the machine goes shallower into the skin than a human artist might. This avoids nerve endings that normally cause pain during a tattoo.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-is-ai-artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT IS ARTIFICIAL INTELLIGENCE (AI)?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Let&apos;s say you want a custom tattoo from an artist across the country. Normally, you&apos;d need to travel, book months in advance, and hope the artist is available. With Blackdot, you can get that same artwork in your city, without ever meeting the artist in person. The machine can handle everything from ultra-sharp lettering to lifelike portraits. It can even replicate a child&apos;s handwriting or a piece of original art down to the tiniest detail. And if you&apos;re nervous about pain or needles, this machine might make you more comfortable than a traditional tattoo shop.&lt;/p&gt;&lt;p&gt;Blackdot isn&apos;t trying to replace tattoo artists. It&apos;s trying to give them more options. Artists can license their work to be used by the machine. They control how many times a design can be tattooed. They approve the final work. And they get paid quickly. This opens up tattooing to painters, illustrators, digital artists, photographers and more. You no longer have to be a tattoo artist to get your work on someone&apos;s skin.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;GET FOX BUSINESS ON THE GO BY CLICKING HERE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Of course, not everyone is excited about this change. Some tattoo artists feel like a machine doesn&apos;t belong in an industry built on human connection and trust. They say machines can&apos;t replace the experience that comes from years of working with different skin types and guiding clients through the emotional side of getting a tattoo. They also worry about losing jobs, or about AI removing the &quot;soul&quot; of a hand-drawn tattoo.&lt;/p&gt;&lt;p&gt;At the same time, some artists are curious. A few have even tried tattooing side-by-side with the machine to see how it compares. One artist described it like watching a dinosaur stare at a meteor; he didn&apos;t think it would take over, but he knew it would change things. And in some cases, artists say the machine handles tedious jobs like fine lettering better than they can.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/tech/topics/innovation&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Blackdot has big plans&lt;/a&gt;. It&apos;s not just focused on tattoo shops. The company wants to put machines in permanent makeup studios, high-end salons, barbershops and fashion stores. It also launched something called the Blackdot Gallery, where people can buy digital tattoo art that can be turned into real tattoos. You can even trade and collect tattoos the way you might trade digital art or collectibles.&lt;/p&gt;&lt;p&gt;The AI tattoo machine isn&apos;t here to erase tradition. It&apos;s here to expand it. It offers new ways to create, new ways to connect, and a more comfortable experience for people who have always wanted a tattoo but held back. But it also raises big questions about what we value in a tattoo. Is it the art itself, or the artist behind it?&lt;/p&gt;&lt;p&gt;So what about you? Would you let a robot give you your next tattoo, or do you still want a human touch behind every drop of ink? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>
  76.                        
  77.  
  78.                        
  79.                            
  80.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/tattoo-machine-cyberguy.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  81.                            
  82.                        
  83.  
  84.                        <category domain="foxnews.com/metadata/dc.identifier">fdfc3376-4c44-57fc-8c68-b6866654b9da</category>
  85.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  86.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  87.  
  88.                        
  89.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  90.                        
  91.                            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
  92.                        
  93.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/innovation</category>
  94.                        
  95.  
  96.                        
  97.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  98.                        
  99.                        <category domain="foxnews.com/content-type">article</category>
  100.  
  101.                        <pubDate>Mon, 14 Jul 2025 13:00:12 -0400</pubDate>
  102.                    </item>
  103.                
  104.            
  105.                
  106.                    <item>
  107.                        <link>https://www.foxnews.com/tech/malicious-browser-extensions-caught-spying-2-million-users</link>
  108.                        <guid isPermaLink="true">https://www.foxnews.com/tech/malicious-browser-extensions-caught-spying-2-million-users</guid>
  109.                        <title>Malicious browser extensions caught spying on 2 million users</title>
  110.  
  111.                        <description>Attackers have started to exploit the very signals that users assume will keep them safe when it comes to add-ons to improve productivity or entertainment.</description>
  112.                        
  113.                        
  114.                            <content:encoded>&lt;p&gt;Every day, millions of people &lt;a href=&quot;https://www.foxnews.com/tech&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;install tiny browser add-ons&lt;/a&gt; they believe will improve productivity or entertainment. With so many options available on the Chrome Web Store, users often rely on trust markers like install counts, user reviews and developer reputation to make their choice. Many glance at shiny verification badges and five-star ratings, assume the vetting process was solid, and click &quot;Install&quot; without thinking twice.&lt;/p&gt;&lt;p&gt;But attackers have started to exploit these very signals. Researchers recently uncovered a campaign where 18 browser extensions, all listed on the official Chrome and Edge Web Stores, tracked users’ online activity. These extensions had already racked up more than 2 million installs.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Koi Security researchers discovered that attackers used long-term, strategic tactics to weaponize browser extensions. First, they released functional and legitimate utilities to gain user trust. Over time, these extensions collected positive reviews and built a solid reputation. Then, after months or even years of quiet operation, the attackers pushed a silent update that injected malicious scripts into the trusted codebase.&lt;/p&gt;&lt;p&gt;Since these updates came directly from official sources, they easily bypassed corporate firewalls. Unlike phishing emails or shady downloads, the malicious code arrived through routine, automatic updates and raised no immediate red flags.&lt;/p&gt;&lt;p&gt;As the investigation progressed, researchers &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;traced suspicious traffic&lt;/a&gt; back to a seemingly harmless color picker extension. This led them to a cluster of connected domains, each acting as a command and control hub. These servers recorded every URL users visited and issued commands to force redirects to fake websites or ad-heavy landing pages.&lt;/p&gt;&lt;p&gt;Next, the team analyzed the extension’s code more closely and uncovered matching fingerprints in several unrelated tools. These included weather widgets, emoji keyboards, video speed controllers and volume boosters. Although they appeared different on the surface, they shared underlying code and behavior.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/how-432-robots-relocating-7500-ton-historic-building&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HOW 432 ROBOTS ARE RELOCATING A 7,500-TON HISTORIC BUILDING&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Together, these extensions reached over two million installations. To avoid detection, the attackers used separate branding and categories for each one, making it difficult for marketplace monitors to spot patterns. Even more concerning, many of the extensions carried a verified badge, which shows how attackers manipulated automated review systems using malicious version updates.&lt;/p&gt;&lt;p&gt;The first priority for affected users is immediate removal of the listed extensions, followed by thorough cache clearing and full system scans. Check your computer to see if you have any of these malicious extensions, and if you do, get rid of them. &lt;/p&gt;&lt;p&gt;If you have any of the extensions linked to the RedDirection campaign installed, take these steps right away to &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/privacy&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;protect your data and devices&lt;/a&gt;:&lt;/p&gt;&lt;p&gt;&lt;strong&gt;1) Check your accounts for unusual activity:&lt;/strong&gt; If you accessed sensitive sites (like online banking) while the extension was active, review those accounts for suspicious behavior and change your passwords immediately. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-is-ai-artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT IS ARTIFICIAL INTELLIGENCE (AI)?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Check out the best expert-reviewed password managers of 2025 at&lt;strong&gt; &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Passwords&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;2) Enable two-factor authentication (2FA):&lt;/strong&gt; Add an extra layer of security to your accounts by turning on 2FA wherever it’s supported. It can prevent unauthorized access even if your password is compromised.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;3) Use strong antivirus software: &lt;/strong&gt;Even though these malicious extensions come from official stores and update automatically, strong antivirus software can help detect suspicious activities such as hidden trackers, injected scripts or unauthorized redirects. Antivirus adds a crucial layer of protection by scanning for threats that browsers alone might miss, but it should be combined with safe browsing habits for best results.&lt;/p&gt;&lt;p&gt;Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android &amp;amp; iOS devices at &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com/LockUpYourTech&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;4) Reset your browser settings:&lt;/strong&gt; Restoring your browser to its default state can reverse unwanted changes to your homepage, search engine or other settings.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;GET FOX BUSINESS ON THE GO BY CLICKING HERE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;5) Watch for security alerts: &lt;/strong&gt;Keep an eye on your email and texts for login warnings or access alerts from services you use. These can help you spot unauthorized activity early.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;6) Use a browser with extension permission controls:&lt;/strong&gt; Some browsers let you limit what data extensions can access (e.g., &quot;only on click&quot; or &quot;only on specific sites&quot;). This can reduce the risk of future attacks.&lt;/p&gt;&lt;p&gt;Browser extensions can be helpful, but they also carry hidden risks. As this case shows, even trusted tools from official stores can turn malicious without warning. That is why it pays to stay alert, review your extensions regularly, and use strong antivirus protection. A few simple habits can go a long way in keeping your browser and your personal data safe.&lt;/p&gt;&lt;p&gt;Do you rely on ratings and reviews when choosing extensions, or do you dig deeper?  Let us know by writing us at&lt;strong&gt; &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>
  115.                        
  116.  
  117.                        
  118.                            
  119.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/3-malicious-browser-extensions-caught-spying-on-2-million-users-outro.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  120.                            
  121.                        
  122.  
  123.                        <category domain="foxnews.com/metadata/dc.identifier">6680a13f-cd1b-5f1b-b2f6-ec7142578651</category>
  124.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  125.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  126.  
  127.                        
  128.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  129.                        
  130.                            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/google</category>
  131.                        
  132.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
  133.                        
  134.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
  135.                        
  136.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
  137.                        
  138.  
  139.                        
  140.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  141.                        
  142.                        <category domain="foxnews.com/content-type">article</category>
  143.  
  144.                        <pubDate>Mon, 14 Jul 2025 10:00:52 -0400</pubDate>
  145.                    </item>
  146.                
  147.            
  148.                
  149.                    <item>
  150.                        <link>https://www.foxnews.com/tech/worlds-most-powerful-digital-camera-captures-historic-first-images</link>
  151.                        <guid isPermaLink="true">https://www.foxnews.com/tech/worlds-most-powerful-digital-camera-captures-historic-first-images</guid>
  152.                        <title>World’s most powerful digital camera captures historic first images</title>
  153.  
  154.                        <description>Located on Cerro Pachón in Chile, the world&amp;apos;s most powerful digital camera is set to transform how we see the universe.</description>
  155.                        
  156.                        
  157.                            <content:encoded>&lt;p&gt;The Vera C. Rubin Observatory has just released its first images, captured by the world&apos;s most powerful digital camera. Located on Cerro Pachón in Chile, this camera is set to transform &lt;a href=&quot;https://www.foxnews.com/science&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;how we see the universe&lt;/a&gt;. After years of planning and building, the observatory is ready to deliver stunning, ultra-detailed views of the night sky.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;What makes this camera so special? It has a massive 3.2-gigapixel sensor made up of 201 individual imaging sensors. Each sensor captures 16-megapixel images, all combined to create incredibly detailed photos. The camera takes quick 15-second exposures every 20 seconds, capturing light from ultraviolet to near-infrared wavelengths. This means it can see far beyond what previous telescopes could.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/how-432-robots-relocating-7500-ton-historic-building&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HOW 432 ROBOTS ARE RELOCATING A 7,500-TON HISTORIC BUILDING&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The journey started more than 20 years ago, led by the U.S. Department of Energy&apos;s SLAC National Accelerator Laboratory. After sharing early designs in 2015 and assembling the camera by 2020, the final build was completed in early 2025. The camera, roughly the size of a small car and weighing 6,600 pounds, was installed on the Simonyi Survey Telescope in March 2025. This marked a major milestone for the international team involved.&lt;/p&gt;&lt;p&gt;The first images show breathtaking views of the Trifid Nebula and Lagoon Nebula, captured over a seven-hour period. These pictures reveal faint details that were previously invisible. In just 10 hours of testing, the observatory captured millions of galaxies, stars, and thousands of asteroids. This is just a preview of what&apos;s to come during the upcoming 10-year Legacy Survey of Space and Time (LSST).&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-is-ai-artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT IS ARTIFICIAL INTELLIGENCE (AI)?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The Rubin Observatory isn&apos;t just about pretty pictures. It will collect more data in its first year than all previous optical telescopes combined. Scientists will use this data to study dark matter and dark energy, which make up most of the universe but remain mysterious. The observatory will also discover millions of new asteroids and comets, improving our understanding of the solar system and helping with planetary defense.&lt;/p&gt;&lt;p&gt; &lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;GET FOX BUSINESS ON THE GO BY CLICKING HERE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;This camera and observatory are transforming the field of astronomy. Because it can scan the entire Southern Hemisphere sky every few nights, scientists will soon have an incredibly detailed, &lt;a href=&quot;https://www.foxnews.com/tech&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;time-lapse record of the universe&lt;/a&gt;. The wealth of data collected will drive discoveries for years to come, spark new research, and help us understand the cosmos in ways that were never possible before.&lt;/p&gt;&lt;p&gt;The release of these first images is just the beginning. The Vera C. Rubin Observatory&apos;s powerful camera will change how we explore space, uncovering &lt;a href=&quot;https://www.foxnews.com/category/science/air-and-space&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;secrets of the universe&lt;/a&gt; and potentially protecting Earth from asteroid impacts. Stay tuned as this exciting project continues to open new windows on the cosmos.&lt;/p&gt;&lt;p&gt;If you had access to this groundbreaking camera, what moment in history would you capture, and why do you think it would change how we see the world? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com.  All rights reserved. &lt;/p&gt;</content:encoded>
  158.                        
  159.  
  160.                        
  161.                            
  162.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/2-worlds-most-powerful-digital-camera-captures-historic-first-images.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  163.                            
  164.                        
  165.  
  166.                        <category domain="foxnews.com/metadata/dc.identifier">bf331c20-91a9-5fcf-911c-99066f1510b1</category>
  167.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  168.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  169.  
  170.                        
  171.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  172.                        
  173.                            <category domain="foxnews.com/taxonomy">fox-news/science</category>
  174.                        
  175.                            <category domain="foxnews.com/taxonomy">fox-news/science/air-and-space</category>
  176.                        
  177.  
  178.                        
  179.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  180.                        
  181.                        <category domain="foxnews.com/content-type">article</category>
  182.  
  183.                        <pubDate>Mon, 14 Jul 2025 06:00:23 -0400</pubDate>
  184.                    </item>
  185.                
  186.            
  187.                
  188.                    <item>
  189.                        <link>https://www.foxnews.com/tech/vertical-tiny-homes-redefine-compact-living</link>
  190.                        <guid isPermaLink="true">https://www.foxnews.com/tech/vertical-tiny-homes-redefine-compact-living</guid>
  191.                        <title>Vertical tiny homes redefine compact living</title>
  192.  
  193.                        <description>The innovative DQ Tower stands 28 feet tall with 420 square feet of living space, featuring floor-to-ceiling windows and premium amenities in a prefabricated design.</description>
  194.                        
  195.                        
