logo
#

Latest news with #CyberGuyReport

What AI's insatiable appetite for power means for our future
What AI's insatiable appetite for power means for our future

Fox News

time2 days ago

  • Business
  • Fox News

What AI's insatiable appetite for power means for our future

Print Close By Kurt Knutsson, CyberGuy Report Published June 20, 2025 Every time you ask ChatGPT a question, to generate an image or let artificial intelligence summarize your email, something big is happening behind the scenes. Not on your device, but in sprawling data centers filled with servers, GPUs and cooling systems that require massive amounts of electricity. The modern AI boom is pushing our power grid to its limits. ChatGPT alone processes roughly 1 billion queries per day, each requiring data center resources far beyond what's on your device. In fact, the energy needed to support artificial intelligence is rising so quickly that it has already delayed the retirement of several coal plants in the U.S., with more delays expected. Some experts warn that the AI arms race is outpacing the infrastructure meant to support it. Others argue it could spark long-overdue clean energy innovation. AI isn't just reshaping apps and search engines. It's also reshaping how we build, fuel and regulate the digital world. The race to scale up AI capabilities is accelerating faster than most infrastructure can handle, and energy is becoming the next major bottleneck. TRUMP'S NUCLEAR STRATEGY TAKES SHAPE AS FORMER MANHATTAN PROJECT SITE POWERS UP FOR AI RACE AGAINST CHINA Here's a look at how AI is changing the energy equation, and what it might mean for our climate future. Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide – free when you join. Why AI uses so much power, and what drives the demand Running artificial intelligence at scale requires enormous computational power. Unlike traditional internet activity, which mostly involves pulling up stored information, AI tools perform intensive real-time processing. Whether training massive language models or responding to user prompts, AI systems rely on specialized hardware like GPUs (graphics processing unit) that consume far more power than legacy servers. GPUs are designed to handle many calculations in parallel, which is perfect for the matrix-heavy workloads that power generative AI and deep learning systems. To give you an idea of scale: one Nvidia H100 GPU, commonly used in AI training, consumes up to 700 watts on its own. Training a single large AI model like GPT-4 may require thousands of these GPUs running continuously for weeks. Multiply that across dozens of models and hundreds of data centers, and the numbers escalate quickly. A traditional data center rack might use around 8 kilowatts (kW) of power. An AI-optimized rack using GPUs can demand 45-55 kW or more. Multiply that across an entire building or campus of racks, and the difference is staggering. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Cooling all that hardware adds another layer of energy demand. Keeping AI servers from overheating accounts for 30-55% of a data center's total power use. Advanced cooling methods like liquid immersion are helping, but scaling those across the industry will take time. On the upside, AI researchers are developing more efficient ways to run these systems. One promising approach is the "mixture of experts" model architecture, which activates only a portion of the full model for each task. This method can significantly reduce the amount of energy required without sacrificing performance. How much power are we talking about? In 2023, global data centers consumed about 500 terawatt-hours (TWh) of electricity. That is enough to power every home in California, Texas and Florida combined for an entire year. By 2030, the number could triple, with AI as the main driver. To put it into perspective, the average home uses about 30 kilowatt-hours per day. One terawatt-hour is a billion times larger than a kilowatt-hour. That means 1 TWh could power 33 million homes for a day. 5 AI TERMS YOU KEEP HEARING AND WHAT THEY ACTUALLY MEAN AI's energy demand is outpacing the power grid The demand for AI is growing faster than the energy grid can adapt. In the U.S., data center electricity use is expected to surpass 600 TWh by 2030, tripling current levels. Meeting that demand requires the equivalent of adding 14 large power plants to the grid. Large AI data centers can each require 100–500 megawatts (MW), and the largest facilities may soon exceed 1 gigawatt (GW), which is about as much as a nuclear power plant or a small U.S. state. One 1 GW data center could consume more power than the entire city of San Francisco. Multiply that by a few dozen campuses across the country, and you start to see how quickly this demand adds up. To keep up, utilities across the country are delaying coal plant retirements, expanding natural gas infrastructure and shelving clean energy projects. In states like Utah, Georgia and Wisconsin, energy regulators have approved new fossil fuel investments directly linked to data center growth. By 2035, data centers could account for 8.6% of all U.S. electricity demand, up from 3.5% today. Despite public pledges to support sustainability, tech companies are inadvertently driving a fossil fuel resurgence. For the average person, this shift could increase electricity costs, strain regional energy supplies and complicate state-level clean energy goals. Can big tech keep its green energy promises? Tech giants Microsoft, Google, Amazon and Meta all claim they are working toward a net-zero emissions future. In simple terms, this means balancing the amount of greenhouse gases they emit with the amount they remove or offset, ideally bringing their net contribution