  196.                            <content:encoded>&lt;p&gt;Have you ever thought your dream house could offer skyline views without sacrificing style or space? &lt;/p&gt;&lt;p&gt;Do you prefer the verticality of city apartments but wish you could also own a standalone home? These innovative prefab towers from the German company Moduleform make that possible. &lt;/p&gt;&lt;p&gt;Named the DQ Tower, this micro-living residence is designed for backyards and small urban lots. With three stories, two bedrooms, two bathrooms, and high-end built-in features, it brings a sleek new take on &lt;a href=&quot;https://www.foxnews.com/category/house-and-home&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;compact living&lt;/a&gt;, even if it comes at a premium price.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/how-432-robots-relocating-7500-ton-historic-building&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;HOW 432 ROBOTS ARE RELOCATING A 7,500-TON HISTORIC BUILDING&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;With three full stories of living space, the DQ Tower stands over 28 feet tall. However, all that vertical space only takes up a footprint of just 13 by 13 feet. It&apos;s designed for tight urban plots or &lt;a href=&quot;https://www.foxnews.com/category/lifestyle/real-estate/outdoor-living&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;backyard spaces&lt;/a&gt;, and instead of spreading out like a traditional mobile tiny home, it rises straight up.&lt;/p&gt;&lt;p&gt;The ground floor opens up into a spacious living and dining area. A comfy sofa pulls double duty as both seating and an optional spare sleeping space. A comfortable dining nook sits next to a kitchenette complete with an induction stove, sink, and refrigerator. The floor-to-ceiling glass windows give plenty of natural light and open up the space even further. The ground floor rounds out with a half bathroom with a convenient washing machine included.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-is-ai-artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT IS ARTIFICIAL INTELLIGENCE (AI)?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Climbing the staircase to the second floor, you will find the first cozy bedroom complete with a single bed and a built-in wardrobe. On the second floor is also a full bathroom with a standing shower. And yes, the ceilings are quite tall and spacious, avoiding the cramped loft designs of other tiny homes.&lt;/p&gt;&lt;p&gt;The third floor is the showstopper. As you ascend the steel and wood staircase, the master bedroom sits comfortably with a double bed, an even larger wardrobe, and a small desk for a working area. The tall windows up here continue to provide light and ventilation, making the most of the compact space while providing breathtaking views.&lt;/p&gt;&lt;p&gt;In total, the DQ Tower offers nearly 420 square feet of living space. That is a reasonable accommodation for a couple or small family, or anyone who appreciates the efficiency of downsizing. Another option, and one that the manufacturers advertise, is the DQ Tower, which fits comfortably in the backyard, making for a cost-effective and low-impact guest house, perfect for rental sites like Airbnb.  And with two bathrooms and two bedrooms, it&apos;s surprisingly livable for such a small footprint.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;GET FOX BUSINESS ON THE GO BY CLICKING HERE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The major convenience and cost-cutting feature of these tiny tower homes is that &lt;a href=&quot;https://www.foxnews.com/category/real-estate/home-innovation&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;they come prefabricated&lt;/a&gt;. They are built off-site in Germany, transported to the site, and settled into place with a small crane crew. As of now, it takes about eight months from order to delivery. The whole structure is constructed with a sturdy steel frame, well-insulated walls, and clad in chic aluminum panels.&lt;/p&gt;&lt;p&gt;The starting price for these private towers is currently roughly $176,000.   Now, that is nearly twice the per-square-foot cost of other tiny homes. However, the DQ Tower offers ultra-high-quality, designer-level micro-living with a sleek and accommodating design.&lt;/p&gt;&lt;p&gt;The DQ Tower is more than just a tiny home. It offers a bold vision for how people can live in smaller spaces without giving up comfort or style. Although it is not currently available in the United States, it provides a clear picture of where compact, vertical living could be headed. As cities become more crowded and backyard space gains value, this European design could inspire the next generation of American prefab housing.&lt;/p&gt;&lt;p&gt;Would you trade square footage for sky-high design if it meant living smarter, smaller, and more sustainably? Let us know by writing us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;u&gt; &lt;/u&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>
  197.                        
  198.  
  199.                        
  200.                            
  201.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/1-vertical-tiny-homes-redefine-compact-living.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  202.                            
  203.                        
  204.  
  205.                        <category domain="foxnews.com/metadata/dc.identifier">8b7e4349-2c8f-5990-b5e2-3ffebc0ba5a7</category>
  206.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  207.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  208.  
  209.                        
  210.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  211.                        
  212.                            <category domain="foxnews.com/taxonomy">fox-news/us/economy/housing</category>
  213.                        
  214.                            <category domain="foxnews.com/taxonomy">fox-news/auto/attributes/innovations</category>
  215.                        
  216.                            <category domain="foxnews.com/taxonomy">fox-news/real-estate</category>
  217.                        
  218.                            <category domain="foxnews.com/taxonomy">fox-news/lifestyle</category>
  219.                        
  220.  
  221.                        
  222.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  223.                        
  224.                        <category domain="foxnews.com/content-type">article</category>
  225.  
  226.                        <pubDate>Sun, 13 Jul 2025 16:00:31 -0400</pubDate>
  227.                    </item>
  228.                
  229.            
  230.                
  231.                    <item>
  232.                        <link>https://www.foxnews.com/tech/new-tech-helps-robots-see-inside-sealed-boxes</link>
  233.                        <guid isPermaLink="true">https://www.foxnews.com/tech/new-tech-helps-robots-see-inside-sealed-boxes</guid>
  234.                        <title>New technology helps robots see inside sealed boxes</title>
  235.  
  236.                        <description>A new mmWave imaging system allows warehouse robots to scan and create 3D models of objects inside sealed containers, potentially revolutionizing shipping processes.</description>
  237.                        
  238.                        
  239.                            <content:encoded>&lt;p&gt;Why would you want a robot to see inside a sealed box?&lt;/p&gt;&lt;p&gt;Digging deeper beyond the initial creepy thought, a new &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/mit&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;breakthrough from MIT&lt;/a&gt; could soon let warehouse robots do something pretty remarkable. This high-tech wave technology can detect damage inside sealed cardboard boxes without ever opening them. &lt;/p&gt;&lt;p&gt;Using millimeter wave (mmWave) imaging, the same type of signal used in Wi-Fi, the researchers developed a system called mmNorm. There’s nothing normal about this superpower. This &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/robots&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;technology allows robots to scan&lt;/a&gt; containers and generate accurate 3D models of the objects inside by analyzing how signals bounce back from hidden surfaces.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/noninvasive-brain-tech-ai-moves-robotic-hand-thought&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;NONINVASIVE BRAIN TECH AND AI MOVES ROBOTIC HAND WITH THOUGHT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Millimeter waves are particularly effective at penetrating materials such as cardboard, plastic and even interior walls. When these waves hit an object inside a box, they reflect. The mmNorm system captures these reflections and feeds them into an algorithm that estimates the shape and direction of the surface of the hidden item. &lt;/p&gt;&lt;p&gt;Unlike traditional radar systems, mmNorm accounts for a challenging property called specularity, which refers to the way radio waves bounce off shiny or angled surfaces, much like a mirror. By estimating the surface normal (the direction a surface is facing), the system&apos;s accuracy improves dramatically. The method combines reflections from multiple antennas that &quot;vote&quot; on the surface normal direction based on signal strength, improving the accuracy of the 3D reconstruction. &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-is-ai-artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT IS ARTIFICIAL INTELLIGENCE (AI)?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;What makes mmNorm different is its clever use of physics. Instead of ignoring reflections that bounce away from the radar (as most systems do), it captures them to infer the shape and orientation of hidden surfaces. Lead author Laura Dodds explained that the system doesn&apos;t just track where a signal comes from. It also analyzes the direction the surface is facing. To do this, the MIT team used a robotic arm equipped with a radar unit. As it moved around a sealed box, it gathered multiple measurements, building a detailed 3D picture of what was inside. &lt;/p&gt;&lt;p&gt;During testing, mmNorm achieved 96% accuracy in reconstructing complex items, such as power drills and silverware. That&apos;s a big jump compared to the 78% accuracy offered by similar systems. In a warehouse setting, this means robotic arms could inspect the contents of packages moving down a conveyor belt without unpacking them. &lt;/p&gt;&lt;p&gt;It also opens the door for humanoid robots to roam warehouses and assess packages for damage or missing parts in real time. However, &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/smart-and-safe-tech&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;the technology&lt;/a&gt; does not work well for objects hidden behind metal or very thick walls, which limits some applications.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;GET FOX BUSINESS ON THE GO BY CLICKING HERE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Beyond warehouse automation, this technology opens the door to several other promising uses. In factory production lines, robots that detect damage inside boxes could inspect goods quickly and without opening packages, helping maintain high-quality standards. &lt;/p&gt;&lt;p&gt;In assisted-living centers, the same approach might help ensure safety by checking the contents of containers without disturbing residents. Even in security screening, being able to see through sealed boxes could enhance threat detection without adding any strain on bandwidth since the system uses the same mmWave signals as existing technologies. The research team plans to further improve the resolution of mmNorm and boost its performance on less reflective objects, making it even more versatile for future applications.&lt;/p&gt;&lt;p&gt;We may be entering an era where robots don&apos;t just move boxes, but they understand what&apos;s in them. MIT&apos;s mmNorm system offers a glimpse into the future of warehouse efficiency, safety and automation. And if robots can detect damage inside boxes without opening them, that might just change how everything gets shipped, sorted and delivered.&lt;/p&gt;&lt;p&gt;Are we ready to trust machines to judge what&apos;s damaged and what&apos;s not without ever opening the box? Let us know by writing us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;u&gt; &lt;/u&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>
  240.                        
  241.  
  242.                        
  243.                            
  244.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/1-new-tech-helps-robots-detect-damage-inside-sealed-boxes.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  245.                            
  246.                        
  247.  
  248.                        <category domain="foxnews.com/metadata/dc.identifier">8792c0bf-827f-500a-a028-3828243388b2</category>
  249.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  250.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  251.  
  252.                        
  253.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  254.                        
  255.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/innovation</category>
  256.                        
  257.                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/robots</category>
  258.                        
  259.                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/3d</category>
  260.                        
  261.                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/wifi</category>
  262.                        
  263.  
  264.                        
  265.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  266.                        
  267.                        <category domain="foxnews.com/content-type">article</category>
  268.  
  269.                        <pubDate>Sun, 13 Jul 2025 14:00:12 -0400</pubDate>
  270.                    </item>
  271.                
  272.            
  273.                
  274.                    <item>
  275.                        <link>https://www.foxnews.com/tech/5-steps-protect-your-finances-from-family-scams</link>
  276.                        <guid isPermaLink="true">https://www.foxnews.com/tech/5-steps-protect-your-finances-from-family-scams</guid>
  277.                        <title>5 steps to protect your finances from family scams</title>
  278.  
  279.                        <description>Family fraud endangers seniors when relatives exploit their trust, but removing personal data online and monitoring identity can prevent financial harm to aging parents.</description>
  280.                        
  281.                        
  282.                            <content:encoded>&lt;p&gt;You’d like to believe no one in your family could ever scam &lt;a href=&quot;https://www.foxnews.com/category/us/education/parents&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;your parents&lt;/a&gt;. But what if the danger isn’t a stranger at all? What if it’s someone they already trust? What if it’s even your sibling or an estranged uncle in need of money? According to the AARP, seniors in America lose over $28 billion every year to fraud.&lt;/p&gt;&lt;p&gt;Shockingly, 70% of it comes from people they know — family members, neighbors, caregivers and &quot;friends.&quot;&lt;/p&gt;&lt;p&gt;If you’ve got aging parents or grandparents, it’s time to take action. People in your circle can cause serious financial damage, known as family fraud, if you’re not careful. And, worse yet, almost 90% of family fraud doesn’t get reported by seniors due to shame, fear and potential repercussions. Here’s a simple five-step plan to protect your loved ones before someone you thought you could trust takes advantage of them.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/medicare-data-breach-exposes-100000-americans-info&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;MEDICARE DATA BREACH EXPOSES 100,000 AMERICANS&apos; INFO&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;It’s not just shady scammers in faraway places. Most elder fraud happens close to home. These fraudsters know eerily specific details about seniors, their children, grandchildren, past occupations and even retirement funds.&lt;/p&gt;&lt;p&gt;The most common cases involve:&lt;/p&gt;&lt;p&gt;If your family has tension, estranged members or unresolved drama, your parents could be prime targets. Recognizing this risk is the first essential step to prevention.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-is-ai-artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT IS ARTIFICIAL INTELLIGENCE (AI)?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Data broker sites sell seniors’ personal information by the bundle. We’re talking phone numbers, emails, home addresses, income estimates and even political views, all listed online for pennies. Armed with those details, scammers can impersonate a relative, hack an account or manipulate your loved ones over the phone.&lt;/p&gt;&lt;p&gt;Think about how easy it is for an estranged family member to get updates about your parents’ lives and financial status. Limit how much your parents share online or delete such information to prevent it from appearing on people search sites. Ultimately, controlling what&apos;s available online is one of the most effective ways to protect seniors from &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;identity theft&lt;/a&gt;, fraud and unwanted contact.&lt;/p&gt;&lt;p&gt;The good news is that you can protect your elderly family members from a lot of trouble. Start by searching for your parents&apos; names on Google. If their phone number or address appears on shady people search sites, have it removed. The problem is that there are hundreds of these data broker sites, and most make it a nightmare to opt out.&lt;/p&gt;&lt;p&gt;That’s where a personal data removal service comes in. They automatically contact these data brokers and force them to delete personal information, including your parents’.&lt;/p&gt;&lt;p&gt;It works in the background and covers dozens of the worst offenders. I personally use it for my family, and it’s one of the smartest, simplest ways to keep personal data out of the wrong hands.&lt;/p&gt;&lt;p&gt;While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, but neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  &lt;/p&gt;&lt;p&gt;By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;GET FOX BUSINESS ON THE GO BY CLICKING HERE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Delete&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;br&gt;&lt;br&gt;&lt;i&gt;&lt;strong&gt;Get a free scan to find out if your personal information is already out on the web: &lt;u&gt;Cyberguy.com/FreeScan&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;One of the easiest ways for scammers to reach and manipulate seniors is through phone calls. A friendly voice claiming to be a long-lost cousin or someone pretending to be a financial advisor goes a long way. If your parents’ landline or cell number is publicly listed, it’s a ticking time bomb.&lt;/p&gt;&lt;p&gt;You can:&lt;/p&gt;&lt;p&gt;The fewer ways fraudsters can reach your loved ones, the better.&lt;/p&gt;&lt;p&gt;Data removal tools, such as Incogni, should be your first line of defense. But for additional peace of mind, you can add free tools like credit freezes and bank alerts. Identity monitoring services can also alert you if your parents’ Social Security number, name or financial accounts are being misused.&lt;/p&gt;&lt;p&gt;See my tips and best picks on how to protect yourself from identity theft at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/IdentityTheft &lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/topic/family-and-friends&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Family fraud&lt;/a&gt; is one of those ugly, uncomfortable topics we tend to avoid. But trust me, the regret of not acting is far worse. Start today and remove your parents’ personal data from the web. Remember to unlist their phone number and lock down their sensitive information. Every measure helps your parents maintain control over their finances.&lt;/p&gt;&lt;p&gt;How comfortable do you feel discussing financial safety and privacy with your older relatives? What challenges have you faced in starting these conversations? Let us know by writing us at&lt;strong&gt; &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>
  283.                        
  284.  
  285.                        
  286.                            
  287.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/3-5-steps-to-protect-your-parents-from-family-fraud-before-its-too-late.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  288.                            
  289.                        
  290.  
  291.                        <category domain="foxnews.com/metadata/dc.identifier">5f279af5-d1c6-5c8e-9a69-d829e44a999a</category>
  292.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  293.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  294.  
  295.                        
  296.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  297.                        
  298.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
  299.                        
  300.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
  301.                        
  302.                            <category domain="foxnews.com/taxonomy">fox-news/us/personal-freedoms/privacy</category>
  303.                        
  304.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
  305.                        
  306.                            <category domain="foxnews.com/taxonomy">fox-news/entertainment/genres/family</category>
  307.                        
  308.  
  309.                        
  310.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  311.                        
  312.                        <category domain="foxnews.com/content-type">article</category>
  313.  
  314.                        <pubDate>Sun, 13 Jul 2025 07:00:45 -0400</pubDate>
  315.                    </item>
  316.                
  317.            
  318.                
  319.                    <item>
  320.                        <link>https://www.foxnews.com/tech/chatbots-losing-customer-trust-fast</link>
  321.                        <guid isPermaLink="true">https://www.foxnews.com/tech/chatbots-losing-customer-trust-fast</guid>
  322.                        <title>Chatbots are losing customer trust fast</title>
  323.  
  324.                        <description>A study analyzing 500,000 customer service interactions shows chatbots struggle with complex issues while human agents excel at matching customer communication styles.</description>
  325.                        
  326.                        