to climate change down to zero. These companies purchase large amounts of renewable energy to offset their usage and invest in next-generation energy solutions. For example, Microsoft has a contract with fusion start-up Helion to supply clean electricity by 2028. However, critics argue these clean energy purchases do not reflect the reality on the ground. Because the grid is shared, even if a tech company buys solar or wind power on paper, fossil fuels often fill the gap for everyone else. Some researchers say this model is more beneficial for company accounting than for climate progress. While the numbers might look clean on a corporate emissions report, the actual energy powering the grid still includes coal and gas. Microsoft , Google and Amazon have pledged to power their data centers with 100% renewable energy, but because the grid is shared, fossil fuels often fill the gap when renewables aren't available. Some critics argue that voluntary pledges alone are not enough. Unlike traditional industries, there is no standardized regulatory framework requiring tech companies to disclose detailed energy usage from AI operations. This lack of transparency makes it harder to track whether green pledges are translating into meaningful action, especially as workloads shift to third-party contractors or overseas operations. AI CYBERSECURITY RISKS AND DEEPFAKE SCAMS ON THE RISE The future of clean energy for AI and its limits To meet soaring energy needs without worsening emissions, tech companies are investing in advanced energy projects. These include small nuclear reactors built directly next to data centers, deep geothermal systems and nuclear fusion. While promising, these technologies face enormous technical and regulatory hurdles. Fusion, for example, has never reached commercial break-even, meaning it has yet to produce more energy than it consumes. Even the most optimistic experts say we may not see scalable fusion before the 2030s. Beyond the technical barriers, many people have concerns about the safety, cost and long-term waste management of new nuclear systems. While proponents argue these designs are safer and more efficient, public skepticism remains a real hurdle. Community resistance is also a factor. In some regions, proposals for nuclear microreactors or geothermal drilling have faced delays due to concerns over safety, noise and environmental harm. Building new data centers and associated power infrastructure can take up to seven years, due to permitting, land acquisition and construction challenges. Google recently activated a geothermal project in Nevada, but it only generates enough power for a few thousand homes. The next phase may be able to power a single data center by 2028. Meanwhile, companies like Amazon and Microsoft continue building sites that consume more power than entire citie. SCAMMERS CAN EXPLOIT YOUR DATA FROM JUST ONE CHATGPT SEARCH Will AI help or harm the environment? This is the central debate. Advocates argue that AI could ultimately help accelerate climate progress by optimizing energy grids, modeling emissions patterns and inventing better clean technology. Microsoft and Google have both cited these uses in their public statements. But critics warn that the current trajectory is unsustainable. Without major breakthroughs or stricter policy frameworks, the energy cost of AI may overwhelm climate gains. A recent forecast estimated that AI could add 1.7 gigatons of carbon dioxide to global emissions between 2025 and 2030, roughly 4% more than the entire annual emissions of the U.S. Water use, rare mineral demand and land-use conflicts are also emerging concerns as AI infrastructure expands. Large data centers often require millions of gallons of water for cooling each year, which can strain local water supplies. The demand for critical minerals like lithium, cobalt and rare earth elements — used in servers, cooling systems and power electronics — creates additional pressure on supply chains and mining operations. In some areas, communities are pushing back against land being rezoned for large-scale tech development. Rapid hardware turnover is also adding to the environmental toll. As AI systems evolve quickly, older GPUs and accelerators are replaced more frequently, creating significant electronic waste. Without strong recycling programs in place, much of this equipment ends up in landfills or is exported to developing countries. The question isn't just whether AI can become cleaner over time. It's whether we can scale the infrastructure needed to support it without falling back on fossil fuels. Meeting that challenge will require tighter collaboration between tech companies, utilities and policymakers. Some experts warn that AI could either help fight climate change or make it worse, and the outcome depends entirely on how we choose to power the future of computing. HOW TO LOWER YOUR CAR INSURANCE COSTS IN 2025 Kurt's key takeaways AI is revolutionizing how we work, but it is also transforming how we use energy. Data centers powering AI systems are becoming some of the world's largest electricity consumers. Tech companies are betting big on futuristic solutions, but the reality is that many fossil fuel plants are staying online longer just to meet AI's rising energy demand. Whether AI ends up helping or hurting the climate may depend on how quickly clean energy breakthroughs catch up and how honestly we measure progress. CLICK HERE TO GET THE FOX NEWS APP Is artificial intelligence worth the real-world cost of fossil resurgence? Let us know your thoughts by writing to us at . For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channels Answers to the most asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved. Print Close URL

How addresses are collected and put on people finder sites
How addresses are collected and put on people finder sites

Fox News

time14-06-2025

  • Fox News

How addresses are collected and put on people finder sites

Print Close By Kurt Knutsson, CyberGuy Report Published June 14, 2025 Your home address might be easier to find online than you think. A quick search of your name could turn up past and current locations, all thanks to people finder sites. These data broker sites quietly collect and publish personal details without your consent, making your privacy vulnerable with just a few clicks. Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide — free when you join. How your address gets exposed online and who's using it If you've ever searched for your name and found personal details, like your address, on unfamiliar websites, you're not alone. People finder platforms collect this information from public records and third-party data brokers, then publish and share it widely. They often link your address to other details such as phone numbers, email addresses and even relatives. 11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025 While this data may already be public in various places, these sites make it far easier to access and monetize it at scale. In one recent breach, more than 183 million login credentials were exposed through an unsecured database. Many of these records were linked to physical addresses, raising concerns about how multiple sources of personal data can be combined and exploited. Although people finder sites claim to help reconnect friends or locate lost contacts, they also make sensitive personal information available to anyone willing to pay. This includes scammers, spammers and identity thieves who use it for fraud, harassment, and targeted scams. How do people search sites get your home address? First, let's define two sources of information; public and private databases that people search sites use to get your detailed profile, including your home address. They run an automated search on these databases with key information about you and add your home address from the search results. 1. Public sources Your home address can appear in: Property deeds: When you buy or sell a home, your name and address become part of the public record. When you buy or sell a home, your name and address become part of the public record. Voter registration: You need to list your address when voting. You need to list your address when voting. Court documents: Addresses appear in legal filings or lawsuits. Addresses appear in legal filings or lawsuits. Marriage and divorce records: These often include current or past addresses. These often include current or past addresses. Business licenses and professional registrations: If you own a business or hold a license, your address can be listed. WHAT IS ARTIFICIAL INTELLIGENCE (AI)? These records are legal to access, and people finder sites collect and repackage them into detailed personal profiles. 2. Private sources Other sites buy your data from companies you've interacted with: Online purchases: When you buy something online, your address is recorded and can be sold to marketing companies. When you buy something online, your address is recorded and can be sold to marketing companies. Subscriptions and memberships: Magazines, clubs and loyalty programs often share your information. Magazines, clubs and loyalty programs often share your information. Social media platforms: Your location or address details can be gathered indirectly from posts, photos or shared information. Your location or address details can be gathered indirectly from posts, photos or shared information. Mobile apps and websites: Some apps track your location. People finder sites buy this data from other data brokers and combine it with public records to build complete profiles that include address information. What are the risks of having your address on people finder sites? The Federal Trade Commission (FTC) advises people to request the removal of their private data , including home addresses, from people search sites due to the associated risks of stalking, scamming and other crimes. People search sites are a goldmine for cybercriminals looking to target and profile potential victims as well as plan comprehensive cyberattacks. Losses due to targeted phishing attacks increased by 33% in 2024 , according to the FBI. So, having your home address publicly accessible can lead to several risks: Stalking and harassment: Criminals can easily find your home address and threaten you. Criminals can easily find your home address and threaten you. Identity theft: Scammers can use your address and other personal information to impersonate you or fraudulently open accounts. Scammers can use your address and other personal information to impersonate you or fraudulently open accounts. Unwanted contact: Marketers and scammers can use your address to send junk mail or phishing or brushing scams. Marketers and scammers can use your address to send junk mail or phishing or Increased financial risks: Insurance companies or lenders can use publicly available address information to unfairly decide your rates or eligibility. Insurance companies or lenders can use publicly available address information to unfairly decide your rates or eligibility. Burglary and home invasion: Criminals can use your location to target your home when you're away or vulnerable. How to protect your home address The good news is that you can take steps to reduce the risks and keep your address private. However, keep in mind that data brokers and people search sites can re-list your information after some time, so you might need to request data removal periodically. I recommend a few ways to delete your private information , including your home address, from such websites. 1. Use personal data removal services: Data brokers can sell your home address and other personal data to multiple businesses and individuals, so the key is to act fast. If you're looking for an easier way to protect your privacy, a data removal service can do the heavy lifting for you, automatically requesting data removal from brokers and tracking compliance. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web 2. Opt out manually : Use a free scanner provided by a data removal service to check which people search sites that list your address. Then, visit each of these websites and look for an opt-out procedure or form: keywords like "opt out," "delete my information," etc., point the way. Follow each site's opt-out process carefully, and confirm they've removed all your personal info, otherwise, it may get relisted. 3. Monitor your digital footprint: I recommend regularly searching online for your name to see if your location is publicly available. If only your social media profile pops up, there's no need to worry. However, people finder sites tend to relist your private information, including your home address, after some time. 4. Limit sharing your address online: Be careful about sharing your home address on social media, online forms and apps. Review privacy settings regularly, and only provide your address when absolutely necessary. Also, adjust your phone settings so that apps don't track your location. Kurt's key takeaways Your home address is more vulnerable than you think. People finder sites aggregate data from public records and private sources to display your address online, often without your knowledge or consent. This can lead to serious privacy and safety risks. Taking proactive steps to protect your home address is essential. Do it manually or use a data removal tool for an easier process. By understanding how your location is collected and taking measures to remove your address from online sites, you can reclaim control over your personal data. CLICK HERE TO GET THE FOX NEWS APP How do you feel about companies making your home address so easy to find? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels: Answers to the most-asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved. Print Close URL