  327.                            <content:encoded>&lt;p&gt;Every day, customers reach out to companies. &lt;/p&gt;&lt;p&gt;They want to buy something, ask about an order, return a product or fix a payment issue. In the past, that usually meant talking to a real person on the phone or through a website. &lt;/p&gt;&lt;p&gt;Now, things are changing. More often, the first reply comes &lt;a href=&quot;https://www.foxnews.com/category/tech/chatgpt&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;from a chatbot&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/ai-learning-retention-does-chatgpt-help-hurt&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;AI AND LEARNING RETENTION: DOES CHATGPT HELP OR HURT?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;A chatbot is an &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;artificial intelligence&lt;/a&gt; tool designed to simulate real-time conversations with users. It operates around the clock, doesn&apos;t require breaks and can manage a high volume of requests simultaneously. For businesses, that sounds like an ideal solution. It&apos;s no surprise that the chatbot market has surged from $370 million in 2017 to $2.2 billion in 2024. Many companies now rely on chatbots as the first point of contact for customer service. Despite the convenience, not all customers are on board.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-is-ai-artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT IS ARTIFICIAL INTELLIGENCE (AI)?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;While companies are excited about the speed and efficiency of chatbots, many customers are not. A recent survey found that 71% of people would rather speak with a human agent. Even more concerning, 60% said chatbots often do not understand their issue. This is not just about getting the wrong answer. It comes down to trust. Most people are still unsure about artificial intelligence, especially when their time or money is on the line.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-is-chatgpt&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT IS CHATGPT?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Not every customer question is the same. Some are simple and quick. Others are more complex or personal. And that&apos;s where chatbots fall short. A recent survey showed that 47% of people were OK with a company using their purchase history for marketing. But only 9% were OK with the company using their financial information. That&apos;s a big difference. When things feel more sensitive or serious, people want a real person to help.&lt;/p&gt;&lt;p&gt;To better understand how people really interact with chatbots and human agents, researcher Vivek Astvansh partnered with a large North American retailer and analyzed more than 500,000 &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/help-desk&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;customer service chats&lt;/a&gt;. The findings are detailed in his peer-reviewed study, &quot;Insights from Customers&apos; Chats with Bots and Human Agents.&quot;&lt;/p&gt;&lt;p&gt;The study found that most inquiries fell into one of six categories: orders, coupons, products, shipping, account issues and payments. When customers had questions about detailed or sensitive topics, such as shipping or payment issues, they were far more likely to seek out a human agent rather than rely on a chatbot. Astvansh&apos;s research also revealed that human agents were more effective at matching the content and communication style of the customer than chatbots. &lt;/p&gt;&lt;p&gt;This similarity in language and topic focus led to stronger rapport between customer and agent. In fact, the closer the agent&apos;s responses aligned with the dominant topic of the conversation, the faster and more frequently customers replied. The data suggests that customers feel more engaged when they sense they are being understood, which is a key driver of satisfaction during service interactions.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;GET FOX BUSINESS ON THE GO BY CLICKING HERE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;So, how can businesses use these insights to improve customer service? Not every customer issue should be handled by a chatbot. Companies should determine the intent behind each inquiry before deciding whether it should be routed to a bot or a human. &lt;/p&gt;&lt;p&gt;Human agents already know how to mirror a customer&apos;s tone and focus. For chatbots to succeed, they must be trained to recognize and adapt to customer intent and language patterns. While this doesn&apos;t come naturally to machines, it can be programmed using machine-learning models like those used in the study. &lt;/p&gt;&lt;p&gt;If a company is investing in a chatbot system, it should track how well that system performs. Businesses should ask chatbot vendors to provide real-world data showing how their bots compare to human agents in terms of efficiency, accuracy and customer satisfaction. If the technology cannot meet a high standard, it may not be worth the investment.&lt;/p&gt;&lt;p&gt;AI tools, such as chatbots, are helpful and are not going away anytime soon. But customers still want to feel heard and understood. That usually means talking to a real person. The best approach is not to replace humans but to use both people and technology in the right ways. Let the chatbot handle the quick stuff. Bring in the human when the conversation really matters.&lt;/p&gt;&lt;p&gt;If you had an important issue to resolve, would you feel confident putting your trust in a chatbot? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact &lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>
  328.                        
  329.  
  330.                        
  331.                            
  332.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/2-chatbots-are-losing-customer-trust-fast.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  333.                            
  334.                        
  335.  
  336.                        <category domain="foxnews.com/metadata/dc.identifier">ca4f4fba-31f8-5345-a323-9759d5c7d136</category>
  337.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  338.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  339.  
  340.                        
  341.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  342.                        
  343.                            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
  344.                        
  345.                            <category domain="foxnews.com/taxonomy">fox-news/tech/chatgpt</category>
  346.                        
  347.  
  348.                        
  349.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  350.                        
  351.                        <category domain="foxnews.com/content-type">article</category>
  352.  
  353.                        <pubDate>Sun, 13 Jul 2025 05:00:00 -0400</pubDate>
  354.                    </item>
  355.                
  356.            
  357.                
  358.                    <item>
  359.                        <link>https://www.foxnews.com/tech/solar-powered-robot-zaps-weeds-without-chemicals</link>
  360.                        <guid isPermaLink="true">https://www.foxnews.com/tech/solar-powered-robot-zaps-weeds-without-chemicals</guid>
  361.                        <title>Solar-powered robot zaps weeds without chemicals</title>
  362.  
  363.                        <description>Aigen&amp;apos;s Element robot uses solar power and AI to provide farmers with a sustainable alternative to herbicides, working efficiently in cotton and soy fields.</description>
  364.                        
  365.                        
  366.                            <content:encoded>&lt;p&gt;Out in the California sun, a new kind of farmhand is hard at work. Powered by solar energy and guided by &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;artificial intelligence&lt;/a&gt;, the solar-powered weeding robot for cotton fields is offering farmers a smarter and more sustainable way to tackle weeds. &lt;/p&gt;&lt;p&gt;This technology is arriving just in time, as growers across the country face a shortage of available workers and weeds that are becoming increasingly resistant to herbicides.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/job-killing-robot-learns-work-its-coming-factory-floor&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;JOB-KILLING ROBOT LEARNS AT WORK, AND IT’S COMING TO THE FACTORY FLOOR&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Farmers everywhere are facing a tough reality. There simply aren&apos;t enough people willing to do the backbreaking work of weeding fields, and the weeds themselves are getting harder to kill with chemicals. Many farmers would rather avoid using herbicides, but until now, they haven&apos;t had a practical alternative. Kenny Lee, CEO of Aigen, puts it plainly: farmers don&apos;t love chemicals, but they use them because it&apos;s often the only tool available. Aigen&apos;s mission is to give them a better choice.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-is-ai-artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT IS ARTIFICIAL INTELLIGENCE (AI)?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Aigen&apos;s Element robot is designed to meet the real-world needs of modern agriculture. It runs entirely on &lt;a href=&quot;https://www.foxnews.com/category/science/air-and-space/sun&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;solar power&lt;/a&gt;, which means farmers can save money on fuel while also reducing their environmental impact. The robot uses advanced AI and onboard cameras to spot and remove weeds with impressive accuracy, all without damaging the crops. Its rugged design allows it to handle rough terrain and changing weather, and it can work alongside &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/robots&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;other robots&lt;/a&gt;, communicating wirelessly to cover large fields efficiently. The Element robot isn&apos;t limited to cotton; it&apos;s also being used in soy and sugar beet fields, showing just how versatile this technology can be.&lt;/p&gt;&lt;p&gt;At Bowles Farm in California&apos;s Central Valley, Element robots are already proving their worth. These robots are keeping cotton fields weed-free without the need for chemicals, freeing up workers to focus on more skilled tasks and helping farmers manage their operations more efficiently. The technology is not just a promise for the future. It&apos;s delivering real results today. &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;GET FOX BUSINESS ON THE GO BY CLICKING HERE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Switching to solar-powered, AI-driven robots brings a host of benefits. Farmers no longer need to rely on herbicides, which leads to cleaner crops and healthier soil. Labor costs can drop since workers can shift from manual weeding to supervising and maintaining the robots. The robots also collect valuable data on crop health, pests and diseases, giving farmers better information to make decisions. And because the robots run on solar power, farms can reduce their carbon footprint while saving money on energy.&lt;/p&gt;&lt;p&gt;Aigen&apos;s Element robot goes beyond being just another cool piece of technology. It really shows what can happen when farming and innovation come together. As more growers start using solar-powered robots like this, chemical-free fields are moving from wishful thinking to something we can actually achieve.&lt;/p&gt;&lt;p&gt;Would you feel comfortable trusting a robot to handle important tasks and help shape the future of how we grow our food? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact &lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>
  367.                        
  368.  
  369.                        
  370.                            
  371.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/1-solar-powered-robot-zaps-weeds-without-chemicals.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  372.                            
  373.                        
  374.  
  375.                        <category domain="foxnews.com/metadata/dc.identifier">c3726619-87ab-596a-9ddc-0452e6ecec67</category>
  376.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  377.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  378.  
  379.                        
  380.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  381.                        
  382.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/innovation</category>
  383.                        
  384.                            <category domain="foxnews.com/taxonomy">fox-news/us/us-regions/west/california</category>
  385.                        
  386.                            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
  387.                        
  388.                            <category domain="foxnews.com/taxonomy">fox-news/lifestyle</category>
  389.                        
  390.                            <category domain="foxnews.com/taxonomy">fox-news/science</category>
  391.                        
  392.  
  393.                        
  394.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  395.                        
  396.                        <category domain="foxnews.com/content-type">article</category>
  397.  
  398.                        <pubDate>Sat, 12 Jul 2025 15:00:31 -0400</pubDate>
  399.                    </item>
  400.                
  401.            
  402.                
  403.                    <item>
  404.                        <link>https://www.foxnews.com/tech/ai-newsletter-trump-cabinet-official-impersonated</link>
  405.                        <guid isPermaLink="true">https://www.foxnews.com/tech/ai-newsletter-trump-cabinet-official-impersonated</guid>
  406.                        <title>Fox News AI Newsletter: Trump Cabinet official impersonated</title>
  407.  
  408.                        <description>Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.</description>
  409.                        
  410.                        
  411.                            <content:encoded>&lt;p&gt;IN TODAY&apos;S NEWSLETTER:&lt;/p&gt;&lt;p&gt;- State Department investigating Rubio AI impersonator who contacted US, foreign officials&lt;br&gt;- Robots and artificial intelligence are transforming jobs from manufacturing to sports&lt;br&gt;- Artificial intelligence drives demand for electric grid update&lt;/p&gt;&lt;p&gt;&lt;strong&gt;DIGITAL DECEPTION:&lt;/strong&gt; The State Department is investigating an impostor who reportedly pretended to be Secretary of State &lt;a href=&quot;https://www.foxnews.com/politics/state-department-investigating-rubio-ai-impersonator-who-contacted-us-foreign-officials&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Marco Rubio&lt;/u&gt;&lt;/a&gt; with the help of AI. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;TECH SHIFT:&lt;/strong&gt; &lt;a href=&quot;https://www.foxbusiness.com/technology/how-robots-artificial-intelligence-transforming-jobs-from-manufacturing-sports&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Artificial Intelligence and automation&lt;/a&gt; are often used interchangeably. While the technologies are similar, the concepts are different. Automation is often used to reduce human labor for routine or predictable tasks, while A.I. simulates human intelligence that can eventually act independently.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;HUNGRY TECH:&lt;/strong&gt; In order to supply the increasing demand and continue advancing A.I. technology, &lt;a href=&quot;https://www.foxbusiness.com/technology/artificial-intelligence-drives-demand-electric-grid-update&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;data centers&lt;/u&gt;&lt;/a&gt; are providing a 24-hour connection.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;MAJOR MALFUNCTION:&lt;/strong&gt; Grok, an AI chatbot built by &lt;a href=&quot;https://www.foxnews.com/category/person/elon-musk&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Elon &lt;/u&gt;&lt;/a&gt;&lt;a href=&quot;https://www.foxbusiness.com/media/elon-musks-ai-chatbot-grok-goes-antisemitic-tirade&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;Musk&lt;/u&gt;’s&lt;/a&gt; company xAI, went on a viral antisemitic tirade on Tuesday where it praised Adolf Hitler, accused Israel of being behind 9/11, referred to itself as &quot;mechaHitler&quot; and said that people with &quot;certain surnames&quot; should be rounded up and stripped of rights.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;MIND OVER MACHINES:&lt;/strong&gt; Noninvasive brain tech is transforming how people interact with robotic devices. Instead of relying on muscle movement, this technology allows a person to control a &lt;a href=&quot;https://www.foxnews.com/tech/noninvasive-brain-tech-ai-moves-robotic-hand-thought&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;robotic hand&lt;/u&gt;&lt;/a&gt; by simply thinking about moving his fingers. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;BRAIN DRAIN DANGER:&lt;/strong&gt; &lt;a href=&quot;https://www.foxnews.com/tech/ai-learning-retention-does-chatgpt-help-hurt&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Artificial intelligence and large language models,&lt;/a&gt; such as ChatGPT, are transforming how we learn. But what does this mean for AI and learning retention? While these tools provide instant answers and personalized support, experts are beginning to question whether this convenience might actually reduce our ability to retain knowledge in the long term.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;POWER PLAY SOLUTION: &lt;/strong&gt;&lt;a href=&quot;https://www.foxnews.com/tech/energy-sucking-ai-data-centers-can-look-here-power-instead&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Artificial intelligence&lt;/a&gt; is expanding quickly, and so is the energy required to run it. Modern AI data centers use much more electricity than traditional cloud servers. In many cases, the existing power grid cannot keep up. One innovative solution is gaining traction: repurposed EV batteries for AI data centers.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;AI ANGST:&lt;/strong&gt; Should we be alarmed by the acceleration of &quot;&lt;a href=&quot;https://www.foxnews.com/opinion/morning-glory-why-angst-about-ai&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;artificial intelligence&lt;/u&gt;&lt;/a&gt;&quot; (&quot;AI&quot;) and the &quot;large language models&quot; (LLMs) AI’s developers employ? &lt;/p&gt;&lt;p&gt;&lt;strong&gt;MEMORY MINER:&lt;/strong&gt; Google Photos has always been a handy way to store and organize your pictures, but its latest feature, Ask Photos, is taking things to &lt;a href=&quot;https://www.foxnews.com/tech/how-googles-ask-photos-uses-ai-find-pictures-you-want&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;a whole new level.&lt;/a&gt; &lt;/p&gt;&lt;p&gt;&lt;strong&gt;BACK TO BASICS: &lt;/strong&gt;The rise of &lt;a href=&quot;https://www.foxnews.com/tech/schools-turn-handwritten-exams-ai-cheating-surges&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;u&gt;artificial intelligence&lt;/u&gt;&lt;/a&gt; in education is forcing schools and universities to rethink everything from homework policies to how final exams are administered. With tools like ChatGPT now widespread, students can generate essays, solve complex math problems or draft lab reports in seconds, raising urgent questions about what authentic learning looks like in 2025. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;FOLLOW FOX NEWS ON SOCIAL MEDIA&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.facebook.com/FoxNews&quot;&gt;Facebook&lt;/a&gt;&lt;br&gt;&lt;a href=&quot;https://www.instagram.com/foxnews/&quot;&gt;Instagram&lt;/a&gt;&lt;br&gt;&lt;a href=&quot;https://www.youtube.com/c/FoxNews/featured&quot;&gt;YouTube&lt;/a&gt;&lt;br&gt;&lt;a href=&quot;https://twitter.com/FoxNews&quot;&gt;Twitter&lt;/a&gt;&lt;br&gt;&lt;a href=&quot;https://www.linkedin.com/company/fox-news-channel/&quot;&gt;LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;SIGN UP FOR OUR OTHER NEWSLETTERS&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/newsletters&quot;&gt;Fox News First&lt;/a&gt;&lt;br&gt;&lt;a href=&quot;https://www.foxnews.com/newsletters&quot;&gt;Fox News Opinion&lt;/a&gt;&lt;br&gt;&lt;a href=&quot;https://www.foxnews.com/newsletters&quot;&gt;Fox News Lifestyle&lt;/a&gt;&lt;br&gt;&lt;a href=&quot;https://www.foxnews.com/newsletters&quot;&gt;Fox News Health&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;DOWNLOAD OUR APPS&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;WATCH FOX NEWS ONLINE&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/go&quot;&gt;Fox News Go&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;STREAM FOX NATION&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://nation.foxnews.com/&quot;&gt;Fox Nation&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;</content:encoded>
  412.                        
  413.  
  414.                        
  415.                            
  416.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/524/marco-rubio-impersonation.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="524" />
  417.                            
  418.                        
  419.  
  420.                        <category domain="foxnews.com/metadata/dc.identifier">1bcd917b-a6fb-5184-a26d-6607f212773e</category>
  421.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  422.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  423.  
  424.                        
  425.                            <category domain="foxnews.com/taxonomy">fox-news/columns/artificial-intelligence-newsletter</category>
  426.                        
  427.                            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
  428.                        
  429.  
  430.                        
  431.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  432.                        
  433.                        <category domain="foxnews.com/content-type">article</category>
  434.  
  435.                        <pubDate>Sat, 12 Jul 2025 08:30:54 -0400</pubDate>
  436.                    </item>
  437.                