Digital Social Security cards coming this summer
Digital Social Security cards coming this summer

Yahoo

time09-06-2025

  • Yahoo

Digital Social Security cards coming this summer

The Social Security Administration (SSA) just announced a major update. Starting this summer, Americans with a "My Social Security" account will be able to access their digital Social Security number (SSN) online. The goal is to simplify access, reduce paper card replacements and improve data protection. But with convenience comes new cybersecurity concerns. Here's how the digital SSN works, why it's being introduced now and the steps you should take to protect your SSN from identity theft both online and offline. Join the FREE "CyberGuy Report": Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free "Ultimate Scam Survival Guide" when you sign up! The SSA is introducing secure digital access to your Social Security number through the "My Social Security" portal. If you forget your SSN, misplace your card or need to share your number for non-SSA purposes (such as job applications or financial services), you'll be able to view your number online from a mobile device. "This enhancement will provide individuals…a simple solution allowing them to securely view their SSN online," said the SSA. This update eliminates the need for mail delays or in-person visits to your local SSA office. Top Ways To Safeguard Your Social Security Number Read On The Fox News App There are a few big reasons the SSA is rolling this out now: Aging physical cards: The SSA estimates there are 47 different versions of the Social Security card still in circulation. Many of them were issued before 1983 and lack basic security features, making them easier to forge or misuse. Rising identity theft risks: Your SSN is one of the most sensitive identifiers tied to your name. When cards are lost, stolen or handled carelessly, it creates opportunities for identity theft, fraud and account takeovers. Demand for digital access: More Americans now expect to access government services from their phones or computers. Long lines at SSA offices and delays in mail processing have made it harder for people to get help quickly. A digital SSN provides faster, safer and more convenient access to your number when you need it. Is Your Social Security Number At Risk? Signs Someone Might Be Stealing It The digital SSN option will be available in early summer 2025. If you already have a "My Social Security" account, you'll be able to access the feature once it rolls out. You'll need a "My Social Security" account to use the digital SSN features. Here's how to get started: 1) Visit the SSA's account portal: Go to and click "Create an Account." 2) Verify your identity: You'll be asked to provide your name, birthdate, SSN and address. The SSA may use a third-party identity verification service and ask questions based on your credit report. 3) Choose a username and password: Use a strong, unique password and set up two-factor authentication with your phone number or an authenticator app. Consider using a password manager to generate and store complex passwords. 4) Log in and check your dashboard: Once the digital SSN feature launches, you'll be able to view your number securely from your account on a mobile device or computer. If you're already signed up, double-check your security settings and make sure your contact information is current. Outsmart Hackers Who Are Out To Steal Your Identity Even with digital access making your SSN more convenient, it's still one of the most sensitive pieces of personal information you own. If your SSN falls into the wrong hands, it can lead to identity theft, credit fraud and even tax return scams. Here are the best ways to protect it: 1) Use a strong password for your SSA account: Create a unique, complex password for your "My Social Security" account and enable two-factor authentication. This ensures that even if someone guesses your password, they won't be able to log in without a second verification step. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here. 2) Avoid public Wi-Fi when accessing your SSN: If you're checking your SSA account, avoid doing so over unsecured networks like public Wi-Fi. Use a secure home network or VPN to encrypt your connection and protect your session from hackers. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices. 3) Be cautious of phishing scams and use strong antivirus software: Scammers often pose as the SSA to trick you into revealing your SSN. Don't click links in unsolicited emails or texts and never give personal information unless you're sure the source is legitimate. Always go directly to if in doubt. To block suspicious links and attachments before they reach you, consider using strong antivirus software. The right antivirus can help detect phishing attempts and protect you from malicious downloads. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 4) Monitor your credit and bank accounts and use an identity theft service: Staying on top of your financial activity is one of the most effective ways to catch identity theft early. That's where identity protection services come in. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft. 5) Check your credit reports: Make it a habit to review your credit reports regularly. Look for unfamiliar accounts, unauthorized inquiries or incorrect personal information. If something seems off, contact the credit bureau right away to dispute it. 6) Request an IRS Identity Protection PIN: Prevent fraudulent tax filings using your SSN by setting up an Identity Protection Pin with the IRS. This six-digit number adds another layer of protection during tax season. 7) Review your Social Security earnings record: Log in to your "My Social Security" account regularly to review your earnings history and benefits. This helps ensure your information hasn't been altered or compromised. Starting this summer, the SSA will let you view your Social Security number online through your "My Social Security" account. It's a secure, convenient update that cuts down on lost cards and office visits. To use it safely, set up strong login credentials and two-factor authentication. And since your SSN remains a top target for identity thieves, now's the time to protect it with tools like a password manager, VPN, antivirus software and identity theft monitoring. Do you trust digital access to your Social Security number? Let us know by writing to us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels: Facebook YouTube Instagram Answers to the most-asked CyberGuy questions: What is the best way to protect your Mac, Windows, iPhone and Android devices from getting hacked? What is the best way to stay private, secure and anonymous while browsing the web? How can I get rid of robocalls with apps and data removal services? How do I remove my private data from the internet? New from Kurt: Try CyberGuy's new games (crosswords, word searches, trivia and more!) CyberGuy's exclusive coupons and deals Copyright 2025 All rights article source: Digital Social Security cards coming this summer

Windowless jets offer digital experience on future flights
Windowless jets offer digital experience on future flights

Fox News

time05-06-2025

  • Business
  • Fox News

Windowless jets offer digital experience on future flights

Print Close By Kurt Knutsson, CyberGuy Report Published June 05, 2025 With the unveiling of Otto Aviation's Phantom 3500, humans are heading toward a future of windowless jets. The aircraft is redefining air travel by eliminating traditional windows in favor of a sleek, aerodynamic design, something many engineers are surely happy about. It's a radical approach, but it's one that, on top of improving fuel efficiency and reducing drag, will still offer some of the best views using digital technology. Join the FREE "CyberGuy Report" : Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free "Ultimate Scam Survival Guide" when you sign up! Why is windowless design such a big deal for aircraft? Most travelers don't realize that windows are structural weak points in an aircraft. They require extra reinforcement, add weight and disrupt the smooth flow of air over the fuselage (the main body of the plane). This increases drag, a resistance force that makes flight less efficient. By removing windows, the Phantom 3500's surface allows air to flow with minimal turbulence, helping the aircraft achieve what Otto Aviation describes as "full laminar flow characteristics." HYPERSONIC JET PROMISES NYC TO LONDON IN UNDER AN HOUR This is a major contributor to its impressive aerodynamic performance. The windowless design is not just for aesthetics. Otto Aviation specifically engineered the fuselage to optimize laminar flow, using lightweight materials and smooth surfaces to further reduce drag and fuel consumption. SOLAR-POWERED AIRCRAFT ACHIEVES GROUNDBREAKING 22-HOUR AUTONOMOUS FLIGHT How Phantom 3500 gives windowless passengers stunning digital views A common concern with windowless aircraft is claustrophobia. To address this, the Phantom 3500 features high-definition digital screens along the cabin walls and ceiling. These displays stream real-time video from cameras mounted on the aircraft's exterior, offering passengers a panoramic, immersive view of the skies. Otto Aviation refers to this system as Super Natural Vision, a proprietary technology that replaces traditional windows with state-of-the-art digital displays, seamlessly integrating real-time external views for a unique in-flight experience. The spacious, luminous cabin measures 800 cubic feet with a 6-foot-5-inch ceiling, comfortably accommodating four or more passengers in a luxurious, flexible layout. The cabin can seat up to nine passengers, depending on configuration, and is designed to maximize comfort and functionality. Freed from the constraints of window placement, the interior can be customized for relaxation, productivity or entertainment, ensuring passengers enjoy the journey as much as the destination. CHINESE WEARABLE EVTOL JETPACK MAKES HISTORIC FIRST FLIGHT Phantom 3500 sets new standard in jet fuel efficiency and performance The Phantom 3500 builds on flight tests from Otto's Celera 500L prototype and Dassault Systèmes' 3DEXPERIENCE platform. By sustaining laminar flow, the aircraft aims to improve fuel efficiency by 35%. This allows it to maintain high-speed performance while consuming less fuel, making it one of the most aerodynamically efficient aircraft ever developed. It operates in the transonic range (Mach 0.8–1.2), balancing speed and efficiency. It can also reach a cruising altitude of 51,000 feet, significantly higher than most commercial airliners, which typically fly between 30,000 and 40,000 feet. Thanks to its streamlined fuselage and optimized aerodynamics, the Phantom 3500 burns 50% less fuel than conventional business jets. This reduction in fuel consumption translates to lower operating costs and a significant decrease in carbon emissions. The Phantom 3500's wings achieve complete laminar flow, allowing for smoother airflow and reduced drag, enabling the aircraft to take off from runways as short as 3,500 feet, nearly doubling the number of accessible airports in the U.S. alone compared to similar-sized jets. GET FOX BUSINESS ON THE GO BY CLICKING HERE SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES Kurt's key takeaways The Phantom 3500 gives us a glimpse of where air travel could be headed. With its focus on efficiency and those stunning digital screens offering panoramic views, flying might soon feel more immersive and enjoyable than ever. If this jet lives up to its promise, the window seat could become a thing of the past, and the future of aviation might get a lot greener and faster, too. CLICK HERE TO GET THE FOX NEWS APP Would you trade traditional airplane windows for high-definition digital screens showing real-time views? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels: Answers to the most-asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved. Print Close URL

Massive data breach exposes 184 million passwords and logins
Massive data breach exposes 184 million passwords and logins