  438.            
  439.                
  440.                    <item>
  441.                        <link>https://www.foxnews.com/tech/medicare-data-breach-exposes-100000-americans-info</link>
  442.                        <guid isPermaLink="true">https://www.foxnews.com/tech/medicare-data-breach-exposes-100000-americans-info</guid>
  443.                        <title>Medicare data breach exposes 100,000 Americans&apos; info</title>
  444.  
  445.                        <description>Cybercriminals accessed Medicare data of more than 100,000 Americans by creating fraudulent accounts, prompting CMS to deactivate accounts and issue new Medicare cards.</description>
  446.                        
  447.                        
  448.                            <content:encoded>&lt;p&gt;Healthcare data continues to be a top &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/hackers&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;target for cybercriminals&lt;/a&gt;. In June alone, two major breaches compromised over 13 million patient records. Now, a newly confirmed Medicare data breach has affected more than 100,000 Americans.&lt;/p&gt;&lt;p&gt;The Centers for Medicare &amp;amp; Medicaid Services (CMS) sent letters this week to those affected, confirming that hackers accessed sensitive data linked to Medicare.gov accounts.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/over-8m-patient-records-leaked-healthcare-data-breach&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;OVER 8M PATIENT RECORDS LEAKED IN HEALTHCARE DATA BREACH&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The breach traces back to suspicious activity starting in late 2023. According to CMS, cybercriminals used stolen personal data from external sources to fraudulently create Medicare.gov accounts.&lt;/p&gt;&lt;p&gt;That information included:&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;GET FOX BUSINESS ON THE GO BY CLICKING HERE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;CMS began receiving alerts in May 2025 when people reported receiving account confirmation letters for accounts they had not created. This triggered an internal investigation. Hackers not only created unauthorized accounts but, in some cases, accessed additional sensitive data such as:&lt;/p&gt;&lt;p&gt;CMS has deactivated all affected accounts and is mailing new Medicare cards to the estimated 103,000 individuals affected. The agency says no confirmed &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;identity theft cases&lt;/a&gt; have been reported yet. CMS stressed the action is being taken out of &quot;an abundance of caution,&quot; but the breach raises questions about federal cybersecurity safeguards.&lt;/p&gt;&lt;p&gt;If you&apos;re one of the people affected by the Medicare data breach:&lt;/p&gt;&lt;p&gt;CMS is still investigating how the attackers obtained such accurate personal data and whether more individuals may be at risk.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-is-ai-artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT IS ARTIFICIAL INTELLIGENCE (AI)?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;So far, CMS has not identified the attackers. However, the use of valid personal information suggests that the hackers may have obtained data from prior breaches or leaks on other platforms. This breach reveals a troubling vulnerability in the federal &lt;a href=&quot;https://www.foxnews.com/category/health/health-care&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;healthcare system&lt;/a&gt;, where hackers can exploit existing data to create legitimate-looking accounts and access deeply personal medical information.&lt;/p&gt;&lt;p&gt;Here are five important steps you can take right now to protect your Medicare information and reduce your risk of identity theft after the breach.&lt;/p&gt;&lt;p&gt;Regularly check your Medicare and healthcare accounts for changes you did not make. Be cautious of unfamiliar services, charges or communications from providers you don’t recognize.&lt;/p&gt;&lt;p&gt;In light of the Medicare data breach, where bad actors used valid personal details to create fake accounts, enrolling in a trusted identity theft protection service can offer an extra layer of defense. These services monitor your Social Security number, email, phone number and other sensitive data to alert you if it&apos;s being sold on the dark web or used to open fraudulent accounts.&lt;/p&gt;&lt;p&gt;Many top-rated services also help you freeze your credit and bank accounts and offer expert support if your identity is compromised. My top pick includes up to &lt;strong&gt;$1 million in identity theft insurance&lt;/strong&gt; to cover stolen funds and legal fees, plus access to a U.S.-based fraud resolution team that helps you recover faster.&lt;/p&gt;&lt;p&gt;See my tips and best picks on how to protect yourself from identity theft at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/IdentityTheft &lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Never share your Medicare number or card details with anyone over the phone or email, unless you initiated the contact and trust the source. Treat it like a credit card.&lt;/p&gt;&lt;p&gt;If you believe your information is being misused, remove it from the internet. A personal data removal service can help you remove all this personal information from the internet. It has a very clean interface and will scan 195 websites for your information and remove it and keep it removed.&lt;/p&gt;&lt;p&gt;​​Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Delete&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;br&gt;&lt;br&gt;&lt;i&gt;&lt;strong&gt;Get a free scan to find out if your personal information is already out on the web: &lt;u&gt;Cyberguy.com/FreeScan&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;If you notice suspicious activity, report it directly by calling 1-800-MEDICARE (1-800-633-4227) to report Medicare fraud. Also, file a report at IdentityTheft.gov to create a recovery plan with the Federal Trade Commission (FTC). This not only helps you recover faster but also contributes to broader investigations that protect others.&lt;/p&gt;&lt;p&gt;This Medicare breach may not have resulted in confirmed cases of identity theft so far, but that does not mean the situation should be taken lightly or dismissed as low risk. It took malicious actors less than two years to create over 100,000 fake Medicare accounts using valid personal information, which suggests a significant weakness in how sensitive data is being protected and monitored at the federal level.&lt;/p&gt;&lt;p&gt;Do you think healthcare organizations are doing enough to protect your data? Let us know by writing us at&lt;strong&gt; &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>
  449.                        
  450.  
  451.                        
  452.                            
  453.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/1-over-100000-americans-had-personal-data-stolen-in-medicare-breach-intro.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  454.                            
  455.                        
  456.  
  457.                        <category domain="foxnews.com/metadata/dc.identifier">f04f7665-69b4-538e-97a0-46d7593b3fd0</category>
  458.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  459.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  460.  
  461.                        
  462.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  463.                        
  464.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
  465.                        
  466.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
  467.                        
  468.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
  469.                        
  470.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
  471.                        
  472.  
  473.                        
  474.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  475.                        
  476.                        <category domain="foxnews.com/content-type">article</category>
  477.  
  478.                        <pubDate>Sat, 12 Jul 2025 07:00:37 -0400</pubDate>
  479.                    </item>
  480.                
  481.            
  482.                
  483.                    <item>
  484.                        <link>https://www.foxnews.com/tech/swappable-ev-batteries-let-you-refuel-just-100-seconds</link>
  485.                        <guid isPermaLink="true">https://www.foxnews.com/tech/swappable-ev-batteries-let-you-refuel-just-100-seconds</guid>
  486.                        <title>Swappable EV batteries let you &apos;refuel&apos; in just 100 seconds</title>
  487.  
  488.                        <description>China&amp;apos;s battery swap technology from CATL lets electric vehicle owners exchange batteries in under two minutes, with plans to expand to 1,000 stations across 31 Chinese cities by 2025.</description>
  489.                        
  490.                        
  491.                            <content:encoded>&lt;p&gt;Pulling into a station, swapping your &lt;a href=&quot;https://www.foxnews.com/category/auto/attributes/electric&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;electric car&lt;/a&gt; battery and getting back on the road in under two minutes is now a reality. &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/world/world-regions/china&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;In China&lt;/a&gt;, CATL&apos;s swappable EV batteries are making this possible. This innovation is transforming the way drivers think about electric vehicle charging by making it fast, easy and as convenient as refueling with gasoline.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/energy-sucking-ai-data-centers-can-look-here-power-instead&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;ENERGY-SUCKING AI DATA CENTERS CAN LOOK HERE FOR POWER INSTEAD&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Swappable EV batteries are modular battery packs that can be quickly exchanged instead of recharged. CATL, a global leader in &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/innovation&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;battery technology&lt;/a&gt;, created a system called Choco-SEB that allows drivers to replace a drained battery in about 100 seconds. This makes battery swapping a realistic alternative to traditional EV charging.&lt;/p&gt;&lt;p&gt;CATL&apos;s Choco-SEB battery system is focused on speed and flexibility. It is designed to support a wide range of electric vehicles, from compact city cars to larger sedans. The system lets drivers swap batteries quickly and choose the setup that matches their needs best. With this technology, a single battery swap can deliver up to 373 miles of range, depending on the vehicle.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-is-ai-artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT IS ARTIFICIAL INTELLIGENCE (AI)?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The Choco-SEB batteries are available in two sizes, making them adaptable for different car models. Drivers can install one, two or even three battery blocks, depending on how much driving range they want. For compact cars, the system can provide up to 311 miles of range, while midsize vehicles can achieve as much as 373 miles per swap. This flexibility makes the Choco-SEB system a practical solution for a wide variety of drivers and travel needs.&lt;/p&gt;&lt;p&gt;The battery uses a blend of lithium iron phosphate and nickel manganese cobalt. This mix offers a balance of performance and safety, with an energy density of more than 160 Wh/kg and 325 Wh/L. The first car to launch with a Choco-SEB swappable EV battery is the Changan Oshan 520. It starts at around 166,800 yuan, or roughly $23,100. The vehicle offers a 320-mile range and is already gaining traction. Changan has delivered over 1,000 units and has received more than 15,000 orders.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;GET FOX BUSINESS ON THE GO BY CLICKING HERE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;CATL is actively building a network of battery swap stations across China. As of now, 34 stations are operating in Chongqing. More than 50 are expected by the end of the year.&lt;/p&gt;&lt;p&gt;By the end of 2025, CATL plans to have 1,000 stations across 31 cities. Each station is compact, requiring the space of just three parking spots, and they can hold up to 48 swappable EV batteries.&lt;/p&gt;&lt;p&gt;CATL is working with major automakers, including GAC, Chery, NIO, FAW and BAIC. The company holds almost 29% of the global EV battery market. With the addition of swappable EV batteries, it is strengthening its position as a leader in the industry.&lt;/p&gt;&lt;p&gt;Swappable EV batteries address one of the biggest challenges facing electric vehicles: long charging times. Instead of waiting 30 minutes or more, drivers can swap batteries in minutes and get back on the road with the ease of a gas-powered car.&lt;/p&gt;&lt;p&gt;The concept is gaining traction in Asian markets and holds promise for global expansion. In the U.S., however, challenges such as vehicle compatibility, automaker collaboration, infrastructure needs and consumer acceptance remain significant.&lt;/p&gt;&lt;p&gt;Some U.S.-based pilots and partnerships, including Stellantis collaborating with Ample for a fleet in Spain, point to growing interest. Still, CATL&apos;s Choco-SEB battery swap system has not been announced for rollout in the U.S.&lt;/p&gt;&lt;p&gt;CATL&apos;s goal is to make electric vehicle ownership easier and more appealing. Swappable EV batteries give drivers the flexibility to power up without plugging in. With more stations on the way and compatibility across a wide range of cars, this system could redefine what it means to drive electric. While this technology isn&apos;t coming to the U.S. just yet, American EV manufacturers may want to take note, as swappable battery tech could be the game-changer drivers have been waiting for.&lt;/p&gt;&lt;p&gt;If you could recharge your electric car in just 100 seconds, would you switch from gas to electric? What would it take to convince you to make the change?&lt;strong&gt; &lt;/strong&gt; Let us know by writing us at&lt;strong&gt; &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>
  492.                        
  493.  
  494.                        
  495.                            
  496.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/4-swappable-ev-batteries-let-you-refuel-in-just-100-seconds-2.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  497.                            
  498.                        
  499.  
  500.                        <category domain="foxnews.com/metadata/dc.identifier">47b96a41-2618-5f78-b7f9-68821d23a445</category>
  501.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  502.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  503.  
  504.                        
  505.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  506.                        
  507.                            <category domain="foxnews.com/taxonomy">fox-news/auto/attributes/electric</category>
  508.                        
  509.                            <category domain="foxnews.com/taxonomy">fox-news/world/disasters/transportation</category>
  510.                        
  511.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/innovation</category>
  512.                        
  513.  
  514.                        
  515.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  516.                        
  517.                        <category domain="foxnews.com/content-type">article</category>
  518.  
  519.                        <pubDate>Sat, 12 Jul 2025 05:00:30 -0400</pubDate>
  520.                    </item>
  521.                
  522.            
  523.                
  524.                    <item>
  525.                        <link>https://www.foxnews.com/tech/massive-scam-spreading-designed-trick-you-steal-your-money</link>
  526.                        <guid isPermaLink="true">https://www.foxnews.com/tech/massive-scam-spreading-designed-trick-you-steal-your-money</guid>
  527.                        <title>Massive scam spreading designed to trick you and steal your money</title>
  528.  
  529.                        <description>Analysts at Silent Push have uncovered a widespread scam that uses counterfeit retail websites to steal the credit card information of online shoppers.</description>
  530.                        
  531.                        
  532.                            <content:encoded>&lt;p&gt;Look at the image. That’s not the real Omaha Steaks. It’s from &lt;a href=&quot;https://www.foxnews.com/tech/120000-fake-sites-fuel-amazon-prime-day-scams&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;a fake site&lt;/a&gt; designed to steal your money.&lt;/p&gt;&lt;p&gt;It’s happening all &lt;a href=&quot;https://www.foxnews.com/tech/how-one-man-got-scammed-seconds-using-google&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;over the internet&lt;/a&gt; right now. You see a great deal on name-brand stuff, a new smartwatch, fancy cookware, maybe some designer jeans, and you click. &lt;/p&gt;&lt;p&gt;Everything looks real. The logos, the layout, even Apple and &lt;a href=&quot;https://www.foxnews.com/category/tech/companies/google&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Google Pay&lt;/a&gt; are options. But it’s a scam, and now your credit card info is out there.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/cleanup-your-phone-computer&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.silentpush.com/blog/fake-marketplace/?utm_source=GetKim.com&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Silent Push&lt;/a&gt; analysts uncovered thousands of fake websites posing as trusted stores like Apple, Michael Kors, Harbor Freight, REI, Omaha Steaks and more. There’s a massive global scam operation that uses &lt;a href=&quot;https://www.foxnews.com/tech/how-thieves-use-new-credit-card-numbers-before-you-receive-them&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;real payment methods&lt;/a&gt; on fake checkout pages. Like thousands-of-sites massive.&lt;/p&gt;&lt;p&gt;The twist? The criminals, likely based in China, take your payment and ghost you. No product. No refund. No customer service. Total fake-out.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/im-tech-pro-my-secrets-better-flights-luxury-travel&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;I’M A TECH PRO AND THESE ARE MY SECRETS TO BETTER FLIGHTS AND LUXURY TRAVEL&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;They’re copying everything. Logos, layouts, even the checkout process, so much so that you’d swear you were on the real REI website while buying $10 trail shoes. &lt;/p&gt;&lt;p&gt;But there were some sites with mismatched logos and products. A Harbor Freight clone showed Wrangler jeans.&lt;/p&gt;&lt;p&gt;Even worse: These scam sites are popping up faster than hosting companies can take them down. Many are still up right now.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/your-phone-listening-everything-you-say-its-complicated&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;IS YOUR PHONE LISTENING TO EVERYTHING YOU SAY? IT’S COMPLICATED&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Bottom line:&lt;/strong&gt; If the deal looks like it crawled straight out of your dreams, it’s probably from your nightmares. Slow down before you click &quot;buy.&quot; &lt;/p&gt;&lt;p&gt;Now you know this is happening. This &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/cybercrime&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;scam campaign&lt;/a&gt; is a big one, and you need to stay sharp. Help save the world and use the icons below to share this know-how with your family and friends.&lt;/p&gt;&lt;p&gt;Get tech-smarter on your schedule&lt;/p&gt;&lt;p&gt;Award-winning host Kim Komando is your secret weapon for navigating tech.&lt;/p&gt;&lt;p&gt;Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.&lt;/p&gt;</content:encoded>
  533.                        
  534.  
  535.                        
  536.                            
  537.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2021/11/931/523/iStock-540848970.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  538.                            
  539.                        
  540.  
  541.                        <category domain="foxnews.com/metadata/dc.identifier">79082440-f81a-569f-bd32-5c4e5d3d9752</category>
  542.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  543.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  544.  
  545.                        
  546.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
  547.                        
  548.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
  549.                        
  550.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  551.                        
  552.                            <category domain="foxnews.com/taxonomy">fox-news/columns/how-to-tech</category>
  553.                        
  554.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/computers</category>
  555.                        
  556.                            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/apple</category>
  557.                        
  558.                            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/google</category>
  559.                        
  560.  
  561.                        
  562.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  563.                        
  564.                        <category domain="foxnews.com/content-type">article</category>
  565.  
  566.                        <pubDate>Fri, 11 Jul 2025 20:36:54 -0400</pubDate>
  567.                    </item>
  568.                
  569.            
  570.                
  571.                    <item>
  572.                        <link>https://www.foxnews.com/tech/google-fixes-another-chrome-security-flaw-being-actively-exploited</link>
  573.                        <guid isPermaLink="true">https://www.foxnews.com/tech/google-fixes-another-chrome-security-flaw-being-actively-exploited</guid>
  574.                        <title>Google fixes another Chrome security flaw being actively exploited</title>
  575.  
  576.                        <description>Chrome users need to update their browsers immediately as Google addresses a critical vulnerability that hackers are actively exploiting. Additional security measures are recommended.</description>
  577.                        
  578.                        
  579.                            <content:encoded>&lt;p&gt;Cyber threats are on the rise, and attackers are becoming more aggressive with each new breach. As a result, Google patched a critical vulnerability in its &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/browsers&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Chrome browser. &lt;/a&gt;&lt;/p&gt;&lt;p&gt;This marks the fourth zero-day exploit discovered so far this year. Because hackers had already begun exploiting the flaw, Google quickly released an emergency update for Chrome users on Windows, Mac and Linux.&lt;/p&gt;&lt;p&gt;In light of this, as these threats grow more frequent and more sophisticated, taking control of your digital security is essential. With that in mind, here is what you need to know about the latest exploit and the steps you can take to stay protected.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/malware-targets-mac-users-fake-captcha-amos-stealer&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;MALWARE TARGETS MAC USERS WITH FAKE CAPTCHA AND AMOS STEALER&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The high-severity security flaw, identified as CVE-2025-6554, stems from a type confusion bug in Chrome&apos;s V8 JavaScript engine. Attackers can exploit this vulnerability to run malicious code or access other parts of your system by manipulating memory. Fortunately, &lt;a href=&quot;https://www.foxnews.com/category/tech/companies/google&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Google&apos;s Threat Analysis Group&lt;/a&gt; (TAG), which tracks state-sponsored and targeted spyware attacks, discovered the flaw and quickly issued security updates to protect users.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;GET FOX BUSINESS ON THE GO BY CLICKING HERE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;To stop hackers from exploiting the Chrome security flaw, start by updating your browser with the latest security patches. Although Chrome typically updates automatically, you should still check manually to make sure you are running the most recent version. To do this, follow these steps:&lt;/p&gt;&lt;p&gt;The latest stable versions that address this exploit are 138.0.7204.96/.97 on Windows, 138.0.7204.92/.93 &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/mac&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;on Mac&lt;/a&gt;, and 138.0.7204.96 on Linux. &lt;/p&gt;&lt;p&gt;Updating Chrome is only the first step in protecting your device. To strengthen your defenses, you also need to install reliable antivirus software. Zero-day vulnerabilities like this one can still allow malware to slip through, even after you patch your browser.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-is-ai-artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT IS ARTIFICIAL INTELLIGENCE (AI)?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;On Windows devices, Microsoft Defender comes pre-installed and offers a solid layer of free protection. Similarly, Android devices rely on Google Play Protect for automatic malware detection and removal. However, keep in mind that Play Protect is not always enough. It has a history of missing certain threats and may not catch every strain of malware.&lt;/p&gt;&lt;p&gt;Mac users benefit from Apple&apos;s built-in XProtect system, which Apple updated on July 8, 2025, to counter the latest known malware strains. Even so, adding a trusted third-party antivirus can provide stronger, more comprehensive protection.&lt;/p&gt;&lt;p&gt;When choosing antivirus software, make sure it includes these key features:&lt;/p&gt;&lt;p&gt;If you already have antivirus installed, take a moment to check for updates. Keeping it current ensures you&apos;re protected against the latest security threats.&lt;/p&gt;&lt;p&gt;Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android &amp;amp; iOS devices at &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com/LockUpYourTech&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Hackers are already exploiting the latest Chrome flaw, and more vulnerabilities are almost certain to follow. Updating your browser is not just recommended, it serves as your first line of defense. However, protecting yourself requires more than just patching software. Installing a trusted antivirus and following smart browsing habits can make the difference between staying secure and becoming a target. Stay alert by avoiding suspicious links, never downloading files from unknown sources, and always verifying website URLs before entering personal information. In today&apos;s digital world, one careless click can expose everything.&lt;/p&gt;&lt;p&gt;What security measures have you taken to protect your devices from online threats? Let us know by writing us at&lt;strong&gt; &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com. All rights reserved.  &lt;br&gt; &lt;/p&gt;</content:encoded>
  580.                        
  581.  
  582.                        
  583.                            
  584.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/1-google-quickly-fixes-another-chrome-security-flaw-being-actively-exploited.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  585.                            
  586.                        
  587.  
  588.                        <category domain="foxnews.com/metadata/dc.identifier">39896eed-2f86-5945-ac01-de514ad7fb42</category>
  589.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  590.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  591.  
  592.                        
  593.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  594.                        
  595.                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies</category>
  596.                        
  597.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
  598.                        
  599.                            <category domain="foxnews.com/taxonomy">fox-news/us/personal-freedoms/privacy</category>
  600.                        
  601.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
  602.                        
  603.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
  604.                        
  605.  
  606.                        
  607.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  608.                        
  609.                        <category domain="foxnews.com/content-type">article</category>
  610.  
  611.                        <pubDate>Fri, 11 Jul 2025 14:00:46 -0400</pubDate>
  612.                    </item>
  613.                
  614.            
  615.                
  616.                    <item>
  617.                        <link>https://www.foxnews.com/tech/teens-phone-use-while-driving-why-deadly-habit-persists</link>
  618.                        <guid isPermaLink="true">https://www.foxnews.com/tech/teens-phone-use-while-driving-why-deadly-habit-persists</guid>
  619.                        <title>Teens and phone use while driving: Why this deadly habit persists</title>
  620.  
  621.                        <description>A study found teens glance at phones for dangerous two-second intervals while driving, using devices primarily for entertainment, texting and navigation despite crash risks.</description>
  622.                        
  623.                        
  624.                            <content:encoded>&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/smartphones&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Phones have become a constant companion&lt;/a&gt; for today&apos;s teens, offering entertainment, connection and navigation at their fingertips. &lt;/p&gt;&lt;p&gt;But when it comes to driving, this convenience can quickly turn dangerous. Recent research reveals an unsettling reality: Despite widespread awareness of the risks, teens and phone use while driving remains a persistent and deadly problem.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/reduce-screen-time-ditch-big-techs-grip&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;REDUCE SCREEN TIME AND DITCH BIG TECH’S GRIP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;As of 2025, distracted driving remains a major safety concern in the United States. According to the National Highway Traffic Safety Administration, taking your eyes off the road for just five seconds at 55 mph is like driving the length of a football field with your eyes closed. In recent years, distracted driving has contributed to over 3,200 deaths and hundreds of thousands of crashes annually in the U.S., averaging nearly 900 incidents every day.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;GET FOX BUSINESS ON THE GO BY CLICKING HERE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;A new study led by Dr. Rebecca Robbins at Brigham and Women&apos;s Hospital, part of the Mass General Brigham system, and published in the journal Traffic Injury Prevention, found that teens spend an average of 21% of every car trip looking at their phones. That&apos;s roughly one out of every five minutes behind the wheel. Even more alarming, more than a quarter of teens admitted to glancing at their phones for two seconds or longer at a time, long enough to dramatically increase the risk of a crash.&lt;/p&gt;&lt;p&gt;You might assume teens are just checking directions, but the data tells a different story:&lt;/p&gt;&lt;p&gt;This means that the urge to stay entertained or connected often outweighs safety concerns, even when teens are aware of the risks.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/science&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Researchers used&lt;/a&gt; the Integrated Model of Behavioral Prediction to investigate what motivates teenagers to use their phones while driving. They found that many teens believe using their phones makes driving more enjoyable or helps them multitask. Social influence also plays a significant role; when friends or family members use their phones while driving, teens are more likely to adopt the same behavior. Additionally, many teens feel confident in their ability to manage both driving and phone use, which leads them to underestimate the real dangers involved.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-is-ai-artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT IS ARTIFICIAL INTELLIGENCE (AI)?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Reducing teen phone use behind the wheel requires a combination of practical strategies, open communication and positive role modeling. Here are some effective tips to help keep young drivers focused and safe:&lt;/p&gt;&lt;p&gt;&lt;strong&gt;1. Set &quot;Do Not Disturb&quot;:&lt;/strong&gt; Activate &quot;&lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/apps&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Do Not Disturb&lt;/a&gt;&quot; mode before driving to block notifications and reduce temptation.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;2. Keep phones out of reach: &lt;/strong&gt;Store your phone in the glove box or back seat so it&apos;s not easily accessible.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;3. Talk about risks: &lt;/strong&gt;Parents and schools should regularly discuss the dangers of distracted driving with teens.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;4. Model safe behavior: &lt;/strong&gt;Adults should avoid using phones &lt;a href=&quot;https://www.foxnews.com/category/auto/attributes/safety&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;while driving&lt;/a&gt; to set a positive example.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;5. Use monitoring apps:&lt;/strong&gt; Consider apps that block phone use or track driving habits for added accountability.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;6. Know the law: &lt;/strong&gt;Understand and follow your state&apos;s rules on phone use for young drivers.&lt;/p&gt;&lt;p&gt;The alarming truth is that teens and phone use while driving isn&apos;t just about a lack of awareness; it&apos;s about competing motivations, social pressures, and a dangerous sense of confidence. As technology evolves, so must our strategies for keeping young drivers safe.&lt;/p&gt;&lt;p&gt;If you knew that just one glance at your phone could change your life or someone else&apos;s forever, would you still take the risk?  Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com. All rights reserved.  &lt;/p&gt;</content:encoded>
  625.                        
  626.  
  627.                        
  628.                            
  629.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/teen-cell-phone-use-cars.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  630.                            
  631.                        
  632.  
  633.                        <category domain="foxnews.com/metadata/dc.identifier">184b2a39-9140-505a-87b0-6d7d22f26dc2</category>
  634.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  635.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  636.  
  637.                        
  638.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  639.                        
  640.                            <category domain="foxnews.com/taxonomy">fox-news/us</category>
  641.                        
  642.                            <category domain="foxnews.com/taxonomy">fox-news/world/disasters/transportation</category>
  643.                        
  644.                            <category domain="foxnews.com/taxonomy">fox-news/lifestyle</category>
  645.                        
  646.                            <category domain="foxnews.com/taxonomy">fox-news/travel</category>
  647.                        
  648.                            <category domain="foxnews.com/taxonomy">fox-news/auto/news</category>
  649.                        
  650.  
  651.                        
  652.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  653.                        
  654.                        <category domain="foxnews.com/content-type">article</category>
  655.  
  656.                        <pubDate>Fri, 11 Jul 2025 12:00:50 -0400</pubDate>
  657.                    </item>
  658.                
  659.            
  660.                
  661.                    <item>
  662.                        <link>https://www.foxnews.com/tech/windows-11-flaw-lets-hackers-bypass-secure-boot-protections</link>
  663.                        <guid isPermaLink="true">https://www.foxnews.com/tech/windows-11-flaw-lets-hackers-bypass-secure-boot-protections</guid>
  664.                        <title>Windows 11 flaw lets hackers bypass Secure Boot protections</title>
  665.  
  666.                        <description>Security researchers uncovered a flaw in Windows 11 that allows attackers to disable Secure Boot using Microsoft-signed tools, requiring manual updates to protect against bootkits.</description>
  667.                        
  668.                        
  669.                            <content:encoded>&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/category/tech/companies/microsoft&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Microsoft hasn&apos;t received much love&lt;/a&gt; for Windows 11, with many users still reluctant to ditch Windows 10 even four years after the newer OS launched. The main reasons include Microsoft&apos;s constant push to use its own services, strict hardware requirements and questionable interface changes.&lt;/p&gt;&lt;p&gt;But if you&apos;re looking for yet another reason to dislike Windows 11, security researchers recently uncovered a critical vulnerability affecting Secure Boot. This feature is supposed to prevent malware from loading during startup. Now, &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/hackers&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;hackers can bypass&lt;/a&gt; that protection and silently infect systems. The flaw allows attackers to disable Secure Boot on nearly any modern Windows PC or server, leaving even fully updated devices open to stealthy, undetectable malware.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/windows-pcs-risk-new-tool-disarms-built-in-security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WINDOWS PCS AT RISK AS NEW TOOL DISARMS BUILT-IN SECURITY&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The vulnerability, tracked as CVE-2025-3052, was discovered by firmware security firm Binarly. They found that a legitimate BIOS update tool signed by Microsoft could be abused to tamper with the &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/windows-os&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Windows boot process&lt;/a&gt;. Once exploited, the flaw allows attackers to shut off Secure Boot entirely. In the wrong hands, this vulnerability could lead to a new generation of malware. These threats could bypass even the most advanced antivirus or detection software.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-is-ai-artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT IS ARTIFICIAL INTELLIGENCE (AI)?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;At the center of the issue is a BIOS-flashing utility built for rugged tablets. Microsoft signed it using its UEFI CA 2011 certificate. Because that certificate is trusted on nearly every Secure Boot-enabled system, the tool can run without raising alarms. The danger lies in how the tool handles a specific NVRAM variable. Binarly&apos;s researchers found that it reads this variable blindly, without checking what&apos;s inside. That small oversight opens the door to a serious exploit. &lt;/p&gt;&lt;p&gt;In a demonstration, Binarly used a proof-of-concept attack to change this variable&apos;s value. By setting it to zero, they were able to overwrite a global setting critical to enforcing Secure Boot. That action completely disabled Secure Boot protections. Once that happens, unsigned UEFI modules can run freely. Attackers can then install stealthy, low-level malware known as bootkits, malware that operates below the Windows operating system itself. For hackers, this method offers the ultimate persistence.&lt;/p&gt;&lt;p&gt;Binarly reported the flaw to CERT/CC in February 2025. At first, it appeared to affect only a single module. But Microsoft&apos;s deeper investigation uncovered a bigger problem. The same vulnerability affected 14 modules signed with the same trusted certificate. Microsoft responded in June 2025 by revoking the cryptographic hashes of all 14 affected modules. These hashes were added to the Secure Boot revocation list, known as the dbx. This prevents the modules from running during startup. However, this protection is not automatic. Unless users or organizations manually apply the updated dbx, their systems remain vulnerable, even with other patches installed.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;GET FOX BUSINESS ON THE GO BY CLICKING HERE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Binarly revealed that the vulnerable tool had been online since late 2022. Someone uploaded it to VirusTotal in 2024, but it went unnoticed for months. At this point, it&apos;s unclear whether any attackers have used it in the wild. We reached out to Microsoft for comment but did not receive a response before our deadline.&lt;/p&gt;&lt;p&gt;Protecting your PC doesn&apos;t have to be complicated. Just follow these simple steps to keep hackers at bay and your information safe.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;1. Keep your computer updated: &lt;/strong&gt;Software updates aren’t just about new features. They fix serious security issues. In this case, Microsoft has already released a fix for the &lt;a href=&quot;https://www.foxnews.com/category/tech/topics/security&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Secure Boot&lt;/a&gt; vulnerability, but it only works if your system is fully updated. Just head to your settings, open Windows Update, and make sure everything is installed. A lot of people delay updates for weeks, but these patches are the first line of defense against threats like this.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;2. Don’t install tools you don’t fully understand: &lt;/strong&gt;It might be tempting to download apps that claim to speed up your computer or fix problems, especially ones recommended in YouTube videos or tech forums. But that’s exactly how a lot of threats sneak in. This particular vulnerability came from a legitimate-looking tool that was misused. So, if you’re not sure what something does or if it asks for permission to change how your system boots up, skip it. Or ask someone who knows more, before you click anything.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;3. Use strong antivirus software and leave it running: &lt;/strong&gt;Even though this new threat targets something deep inside the system, having strong antivirus protection still helps catch related malware. If you&apos;re on Windows, Defender is already built in and does a decent job. But if you don’t want to rely on Windows’ built-in tools, use a third-party antivirus.&lt;/p&gt;&lt;p&gt;Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android &amp;amp; iOS devices  by visiting &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com/LockUpYourTech&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;4. Restart your computer every now and then: &lt;/strong&gt;This one sounds basic, but it matters. A lot of updates don’t fully apply until after a restart. If you keep putting your computer to sleep or hibernating it for days at a time, your system might still be stuck in an unsafe state. Try to restart it at least every couple of days, or whenever an update asks for it.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;5. Don’t ignore warnings from Windows or your antivirus: &lt;/strong&gt;If something pops up telling you a file looks dangerous or that an update is needed, pay attention. It’s easy to get into the habit of closing these messages without reading them, but that’s how problems get missed. If a warning looks confusing or too technical, take a screenshot or a photo, and ask someone for help. The important thing is not to ignore it and move on.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;6. Remove your personal data from people-search sites: &lt;/strong&gt;Even if hackers don&apos;t directly target you through the Secure Boot flaw, many cyberattacks begin by gathering personal information that&apos;s easily found online. This can include your full name, address, phone number and even the names of your relatives. Data broker websites collect and publish this information without your consent, putting you at greater risk. Using a personal data removal service helps you reduce your online exposure and make it harder for bad actors to target you.&lt;/p&gt;&lt;p&gt;While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap - and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. &lt;/p&gt;&lt;p&gt;Check out my top picks for data removal services and get a free scan to find out whether your personal information is already out on the web by visiting &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Delete&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Get a free scan to find out if your personal information is already out on the web: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/FreeScan&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Secure Boot is supposed to be a final safeguard, a last barrier that ensures only verified code can load when a device starts. But this vulnerability shows how easily that trust can be broken. If a single signed utility can disable the entire system’s protection, then the foundation of device security starts to look worryingly thin.&lt;/p&gt;&lt;p&gt;Do you think Microsoft is doing enough to keep your PC secure? Let us know by writing us at&lt;strong&gt; &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>
  670.                        