Yahoo

time02-06-2025

  • Business
  • Yahoo

Massive data breach exposes 184 million passwords and logins

Data breaches are no longer rare events but a persistent problem. We've been seeing regular incidents at public-facing companies across various sectors, including healthcare, retail and finance. While bad actors are certainly to blame, these corporations aren't entirely without fault. They often make it easy for hackers to access user data by failing to protect it properly. A recent example came to light when a cybersecurity researcher discovered an open database containing over 184 million account credentials. Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts and exclusive deals — plus instant access to my free Ultimate Scam Survival Guide when you sign up! Cybersecurity researcher Jeremiah Fowler has revealed the existence of an open database that contains 184,162,718 million account credentials. These include email addresses, passwords, usernames and URLs for platforms such as Google, Microsoft, Apple, Facebook and Snapchat. The information also covers banking services, medical platforms and government accounts. Most shockingly, the entire dataset was left completely unsecured. There was no encryption, no authentication required and no form of access control. It was simply a plain text file sitting online for anyone to find. Read On The Fox News App 19 Billion Passwords Have Leaked Online: How To Protect Yourself Fowler located the database during routine scanning of publicly exposed assets. What he found was staggering. The file included hundreds of millions of unique records containing user credentials linked to the world's largest technology and communication platforms. There were also account details for financial services and official portals used by state institutions. The file was not protected in any way. Anyone who discovered the link could open it in a browser and instantly view sensitive personal data. No software exploit was needed. No password was asked for. It was as open as a public document. 200 Million Social Media Records Leaked In Major X Data Breach Fowler believes the data was harvested using an infostealer. These lightweight tools are favored by cybercriminals for their ability to silently extract login credentials and other private information from compromised devices. Once stolen, the data is often sold on dark web forums or used in targeted attacks. After reporting the breach, the hosting provider quickly removed access to the file. However, the owner of the database remains unknown. The provider did not disclose who uploaded it or whether the database was part of a legitimate archive that was accidentally published. Fowler could not determine whether this was the result of negligence or an operation with malicious intent. To verify the data, Fowler contacted some individuals listed in the records. Several confirmed that the information was accurate. This confirmation turns what might seem like abstract statistics into something very real. These were not outdated or irrelevant details. These were live credentials that could allow anyone to hijack personal accounts in seconds. 1.7 Billion Passwords Leaked On Dark Web And Why Yours Is At Risk Hr Firm Confirms 4M Records Exposed In Major Hack 1. Change your password on every platform: If your login credentials have been exposed, it's not enough to change the password on just one account. Cybercriminals often try the same combinations across multiple platforms, hoping to gain access through reused credentials. Start by updating your most critical accounts, email, banking, cloud storage and social media, then move on to others. Use a new, unique password for each platform and avoid variations of old passwords, as they can still be predictable. Consider using a password manager to generate and store complex passwords. Our top-rated password manager delivers powerful protection to help keep your accounts secure. It features real-time data breach monitoring to alert you if your login details have been exposed, plus a built-in data breach scanner that checks your saved emails, passwords and credit card