  671.  
  672.                        
  673.                            
  674.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/2-new-windows-11-vulnerability-lets-hackers-bypass-pcs-built-in-protections-copy.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  675.                            
  676.                        
  677.  
  678.                        <category domain="foxnews.com/metadata/dc.identifier">6671a30f-ed0c-5f99-aa09-b3cb57012bf9</category>
  679.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  680.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  681.  
  682.                        
  683.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  684.                        
  685.                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/windows-os</category>
  686.                        
  687.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
  688.                        
  689.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
  690.                        
  691.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/computers</category>
  692.                        
  693.  
  694.                        
  695.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  696.                        
  697.                        <category domain="foxnews.com/content-type">article</category>
  698.  
  699.                        <pubDate>Fri, 11 Jul 2025 09:00:37 -0400</pubDate>
  700.                    </item>
  701.                
  702.            
  703.                
  704.                    <item>
  705.                        <link>https://www.foxnews.com/tech/noninvasive-brain-tech-ai-moves-robotic-hand-thought</link>
  706.                        <guid isPermaLink="true">https://www.foxnews.com/tech/noninvasive-brain-tech-ai-moves-robotic-hand-thought</guid>
  707.                        <title>Noninvasive brain tech and AI moves robotic hand with thought</title>
  708.  
  709.                        <description>Carnegie Mellon&amp;apos;s noninvasive brain technology allows users to move robotic fingers by thinking about the motion, offering new possibilities for people with motor impairments.</description>
  710.                        
  711.                        
  712.                            <content:encoded>&lt;p&gt;Noninvasive brain tech is transforming how people interact with robotic devices. Instead of relying on muscle movement, this technology allows a person to control a &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/robots&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;robotic hand&lt;/a&gt; by simply thinking about moving his fingers. &lt;/p&gt;&lt;p&gt;No surgery is required. &lt;/p&gt;&lt;p&gt;Instead, a set of sensors is placed on the scalp to detect brain signals. These signals are then sent to a computer. As a result, this approach is safe and accessible. It opens new possibilities for people with motor impairments or those recovering from injuries.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/paralyzed-man-speaks-sings-ai-brain-computer-interface&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;PARALYZED MAN SPEAKS AND SINGS WITH AI BRAIN-COMPUTER INTERFACE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Researchers at Carnegie Mellon University have made significant progress with noninvasive brain technology. They use electroencephalography (EEG) to detect the brain&apos;s electrical activity when someone thinks about moving a finger. &lt;a href=&quot;https://www.foxnews.com/category/tech/artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;Artificial intelligence&lt;/a&gt;, specifically deep learning algorithms, then decodes these signals and translates them into commands for a robotic hand. In their study, participants managed to move two or even three robotic fingers at once, just by imagining the motion. The system achieved over 80% accuracy for two-finger tasks. For three-finger tasks, accuracy was over 60%. All of this happened in real time.&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxnews.com/tech/what-is-ai-artificial-intelligence&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;WHAT IS ARTIFICIAL INTELLIGENCE (AI)?&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Achieving separate movement for each robotic finger is a real challenge. The brain areas responsible for finger movement are small. Their signals often overlap, which makes it hard to distinguish between them. However, advances in noninvasive brain technology and deep learning have made it possible to pick up on these subtle differences. &lt;/p&gt;&lt;p&gt;The research team used a neural network called EEGNet. They fine-tuned it for each participant. Because of this, the system allowed for smooth, natural control of the robotic fingers. The movements closely matched how a real hand works.&lt;/p&gt;&lt;p&gt;For people with limited hand function, even small improvements can make a huge difference. Noninvasive brain technology eliminates the need for surgery because the system is external and easy to use. In addition, this technology provides natural and intuitive control. It enables a person to move a robotic hand by simply thinking about the corresponding finger movements. &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.foxbusiness.com/apps-products&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;&lt;strong&gt;GET FOX BUSINESS ON THE GO BY CLICKING HERE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The accessibility of noninvasive brain technology means it can be used in clinics and homes and by a wide range of people. For example, it enables participation in everyday tasks, such as typing or picking up small objects that might otherwise be difficult or impossible to perform. This approach can benefit stroke survivors and people with spinal cord injuries. It can also help anyone interested in enhancing their abilities.&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;While the progress is exciting, there are still challenges ahead. Noninvasive &lt;a href=&quot;https://www.foxnews.com/category/health/orthopedics/technology&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;brain technology&lt;/a&gt; needs to improve even further at filtering out noise and adapting to individual differences. However, with ongoing advances in deep learning and sensor technology, these systems are becoming more reliable and easier to use. Researchers are already working to expand the technology for more complex tasks. &lt;/p&gt;&lt;p&gt;As a result, &lt;a href=&quot;https://www.foxnews.com/category/tech/technologies/robots&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;assistive robotics&lt;/a&gt; could soon become a part of more homes and workplaces.&lt;/p&gt;&lt;p&gt;Noninvasive brain technology is opening up possibilities that once seemed out of reach. The idea of moving a robotic hand just by thinking about it could make daily life easier and more independent for many people. As researchers continue to improve these systems, it will be interesting to see how this technology shapes the way we interact with the world around us.&lt;/p&gt;&lt;p&gt;If you had the chance to control a robotic hand with your thoughts, what would you want to try first? Let us know by writing us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;u&gt; &lt;/u&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>
  713.                        
  714.  
  715.                        
  716.                            
  717.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2023/05/931/523/Brain-3.png?ve=1&amp;tl=1" type="image/png" expression="full" width="931" height="523" />
  718.                            
  719.                        
  720.  
  721.                        <category domain="foxnews.com/metadata/dc.identifier">d68ac6b8-a64c-5088-96a2-32021b679aea</category>
  722.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  723.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  724.  
  725.                        
  726.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  727.                        
  728.                            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
  729.                        
  730.                            <category domain="foxnews.com/taxonomy">fox-news/health/brain-health</category>
  731.                        
  732.                            <category domain="foxnews.com/taxonomy">fox-news/health/health-care</category>
  733.                        
  734.                            <category domain="foxnews.com/taxonomy">fox-news/health/medical-research</category>
  735.                        
  736.  
  737.                        
  738.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  739.                        
  740.                        <category domain="foxnews.com/content-type">article</category>
  741.  
  742.                        <pubDate>Fri, 11 Jul 2025 05:00:02 -0400</pubDate>
  743.                    </item>
  744.                
  745.            
  746.                
  747.                    <item>
  748.                        <link>https://www.foxnews.com/tech/top-multi-factor-authentication-apps-protect-your-accounts</link>
  749.                        <guid isPermaLink="true">https://www.foxnews.com/tech/top-multi-factor-authentication-apps-protect-your-accounts</guid>
  750.                        <title>Top multi-factor authentication apps to protect your accounts</title>
  751.  
  752.                        <description>Multi-factor authentication (MFA) adds an extra layer of protection to your accounts. Instead of relying only on a password, MFA requires you to verify your identity using two or more methods.</description>
  753.                        
  754.                        
  755.                            <content:encoded>&lt;p&gt;Hackers often exploit reused passwords, gaining access to multiple accounts if just one is compromised. To stay safe, use strong, unique passwords for every account and change them regularly. However, passwords alone aren&apos;t enough. That&apos;s where multi-factor authentication apps come in.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Multi-factor authentication (MFA) adds an extra layer of protection to your accounts. Instead of relying only on a password, MFA requires you to verify your identity using two or more methods. These can include SMS codes, authenticator apps, or physical security keys.&lt;/p&gt;&lt;p&gt;Two-factor authentication (2FA) is a type of MFA that uses exactly two verification methods. MFA, on the other hand, can involve two or more factors. For example, logging into your bank might require a password and a code from an app-this is MFA in action.&lt;/p&gt;&lt;p&gt;Not all websites and apps support every type of MFA, so your choice may depend on what&apos;s available. Here&apos;s how the main options compare:&lt;/p&gt;&lt;p&gt;Many banks use SMS for two-factor authentication because it&apos;s easy to set up and works on any phone. However, SMS is not the most secure method. Authenticator apps and physical security keys offer better protection against modern threats.&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Unfortunately, there&apos;s no universal MFA solution for every account. The best approach is to use the strongest MFA method each service supports. Whenever possible, choose an authenticator app or a physical security key over SMS.&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Using a &lt;strong&gt;multi-factor authentication app&lt;/strong&gt; is one of the best ways to protect your online identity. Here are some of the top-rated options available for iPhone and Android:&lt;/p&gt;&lt;p&gt;The Microsoft Authenticator app gives you an easy, secure sign-in experience for all your accounts and gives you additional account management options for your Microsoft personal, work, and school accounts. It can use multi-factor authentication with a one-time passcode, can go password-less by using your phone instead of a password to log in, or can use autofill passwords for you. It&apos;s easy to use and can keep multiple accounts safe and secure for you. &lt;/p&gt;&lt;p&gt;Twilio Authy is another great app that you can use for all your accounts, including Facebook, Dropbox, Amazon, Gmail, and thousands more. It provides secure cloud-encrypted backups so that you will never lose access to your accounts, even if you lose your device. The app uses the same algorithms as many banks and the NSA use to protect their information, so you can pretty much guarantee that you&apos;ll be safe. Plus, you can even use it if you&apos;re offline or in airplane mode.&lt;/p&gt;&lt;p&gt;The Google Authenticator app will give you an extra layer of security for your online apps. You can sync your authenticator codes to your Google Account and across your devices. It offers support for multiple accounts, and you can transfer accounts between devices by using a QR code. Plus, you can choose the type of code generation used that best suits your needs, and it works without a network or cellular connection. &lt;/p&gt;&lt;p&gt;The Aegis Authenticator app is a free option for Android users. It is a great app to protect your online accounts from hackers and phishing. It adds an extra layer of security by generating one-time codes that you need to enter alone with your password. This way, even if a hacker steals your password, they won’t be able to access your account with your phone. The Aegis Authenticator app also lets you customize and organize your accounts, backup and restore your data, and use it offline.&lt;/p&gt;&lt;p&gt;While multi-factor authentication adds critical protection, it works best when combined with strong, unique passwords for every account. That’s where a password manager comes in. Instead of trying to memorize dozens of complex passwords, a password manager securely stores them for you and automatically fills them in when needed. It can generate strong, random passwords, store them in an encrypted vault, and sync across your devices so you always have access. Using NordPass along with multi-factor authentication is one of the best strategies to keep your accounts and personal data safe from hackers. &lt;/p&gt;&lt;p&gt;Get more details about my best expert-reviewed Password Managers of 2025 at&lt;strong&gt; &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Passwords.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Keeping your accounts safe doesn&apos;t have to be complicated. By using multi-factor authentication apps, you&apos;re adding a strong layer of protection that goes beyond just passwords. These apps make it much harder for hackers to get in, even if they somehow learn your password. Ready to take your security up a notch?&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Have you tried using an authenticator app? What has your experience been like? &lt;/strong&gt;Let us know by writing us at &lt;i&gt;&lt;strong&gt;Cyberguy.com/Contact.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
  756.                        
  757.  
  758.                        
  759.                            
  760.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/2-top-multi-factor-authentication-apps-to-protect-your-accounts.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  761.                            
  762.                        
  763.  
  764.                        <category domain="foxnews.com/metadata/dc.identifier">c2b2ead5-62a8-59f9-a8fa-5e69c3668997</category>
  765.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  766.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  767.  
  768.                        
  769.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  770.                        
  771.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
  772.                        
  773.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
  774.                        
  775.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
  776.                        
  777.  
  778.                        
  779.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  780.                        
  781.                        <category domain="foxnews.com/content-type">article</category>
  782.  
  783.                        <pubDate>Thu, 10 Jul 2025 15:00:10 -0400</pubDate>
  784.                    </item>
  785.                
  786.            
  787.                
  788.                    <item>
  789.                        <link>https://www.foxnews.com/tech/ai-brain-scan-tool-predicts-how-fast-you-aging</link>
  790.                        <guid isPermaLink="true">https://www.foxnews.com/tech/ai-brain-scan-tool-predicts-how-fast-you-aging</guid>
  791.                        <title>AI brain scan tool predicts how fast you are aging</title>
  792.  
  793.                        <description>Scientists from Duke, Harvard, and the University of Otago have unveiled a game-changing tool called DunedinPACNI. It uses a single AI brain scan to reveal how fast a person is biologically aging.</description>
  794.                        
  795.                        
  796.                            <content:encoded>&lt;p&gt;Our bodies change as we get older, and one undesirable result is that we become more vulnerable to age-related issues. Particularly, old age is characterized by a significant physical and mental decline. But why is it that some people thrive in their later years, while others face several health challenges prematurely? It&apos;s as if some people age faster than others.&lt;/p&gt;&lt;p&gt;To get to the bottom of this, scientists from Duke, Harvard, and the University of Otago have unveiled a game-changing tool called DunedinPACNI. It uses a single AI brain scan to reveal how fast a person is biologically aging. It&apos;s changing the way we track aging and the long-term health risks associated with it.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;The DunedinPACNI was named after the Dunedin Study, which followed over 1,000 people since their birth in the 1970s. Researchers analyzed decades of data, looking at factors like blood pressure, BMI, cholesterol, glucose, kidney function, and even dental health, to come up with a unique &quot;aging score&quot; for each participant. The new MRI-based AI brain scan can predict this score with surprising accuracy from a scan taken at age 45. &lt;/p&gt;&lt;p&gt;Participants whose aging scores were faster showed early signs of memory-related brain changes, such as shrinkage of the hippocampus. Follow-up studies of people aged between 52 and 89 showed that those aging rapidly were 60% more likely to develop dementia, 18% more likely to be diagnosed with chronic illnesses, and 40% more likely to die within the same period compared to those who were aging at a slower pace. This data shows that brain aging and overall physical decline are closely linked.&lt;/p&gt;&lt;p&gt;The team believes DunedinPACNI could change the landscape of preventive medicine. If it were possible to spot health risks early through an AI brain scan, at-risk individuals might be motivated to make healthier lifestyle changes (e.g., diet, exercise, and stress management). It could also help healthcare providers evaluate the effectiveness of treatment and slow the progression of age-related diseases.&lt;/p&gt;&lt;p&gt;The DunedinPACNI is a great tool that offers a non-invasive and powerful window into biological aging that traditional blood tests never could. A single AI brain scan provides a lifetime of health insights. It comes at a much-needed time as chronic diseases are on the rise. It may just be one of the key ingredients in predicting health outcomes and coming up with personalized wellness strategies.&lt;/p&gt;&lt;p&gt;Have you considered advanced tools like MRI scans for preventative healthcare? Let us know by writing us at &lt;i&gt;&lt;strong&gt;Cyberguy.com/Contact.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
  797.                        
  798.  
  799.                        
  800.                            
  801.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/1-ai-brain-scan-tool-predicts-how-fast-you-are-aging.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  802.                            
  803.                        
  804.  
  805.                        <category domain="foxnews.com/metadata/dc.identifier">3f3f5d7c-c3d7-5b15-8de4-5b6b1f949190</category>
  806.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  807.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  808.  
  809.                        
  810.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  811.                        
  812.                            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
  813.                        
  814.                            <category domain="foxnews.com/taxonomy">fox-news/health/brain-health</category>
  815.                        
  816.                            <category domain="foxnews.com/taxonomy">fox-news/health/medical-research</category>
  817.                        
  818.  
  819.                        
  820.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  821.                        
  822.                        <category domain="foxnews.com/content-type">article</category>
  823.  
  824.                        <pubDate>Thu, 10 Jul 2025 13:00:52 -0400</pubDate>
  825.                    </item>
  826.                
  827.            
  828.                
  829.                    <item>
  830.                        <link>https://www.foxnews.com/tech/fake-agent-phone-scams-spreading-fast-across-us</link>
  831.                        <guid isPermaLink="true">https://www.foxnews.com/tech/fake-agent-phone-scams-spreading-fast-across-us</guid>
  832.                        <title>Fake agent phone scams are spreading fast across the US</title>
  833.  
  834.                        <description>A disturbing wave of fake agent phone scams is sweeping across the United States, catching people off guard and draining their savings.</description>
  835.                        
  836.                        
  837.                            <content:encoded>&lt;p&gt;A disturbing wave of fake agent phone scams is sweeping across the United States, catching people off guard and draining their savings. These criminals do not just pretend to be someone you trust; they impersonate federal agents, threaten arrest, and demand payment on the spot. As the schemes become more sophisticated, the FBI and other law enforcement agencies are issuing urgent warnings. Moreover, the scams are spreading rapidly and becoming increasingly difficult to spot.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Often, it begins with a phone call that appears legitimate. The number might display familiar initials, such as &quot;FBI,&quot; &quot;US Marshals,&quot; or even your local police department. Scammers use spoofing technology to fake caller IDs, making the call look official. During the call, the scammer creates panic with claims like:&lt;/p&gt;&lt;p&gt;To avoid immediate legal trouble, victims are often instructed to pay immediately, usually through prepaid gift cards, cryptocurrency ATMs, or wire transfers. These demands are designed to be untraceable and irreversible. Importantly, the US Marshals will NEVER call you to collect money, the agency emphasized in a public warning.&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Reports of these calls have come in from New York, Illinois, Virginia, and nearly every other state. Some victims have lost thousands of dollars. In Michigan, scammers increased their credibility by using the real names and ranks of local officers. Meanwhile, in Maryland, suspects posing as FTC agents even showed up in person twice to collect cash. This scam is not limited to phone calls. Text messages, known as &quot;smishing&quot; attacks, are also on the rise. One version targeted iPhone users with fake DMV payment demands. According to cybersecurity firm Guardio, smishing surged 773% in just one month.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Why fake agent phone scams succeed and how they manipulate trust&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Fraudsters know how to exploit fear effectively. They count on the fact that most people will do almost anything to avoid arrest or protect a family member. By spoofing official numbers, they undermine our first line of defense: trust. However, it is not just about technology. Experts also warn of an emotional manipulation crisis. These scammers don&apos;t just steal your money, they steal your identity too. As a result, victims feel violated, scared, and uncertain about whom to trust.&lt;/p&gt;&lt;p&gt;Concerns are growing about how far these scams could go. Law enforcement and cybersecurity experts warn that scammers may soon use:&lt;/p&gt;&lt;p&gt;While there&apos;s no direct evidence of those advanced tactics yet, experts agree they&apos;re coming, and fast.&lt;/p&gt;&lt;p&gt;These scams are designed to trigger panic and override your judgment. But a few simple actions can protect you and your loved ones from falling victim. Stay sharp, stay skeptical, and follow these smart steps:&lt;/p&gt;&lt;p&gt;If someone calls claiming to be from a government agency and demands money, don&apos;t explain or ask questions; just hang up. Real law enforcement will never ask for payment over the phone, and they won&apos;t threaten you into silence.&lt;/p&gt;&lt;p&gt;No legitimate government agency will ever ask you to settle a legal issue with a prepaid gift card or a trip to a Bitcoin ATM. These are hallmark signs of a scam, designed to move your money fast and leave no trace.&lt;/p&gt;&lt;p&gt;The number on your screen might look official, but spoofing technology can fake any number, even 911 or the FBI. If the caller creates pressure or fear, hang up and verify using an official number from the agency&apos;s website.&lt;/p&gt;&lt;p&gt;Even if you don&apos;t fall for the scam, reporting it can help authorities track these operations. Contact your local FBI field office, your state&apos;s Attorney General, or file a report at reportfraud.ftc.gov. Every report helps build a stronger case.&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Scammers often target people who are more likely to believe a false threat, especially seniors or non-native English speakers. Have a conversation with family and friends so they know what to look out for and what to do if they receive a suspicious call or message.&lt;/p&gt;&lt;p&gt;Many scammers do their homework before making contact. They might already know your name, address, or even a relative&apos;s name to sound more convincing. Using a reputable personal data removal service can reduce the chances of your private information being misused. The less data available online, the fewer hooks criminals have to grab onto.&lt;/p&gt;&lt;p&gt;While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap - and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.&lt;/p&gt;&lt;p&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Delete.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;br&gt;&lt;br&gt;&lt;i&gt;&lt;strong&gt;Get a free scan to find out if your personal information is already out on the web: &lt;u&gt;Cyberguy.com/FreeScan.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Some scams are shifting from voice calls to text messages. If you receive a message claiming to be from the DMV, IRS, or law enforcement, don&apos;t click any links. These texts (known as &quot;smishing&quot; attacks) can trick you into entering personal info or downloading malware.&lt;/p&gt;&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. &lt;/p&gt;&lt;p&gt;Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android &amp;amp; iOS devices at &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com/LockUpYourTech.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;These criminals are getting smarter, but so can we. Staying informed and understanding what real law enforcement will never do is key to protecting yourself and your family. Authorities will not threaten you over the phone, demand gift cards or cryptocurrency, or ask you to prove your innocence with money. If something feels off, trust your gut. Also, spread the word, because the more people who know, the harder it is for these criminals to succeed.&lt;/p&gt;&lt;p&gt;Should the government be doing more to protect us from fake agent phone scams? Let us know by writing us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
  838.                        
  839.  
  840.                        
  841.                            
  842.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/1-fake-agent-phone-scams-are-spreading-fast-across-the-us.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  843.                            
  844.                        
  845.  
  846.                        <category domain="foxnews.com/metadata/dc.identifier">3986c4a7-f35b-5227-8447-efdba2c8a030</category>
  847.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  848.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  849.  
  850.                        
  851.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  852.                        
  853.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fbi</category>
  854.                        
  855.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
  856.                        
  857.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
  858.                        
  859.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
  860.                        
  861.  
  862.                        
  863.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  864.                        
  865.                        <category domain="foxnews.com/content-type">article</category>
  866.  
  867.                        <pubDate>Thu, 10 Jul 2025 10:00:19 -0400</pubDate>
  868.                    </item>
  869.                
  870.            
  871.                
  872.                    <item>
  873.                        <link>https://www.foxnews.com/tech/want-better-relationships-try-adding-more-emojis-your-texts</link>
  874.                        <guid isPermaLink="true">https://www.foxnews.com/tech/want-better-relationships-try-adding-more-emojis-your-texts</guid>
  875.                        <title>Want better relationships? Try adding more emojis to your texts</title>
  876.  
  877.                        <description>Emojis aren&amp;apos;t just playful add-ons; they&amp;apos;re powerful tools for building stronger connections in our increasingly digital world.</description>
  878.                        
  879.                        
  880.                            <content:encoded>&lt;p&gt;Ever wondered why some texts just feel warmer and more engaging? The secret might be in those tiny, colorful emojis you sprinkle into your messages. Emojis aren&apos;t just playful add-ons; they&apos;re powerful tools for building stronger connections in our increasingly digital world.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;A recent study led by Eun Huh at The University of Texas at Austin put this idea to the test. Researchers asked 260 adults to read text conversations that were identical except for one thing: the presence of emojis. Participants then rated how responsive and engaged their conversation partner appeared to be.&lt;/p&gt;&lt;p&gt;The results? Messages with emojis made people feel their partners were more attentive and emotionally engaged. This perceived responsiveness led to greater feelings of closeness, higher relationship satisfaction, and even increased likability. And it didn&apos;t matter whether the emoji was a smiley face or a simple object; what mattered was that it matched the tone of the message.&lt;/p&gt;&lt;p&gt;Emojis act as digital body language. In face-to-face conversations, we rely on tone, facial expressions, and gestures to show we care. In texts, emojis fill that gap by adding emotional nuance and clarity. They can make your intentions clear, reduce misunderstandings, and help your messages feel more personal and warm.&lt;/p&gt;&lt;p&gt;Interestingly, the type of emoji, whether a smiling face or a random object, didn&apos;t make a difference in how responsive the sender seemed. What matters most is that the emoji is emotionally consistent with your message. So, don&apos;t stress over picking the &quot;perfect&quot; emoji; just make sure it fits the mood of your text.&lt;/p&gt;&lt;p&gt;While emojis can sometimes be ambiguous or misunderstood, especially in sarcastic or complex conversations, their overall impact is positive. They&apos;re a modern twist on age-old ways of adding nonverbal cues to written messages, like underlining or using exclamation marks. And with billions of emojis sent every day, they&apos;re clearly here to stay. &lt;/p&gt;&lt;p&gt;In a world where so much of our communication happens through screens, finding ways to stay emotionally connected is more important than ever. Emojis offer a simple, effective way to show attentiveness and warmth, making your texts and your relationships stronger.&lt;/p&gt;&lt;p&gt;Do you feel like you are missing out on deeper love and connection just because you’re not sending enough emojis?  Let us know by writing us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
  881.                        
  882.  
  883.                        
  884.                            
  885.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/1-want-better-relationships-try-adding-more-emojis-to-your-texts.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  886.                            
  887.                        
  888.  
  889.                        <category domain="foxnews.com/metadata/dc.identifier">99e29f5c-5735-55b4-b2d5-727af139727b</category>
  890.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  891.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  892.  
  893.                        
  894.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  895.                        
  896.                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/iphone</category>
  897.                        
  898.                            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/android</category>
  899.                        
  900.                            <category domain="foxnews.com/taxonomy">fox-news/health/mental-health</category>
  901.                        
  902.  
  903.                        
  904.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  905.                        
  906.                        <category domain="foxnews.com/content-type">article</category>
  907.  
  908.                        <pubDate>Thu, 10 Jul 2025 06:00:50 -0400</pubDate>
  909.                    </item>
  910.                
  911.            
  912.                
  913.                    <item>
  914.                        <link>https://www.foxnews.com/tech/google-signs-200-mw-fusion-energy-deal-power-future-ai</link>
  915.                        <guid isPermaLink="true">https://www.foxnews.com/tech/google-signs-200-mw-fusion-energy-deal-power-future-ai</guid>
  916.                        <title>Google signs 200 MW fusion energy deal to power future AI</title>
  917.  
  918.                        <description>Google has taken a major step toward the future of clean energy by partnering with Commonwealth Fusion Systems (CFS), an MIT spin-out working to build one of the world’s first commercial fusion reactors.</description>
  919.                        
  920.                        
  921.                            <content:encoded>&lt;p&gt;Google has taken a major step toward the future of clean energy by partnering with Commonwealth Fusion Systems (CFS), an MIT spin-out working to build one of the world’s first commercial fusion reactors. This Google fusion deal marks a pivotal moment for the tech giant as it looks to secure reliable, carbon-free power for its growing AI operations.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Google will purchase 200 megawatts (MW) of electricity from CFS’s planned ARC fusion power plant in Chesterfield County, Virginia. This amount of power could support roughly 150,000 to 200,000 homes. More likely, it will help run Google’s expanding network of AI data centers. The actual usage will depend on how Google allocates the electricity.&lt;/p&gt;&lt;p&gt;This is Google’s first energy deal involving fusion technology. It is also the largest fusion power purchase agreement signed so far. The ARC plant is projected to begin operations in the early 2030s, though fusion projects often face delays. While the electricity does not yet exist, the deal highlights growing demand for long-term, clean energy solutions.&lt;/p&gt;&lt;p&gt;Fusion is the same process that powers the sun. Instead of splitting atoms like traditional nuclear power, fusion forces hydrogen atoms to fuse together at extremely high temperatures. This reaction releases enormous amounts of energy. It does not produce greenhouse gases or long-lived radioactive waste.&lt;/p&gt;&lt;p&gt;Scientists have worked on fusion for decades, but no one has produced fusion power at commercial scale yet. CFS aims to change that with its SPARC demonstration reactor, now under construction in Massachusetts. The larger ARC plant is planned to deliver commercial fusion energy.&lt;/p&gt;&lt;p&gt;Google’s energy needs are growing quickly as it scales up artificial intelligence models and data infrastructure. Since 2010, the company has invested in renewable sources like wind, solar, and geothermal. However, these sources are not always available when needed.&lt;/p&gt;&lt;p&gt;Fusion could solve this problem by providing round-the-clock clean energy. By signing this agreement, Google is securing future power and helping to speed up fusion technology development. The company has also expanded its investment in CFS to support the ARC project.&lt;/p&gt;&lt;p&gt;Google’s new partnership with CFS is the largest fusion energy deal ever signed. The company will purchase 200 MW of clean power from a future reactor in Virginia. The ARC plant is expected to come online in the early 2030s. Google is the first major company to sign on as a customer for commercial fusion energy. Unlike traditional nuclear power, fusion produces no carbon emissions and no long-lived radioactive waste. It also offers consistent, 24/7 electricity. As Google’s AI systems drive up energy demand, this deal shows how tech companies are looking beyond wind and solar for scalable, future-proof solutions. If CFS delivers, fusion could finally move from science experiment to real-world power source.&lt;/p&gt;&lt;p&gt;Do you think fusion energy will power the future of AI? Let us know by writing us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
  922.                        
  923.  
  924.                        
  925.                            
  926.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/1-google-signs-200-mw-fusion-energy-deal-to-power-future-ai.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  927.                            
  928.                        
  929.  
  930.                        <category domain="foxnews.com/metadata/dc.identifier">52efd0b5-46d5-547d-b3e8-6a56d1d08488</category>
  931.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  932.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  933.  
  934.                        
  935.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  936.                        
  937.                            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/google</category>
  938.                        
  939.                            <category domain="foxnews.com/taxonomy">fox-news/energy</category>
  940.                        
  941.                            <category domain="foxnews.com/taxonomy">fox-news/science</category>
  942.                        
  943.  
  944.                        
  945.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  946.                        
  947.                        <category domain="foxnews.com/content-type">article</category>
  948.  
  949.                        <pubDate>Wed, 09 Jul 2025 15:00:23 -0400</pubDate>
  950.                    </item>
  951.                
  952.            
  953.                
  954.                    <item>
  955.                        <link>https://www.foxnews.com/tech/can-you-stop-mark-zuckerberg-from-using-your-art-facebook</link>
  956.                        <guid isPermaLink="true">https://www.foxnews.com/tech/can-you-stop-mark-zuckerberg-from-using-your-art-facebook</guid>
  957.                        <title>Can you stop Mark Zuckerberg from using your art on Facebook?</title>
  958.  
  959.                        <description>If you create and share art online, you might have seen messages warning that Facebook&amp;apos;s parent company, Meta, claims the right to use or even sell anything you post, whether it&amp;apos;s pictures, poems, or artwork.</description>
  960.                        
  961.                        