information against known leak databases. A password health checker also highlights weak, reused or compromised passwords so you can strengthen your online defenses with just a few clicks. Get more details about my best expert-reviewed Password Managers of 2025 here. 2. Enable two-factor authentication: Two-factor authentication, or 2FA, is a critical security feature that drastically reduces the risk of unauthorized access. Even if someone has your password, they won't be able to log in without the second verification step, usually a one-time code sent to your phone or an authenticator app. Enable 2FA on all services that support it, especially your email, financial accounts and any service that stores sensitive personal data. 3. Watch for unusual account activity: After a breach, it's common for compromised accounts to be used for spam, scams, or identity theft. Pay close attention to signs such as login attempts from unfamiliar locations, password reset requests you didn't initiate or unexpected messages sent from your accounts. Most platforms allow you to review login history and connected devices. If you see something off, take action immediately by changing your password and revoking suspicious sessions. 4. Invest in personal data removal services: You should also consider a data removal service. Given the scale and frequency of breaches like the one described above, relying on personal caution alone is no longer enough. Automated data removal services can provide an essential extra layer of defense by continuously scanning for and helping eliminate your exposed information from data broker sites and other online sources. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web. 5. Avoid clicking on suspicious links and use strong antivirus software: One of the most common post-breach threats is phishing. Cybercriminals often use information from leaked databases to craft convincing emails that urge you to verify your account or reset your password. Never click on links or download attachments from unknown or suspicious sources. Instead, visit websites by typing the URL directly into your browser. The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 6. Keep your software and devices up to date: Many cyberattacks exploit known vulnerabilities in outdated software. Operating systems, browsers, antivirus programs and even apps need to be updated regularly to patch security flaws. Turn on automatic updates wherever possible so you're protected as soon as fixes are released. Staying current with your software is one of the easiest and most effective ways to block malware, ransomware and spyware from infiltrating your system. Hackers Using Malware To Steal Data From Usb Flash Drives Security is not only the responsibility of companies and hosting providers. Users need to adopt better practices, including unique passwords, multifactor authentication and regular reviews of their digital footprint. The careless exposure of over 184 million credentials is not just a mistake. It is an example of how fragile our systems remain when even basic protection is absent. In an era where artificial intelligence, quantum computing, and global connectivity are reshaping technology, it is unacceptable that plain text files containing financial and governmental credentials are still left sitting online. Do you feel that companies are doing enough to protect your data from hackers and other cyber threats? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels: Facebook YouTube Instagram Answers to the most-asked CyberGuy questions: What is the best way to protect your Mac, Windows, iPhone and Android devices from getting hacked? What is the best way to stay private, secure and anonymous while browsing the web? How can I get rid of robocalls with apps and data removal services? How do I remove my private data from the internet? New from Kurt: Try CyberGuy's new games (crosswords, word searches, trivia and more!) CyberGuy's Exclusive Coupons and Deals Copyright 2025 All rights article source: Massive data breach exposes 184 million passwords and logins

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store