  962.                            <content:encoded>&lt;p&gt;If you create and share art online, you might have seen messages warning that Facebook&apos;s parent company, Meta, claims the right to use or even sell anything you post, whether it&apos;s pictures, poems, or artwork. Robert from Edmond, Oklahoma, reached out with this concern:&lt;/p&gt;&lt;p&gt;&quot;I keep getting messages warning me that Facebook/Meta has let all subscribers know that Meta claims the right to own or use anything one puts on their social media systems, including any message, pictures, artwork, etc., that belong to you. I like to post some of my artwork but I am being warned it can be loaded by Meta and sold or given to others without my permission. Is this true? If so, is there a way to protect one&apos;s pictures, art, poems, etc. from this grab?&quot;&lt;/p&gt;&lt;p&gt;This is a common concern, and it&apos;s essential to distinguish fact from fiction. Let&apos;s explore what really happens to your creative content on Facebook, what rights you keep, and how you can protect your work while sharing it on the platform.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Here&apos;s the truth: You retain ownership of your intellectual property rights, including copyright, of everything you share on Facebook. Your creative work, art, photographs, poems, or videos, is still yours to control.&lt;/p&gt;&lt;p&gt;With that said, Facebook has a license to use the content you post on the platform, but it doesn&apos;t mean they own it. If you don&apos;t want Facebook to use it, you should delete it. However, Facebook can still access it if you&apos;ve shared it with others and they haven&apos;t deleted it.&lt;/p&gt;&lt;p&gt;The claim that Facebook or Meta can sell or give away your content without your permission is false. This rumor has circulated for years but is not based on Facebook&apos;s actual policies. While Facebook does have a license to use your content as part of its platform, it does not own your work or have the right to sell it outside of Facebook without your consent.&lt;/p&gt;&lt;p&gt;Social media piracy happens when someone uses your social media content without your permission. Here&apos;s how to protect it:&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Adding a watermark to your work can help protect it from unauthorized use. You can use any image editor, including the Windows Photos app or Canva. To maximize protection, place the watermark where it cannot e easily cropped out without damaging the artwork, such as across the center.&lt;/p&gt;&lt;p&gt;You should configure your privacy settings to limit who can see your posts:&lt;/p&gt;&lt;p&gt;You can also include a copyright notice in your posts to remind others that the content is protected by copyright law. Something as simple as &quot;© [Your Name], [Year]&quot; can work and is legally recognized.&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;It&apos;s important to know that you keep ownership of your creative work on Facebook. While Meta can use your content within the platform, it cannot sell or give it away without your permission. Protecting your art is still up to you; watermark your work, adjust privacy settings, and add copyright notices to help prevent misuse.&lt;/p&gt;&lt;p&gt;How do you protect your creative content on social media?&lt;strong&gt; &lt;/strong&gt; Let us know by writing us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
  963.                        
  964.  
  965.                        
  966.                            
  967.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/1-metas-art-grab-can-you-really-protect-your-creations-on-facebook.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  968.                            
  969.                        
  970.  
  971.                        <category domain="foxnews.com/metadata/dc.identifier">63cee524-c652-57f2-ad3d-a669d19729a3</category>
  972.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  973.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  974.  
  975.                        
  976.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  977.                        
  978.                            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/facebook</category>
  979.                        
  980.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
  981.                        
  982.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
  983.                        
  984.  
  985.                        
  986.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  987.                        
  988.                        <category domain="foxnews.com/content-type">article</category>
  989.  
  990.                        <pubDate>Wed, 09 Jul 2025 13:00:36 -0400</pubDate>
  991.                    </item>
  992.                
  993.            
  994.                
  995.                    <item>
  996.                        <link>https://www.foxnews.com/tech/qantas-data-breach-exposes-millions-customer-records</link>
  997.                        <guid isPermaLink="true">https://www.foxnews.com/tech/qantas-data-breach-exposes-millions-customer-records</guid>
  998.                        <title>Qantas data breach exposes millions of customer records</title>
  999.  
  1000.                        <description>Cybercriminals hit Qantas in a major data breach that exposed information from up to six million customers.</description>
  1001.                        
  1002.                        
  1003.                            <content:encoded>&lt;p&gt;Cybercriminals hit Qantas in a major data breach that exposed information from up to six million customers. Airline data breaches are on the rise, putting millions of travelers at risk. The Qantas incident underscores how vulnerable personal information can be. The FBI recently warned that a hacking group called Scattered Spider is actively targeting airlines and the transportation sector. So, what should you do if your data was compromised, and how can you protect yourself moving forward?&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;On June 30, 2025, Qantas found unusual activity on a third-party customer service platform. Hackers broke into this system and took personal information, such as names, email addresses, phone numbers, dates of birth, and frequent flyer numbers.&lt;/p&gt;&lt;p&gt;Qantas confirmed that hackers did not access credit card details, financial information, or passport data. The airline quickly stopped the breach and began telling affected customers. We reached out to Qantas for comment. They referred us to their official update, which says the system remains secure. No one compromised frequent flyer accounts or passwords. Qantas also reports no further threat activity. The airline is working with cybersecurity experts and government authorities to investigate. They have added new security measures to protect customer data and frequent flyer accounts.&lt;/p&gt;&lt;p&gt;The timing is alarming. Just days before the breach, the FBI warned that Scattered Spider, a hacking group known for its social engineering and ransomware tactics, was targeting airlines. This group has been linked to attacks on Hawaiian Airlines and WestJet.&lt;/p&gt;&lt;p&gt;Chris Borkenhagen, a seasoned cybersecurity leader who serves as CISO &amp;amp; Chief Digital Officer at AuthenticID and brings over two decades of experience protecting digital identities, explains:&lt;br&gt;&lt;br&gt;&quot;Even partial personal data like names, contact details, birthdates, and loyalty account numbers can be weaponized by cybercriminals. Affected consumers should immediately update passwords, especially if reused elsewhere, and enable multi-factor authentication.&quot;&lt;/p&gt;&lt;p&gt;Airline data is highly valuable to hackers because, even without financial details, airlines collect a wealth of personal information that criminals can exploit. Hackers can use this data to hijack loyalty accounts and steal points or miles, create fake identities for fraudulent activities, and launch highly convincing phishing campaigns that target both travelers and employees. Airline breaches are especially dangerous since they often involve a combination of personal, behavioral, and contextual data, which enables cybercriminals to carry out targeted attacks with greater effectiveness.&lt;/p&gt;&lt;p&gt;Watch for these red flags after a breach:&lt;/p&gt;&lt;p&gt;&quot;Cybercriminals act fast after breaches, using personal details to impersonate victims or extract more data. Investigate any unusual activity immediately,&quot; warns Borkenhagen.&lt;/p&gt;&lt;p&gt;If Qantas notifies you that your data was compromised, act immediately:&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Change passwords on your airline account and any other accounts using the same credentials. Use strong, unique passwords. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. &lt;/p&gt;&lt;p&gt;Check out the best expert-reviewed password managers of 2025 at&lt;strong&gt; &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Passwords.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Turn on multi-factor authentication (MFA)&lt;u&gt; &lt;/u&gt;wherever possible, especially on travel, email, and financial accounts.&lt;/p&gt;&lt;p&gt;Watch your loyalty program and financial accounts for any unusual activity.&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Identity theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.  One of the best parts of my #1 pick is that they have identity theft insurance of &lt;strong&gt;up to 1 million dollars to cover losses and legal fees&lt;/strong&gt; and a white glove fraud resolution team where a &lt;strong&gt;US-based case manager helps you recover any losses&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;See my tips and best picks on how to protect yourself from identity theft at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/IdentityTheft.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Watch out for phishing attempts, as scammers may use stolen data to craft convincing messages. Don&apos;t click on any links or download attachments from suspicious emails or texts-instead, verify the sender&apos;s identity by contacting the company directly through their official website or app. Using up-to-date antivirus software can also help detect and block malicious content before it can do harm.&lt;/p&gt;&lt;p&gt;For the best antivirus protection in 2025, visit &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com/LockUpYourTech.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Consider using a personal data removal service to help limit how much of your information is exposed online. Reducing your digital footprint makes it harder for cybercriminals to find and exploit your personal details.&lt;/p&gt;&lt;p&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Delete&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Get a free scan to find out if your personal information is already out on the web: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/FreeScan.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt; &lt;/p&gt;&lt;p&gt;As we&apos;ve seen, airline data breaches, such as the recent Qantas incident, are no longer rare; they&apos;re a growing reality for travelers everywhere. While Qantas acted quickly to contain the breach and safeguard sensitive data, this event is a reminder that cybercriminals are always looking for new ways to exploit personal information. By taking proactive steps, such as updating your passwords, enabling multi-factor authentication, and keeping an eye out for suspicious activity, you can reduce your risk and protect your identity. Don&apos;t wait for the next headline to take action; start securing your accounts and digital footprint today.&lt;/p&gt;&lt;p&gt;Should airlines face stricter legal standards for data protection? Who should enforce these? Let us know by writing us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
  1004.                        
  1005.  
  1006.                        
  1007.                            
  1008.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/2-qantas-data-breach-exposes-millions-of-customer-records.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  1009.                            
  1010.                        
  1011.  
  1012.                        <category domain="foxnews.com/metadata/dc.identifier">6ed05f50-90cf-54c7-822b-4bf210d53c53</category>
  1013.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  1014.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  1015.  
  1016.                        
  1017.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  1018.                        
  1019.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
  1020.                        
  1021.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
  1022.                        
  1023.                            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
  1024.                        
  1025.  
  1026.                        
  1027.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  1028.                        
  1029.                        <category domain="foxnews.com/content-type">article</category>
  1030.  
  1031.                        <pubDate>Wed, 09 Jul 2025 10:00:02 -0400</pubDate>
  1032.                    </item>
  1033.                
  1034.            
  1035.                
  1036.                    <item>
  1037.                        <link>https://www.foxnews.com/tech/severe-weather-emergency-alerts-how-get-loud-phone-warnings</link>
  1038.                        <guid isPermaLink="true">https://www.foxnews.com/tech/severe-weather-emergency-alerts-how-get-loud-phone-warnings</guid>
  1039.                        <title>Severe weather emergency alerts: How to get loud phone warnings</title>
  1040.  
  1041.                        <description>Having reliable, loud, and timely emergency alerts on your phone or device is important because when severe weather strikes, every second counts.</description>
  1042.                        
  1043.                        
  1044.                            <content:encoded>&lt;p&gt;Central Texas is still reeling from those devastating floods that claimed more than 100 lives and left dozens missing. Torrential rains caused the Guadalupe River to rise nearly 30 feet in under an hour, overwhelming communities and emergency responders, and catching many off guard.&lt;/p&gt;&lt;p&gt;Despite some warnings, many residents reported receiving little to no advance notice, highlighting critical gaps in alert systems during life-threatening weather events.&lt;/p&gt;&lt;p&gt;In response to criticisms about the National Weather Service&apos;s advanced alert system during this disaster, the Department of Homeland Security (DHS) publicly backed the NWS, emphasizing the importance of robust and timely severe weather alerts.&lt;/p&gt;&lt;p&gt;This tragedy underscores the importance of having reliable, loud, and timely emergency alerts on your phone or device because when severe weather strikes, every second counts.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Many phones only notify you of emergency alerts if you have them enabled. Some devices might silence or limit these warnings, especially if your phone has been previous adjusted to omit overbearing government and Amber alerts. This can be dangerous during flash floods, tornadoes, hurricanes, or other severe weather events when every second counts.&lt;/p&gt;&lt;p&gt;To make sure you don&apos;t miss critical warnings, follow these simple steps:&lt;/p&gt;&lt;p&gt;S&lt;i&gt;ettings may vary depending on your Android phone’s manufacturer.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Make sure your phone is updated to the latest software version for full compatibility.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; Emergency alerts are designed to override Do Not Disturb or Silent mode, but this may not work on every device, and you must be within range of a cellular or network connection for you to receive a warning.&lt;/p&gt;&lt;p&gt;If you are not receiving alerts, check your carrier, ensure you are connected to a cellular network, and consider using a third-party app for redundancy.&lt;/p&gt;&lt;p&gt;If you want extra assurance beyond default phone alerts, consider these apps: &lt;/p&gt;&lt;p&gt;The Storm Shield app is available for both iPhone (iOS) and Android devices. It provides storm-based alerts, including tornadoes, hurricanes, floods, thunderstorms, and winter storms, through voice and push notifications that can wake your device even if it is locked or on silent. The app uses location-based alerts to reduce false alarms by notifying you only when severe weather impacts your exact location within a county. &lt;/p&gt;&lt;p&gt;Another excellent option is the American Red Cross Emergency app, available for both iPhone and Android devices. This app allows you to customize NOAA alerts for a wide range of hazards, including tornadoes, floods, and hurricanes. You can set unique alert sounds for different types of emergencies and choose which locations you want to monitor, making it perfect for keeping tabs on loved ones or property in various places. However, keep in mind that while this app provides timely notifications, it may not always override Do Not Disturb mode in the same way that Wireless Emergency Alerts can.&lt;/p&gt;&lt;p&gt;NOAA Weather Radio is a nationwide network of radio stations operated by the National Oceanic and Atmospheric Administration. It continuously broadcasts official weather information and emergency alerts directly from the National Weather Service. These broadcasts provide vital, real-time warnings about severe weather events such as hurricanes, tornadoes, floods, and other natural disasters. These work even if your cellular connection goes down or your phone fails to emit a warning.&lt;/p&gt;&lt;p&gt;To receive these alerts clearly and loudly, a dedicated NOAA Weather Radio device is essential. One highly recommended option is the Raynic Emergency Weather Radio. This portable, multi-functional device tunes into all seven NOAA weather channels and automatically announces loud alerts when threatening weather conditions arise. It features multiple power sources, including solar panels, a hand crank, USB charging, and batteries, ensuring it stays powered even during extended outages.&lt;/p&gt;&lt;p&gt;The Raynic radio also offers AM, FM, and shortwave bands, a 5000mAh rechargeable battery that can charge your cell phone, a bright flashlight, a reading lamp, an SOS siren, and a headphone jack for private listening. Its compact, durable, and water-resistant design makes it ideal for both home use and outdoor emergencies. No matter which NOAA radio brand you pick, make sure you follow the directions so that it will automatically turn on for a severe weather warning and that the volume is cranked up.&lt;/p&gt;&lt;p&gt;By combining the NOAA Weather Radio broadcast system with a reliable device like the Raynic Emergency Radio, you ensure you receive timely, loud, and clear severe weather emergency alerts no matter where you are or what power sources are available.&lt;/p&gt;&lt;p&gt;The tragic floods in Texas remind us that severe weather can strike suddenly and with deadly force. Don&apos;t rely solely on chance; take control of your safety by enabling emergency alerts and using trusted apps. Consider adding a NOAA Weather Radio to your emergency kit.&lt;/p&gt;&lt;p&gt;What steps have you taken to ensure you receive loud and timely severe weather alerts? Let us know by writing to us at&lt;strong&gt; &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com/Contact.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;&lt;i&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;strong&gt;&lt;u&gt;CYBERGUY.COM/NEWSLETTER.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Copyright 2025 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
  1045.                        
  1046.  
  1047.                        
  1048.                            
  1049.                                <media:content url="https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/07/931/523/3-severe-weather-emergency-alerts-how-to-get-loud-phone-warnings.jpg?ve=1&amp;tl=1" type="image/jpeg" expression="full" width="931" height="523" />
  1050.                            
  1051.                        
  1052.  
  1053.                        <category domain="foxnews.com/metadata/dc.identifier">6bb2416e-b9e9-5c5f-a3d5-848c14d05fb1</category>
  1054.                        <category domain="foxnews.com/metadata/prism.channel">fnc</category>
  1055.                        <category domain="foxnews.com/metadata/dc.source">Fox News</category>
  1056.  
  1057.                        
  1058.                            <category domain="foxnews.com/taxonomy">fox-news/tech</category>
  1059.                        
  1060.                            <category domain="foxnews.com/taxonomy">fox-news/weather</category>
  1061.                        
  1062.                            <category domain="foxnews.com/taxonomy">fox-news/science</category>
  1063.                        
  1064.  
  1065.                        
  1066.                            <category domain="foxnews.com/section-path">fox-news/tech</category>
  1067.                        
  1068.                        <category domain="foxnews.com/content-type">article</category>
  1069.  
  1070.                        <pubDate>Wed, 09 Jul 2025 06:00:57 -0400</pubDate>
  1071.                    </item>
  1072.                
  1073.            
  1074.                
  1075.            
  1076.                
  1077.            
  1078.                
  1079.            
  1080.                
  1081.            
  1082.                
  1083.            
  1084.        
  1085.    </channel>
  1086. </rss>

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid RSS" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=http%3A//feeds.foxnews.com/foxnews/tech

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda