[Fox News] How crypto imposters are using Calendly to infect Macs with malware

A new hacking threat is targeting crypto users via Calendly, a popular meeting-scheduling app. This is a serious issue that could compromise your security and privacy, so you need to be aware of how it works and how to protect yourself.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

The way this particular threat works is rather straightforward, yet sneaky. To start, many people in the crypto world are seeking investments to support their crypto start-up ideas or something related.

People like this need to be active in crypto communities and investment spaces to connect with the right people to support them. It’s not uncommon for these people to have a link to schedule a meeting with them on their profile, via Calendly, a popular scheduling app not just for people in cryptocurrency but for anyone.

Unbeknownst to the soon-to-be victim, these hackers are taking advantage of these individuals by posing as crypto investors, the exact kind of people these folks want to get in touch with. When they book a meeting on this person’s calendar, they add a meeting link that runs a script that installs malware on macOS systems.

This happened to one unlucky person in this situation. The hacker reached out via Telegram – an encrypted messaging app – and asked about booking a meeting. The person sent the “investor” their Calendly link, and on the day of the meeting, went to the meeting link that the “investor” had added. In most cases, this is normal – a link to a Zoom or Google Meet is not unusual. And because the user had already spoken to the person via Telegram and seemed legitimate, there was no reason to think twice about this.

Only when the person went to click the link and when the “investor” didn’t show up, did he contact him on the same Telegram thread. The “investor” apologized for the inconvenience and sent a new link, explaining there was an issue with IT.

However, the link still did not work, and the meeting never happened, with the “investor” asking to reschedule. It dawned on the person a little afterward that this may have been a hack attack, via an Apple Script (file extension “.scpt”) that downloads and executes a malicious Trojan made to run on macOS systems.

MORE: STEALTHY BACKDOOR MAC MALWARE THAT CAN WIPE OUT YOUR FILES

Because the person who was the target of this attack promptly backed up their data upon realizing the attack, it prevented the loss of evidence regarding the actual malware downloaded onto their macOS. Cybersecurity firms were able to analyze the script information, which led them to identify similarities with previous attacks carried out by the same group and warn the public.

MORE: HOW TO PROTECT YOUR MAC FROM THE NEW METASTEALER MALWARE

A cybersecurity firm discovered a phishing attack in 2023 that was carried out by state-sponsored hackers from North Korea, specifically a subgroup of the notorious Lazarus group. This group typically targets financial gains, aiming to steal money or cryptocurrency to fund the North Korean military regime.

In this particular attack, the North Korean hackers exploited the “Add Custom Link” feature within the Calendly meeting scheduling system on event pages to insert malicious links and initiate phishing attacks. They also employ similar tactics on Telegram.

This incident underscores the importance of vigilance and robust security measures to safeguard against cyberthreats, especially those originating from state-sponsored actors.

We reached out to Calendly, and their CISO (chief information security officer), Frank Russo, provided us with this statement.

“We’re aware of these types of social engineering attacks by cryptocurrency hackers. This attack violates our Terms of Use, and accounts are immediately terminated when discovered or reported. To help prevent these kinds of attacks, our security team and partners have implemented a service to automatically detect fraud and impersonations that could lead to social engineering. We are also actively scanning content for all our customers to catch these types of malicious links and to prevent hackers earlier on. Additionally, we intend to add an interstitial page warning users before they’re redirected away from Calendly to other websites.”

MacOS users tend to experience fewer malware attacks than PC users. But this idea can make MacOS users more vulnerable to attacks because they may feel they are simply safe. Because hackers are getting more and more sophisticated, it’s important never to let your guard down and to follow these precautions.

Be cautious with links: If you receive a Calendly link from an unfamiliar sender, refrain from clicking on any embedded links, even if the sender appears trustworthy. Additionally, exercise vigilance when dealing with phishing emails or messages related to crypto exchanges or wallets, as they may contain malicious attachments or links with malware. When using Calendly, take note of the source and domain of any links you encounter on the interface. Before clicking, hover your mouse over the text to verify the link address and avoid accessing potentially harmful phishing links.

Send meeting links yourself: Whenever possible, send the meeting link directly to the person scheduling the call. This minimizes the risk of accidentally clicking on malicious links.

Have good antivirus software: The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Mac, Windows, Android & iOS devices.

Perform regular updates: Regularly update your operating system and security software to stay ahead of potential vulnerabilities.

Have strong passwords and use two-factor authentication: Using the same password across multiple platforms will always make you more vulnerable because if one account gets hacked, they all get hacked. And two-factor authentication is just an extra shield that will prevent a hacker from getting into your accounts. Make sure to use a password manager to keep track of all your passwords.

MORE: DON’T FALL FOR THESE SNEAKY TAX SCAMS THAT ARE OUT TO STEAL YOUR IDENTITY AND MONEY

As long as there is money and information to steal online, hackers will stop at nothing to trick innocent people into downloading malware onto their devices. So, stay up to date with the latest threats so that you can ensure you’re doing everything to protect yourself.

Have you encountered suspicious meeting requests via Calendly or other scheduling apps? Do you think the app companies should do more to verify the authenticity of such links? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Read More 

[Fox News] How imposters are trying to exploit your grief and wallet in a new funeral scam

Just when you thought you’d seen the worst of humanity, scammers have managed to reach a new low

You thought the Facebook scam about how scammers are commandeering people’s Facebook profiles with fake bereavement posts was terrible? It gets worse.

While the Facebook post scam ran with fake bereavement posts to glean information about supportive friends, families and even strangers, this new scam targets actual surviving family members of those recently deceased. The scammers reach out to families pretending to be from funeral homes and demand more payment or threaten the cancellation of the funeral.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER 

It is easy to see how distraught loved ones might fall for such scams as they are already under immense stress from losing a loved one. While the Federal Trade Commission (FTC) has alerted those in the funeral industry, below are some key steps you can take to prevent you or anyone you care about from falling for this horrendous scam.

As with most scams, these charlatans are banking on the fact that any urgency they present you with will prevent you from thinking first. They are hoping that catching you in a vulnerable state and giving you an ultimatum will result in action taken before the victim or their family can think it through.

This scam is especially insidious because who would think of preying on family members of someone who is recently deceased? Forewarned is forearmed. So, hopefully, knowing this scam has been committed will give you pause if you should run into such a situation.

Anyone can change the name of their outgoing number (the phone number you are getting a call from) so it may even say in the caller ID that it is from the funeral home you have employed.

If you are uncertain, tell them you will call them right back and hang up the phone. Find the number on the estimate or invoice you received directly from the funeral home and call to verify what is going on. The funeral home’s contact information can be found on the general price list the funeral home provided.

SCAMMERS ARE USING FAKE NEWS, MALICIOUS LINKS TO TARGET YOU IN AN EMOTIONAL FACEBOOK PHISHING TRAP

Scammers don’t make the urgent payment needed easy to give. They have a tendency to request odd things like a wire transfer, gift cards, cryptocurrency or even a check payback, where they send you a check claiming there was a clerical or mechanical error with their bank, have you deposit the check then have you send it back.

This is all to stop the money from being traced back to them or prevent you from recovering your money. The funeral home should have gone over the types of payments accepted when the general price list was provided. If there is a strong deviation from the most common forms of payment, hang up.

MORE: HOW TO STOP PHONE NUMBER SPOOFING AND PROTECT YOURSELF FROM SCAMMER 

While life is full of surprises, funeral homes should not be. They are regulated by the FTC to provide explicit pricing and information to consumers. A full explanation of the FTC’s oversight in this arena can be found under the “funeral rule.”

As mentioned in No. 2 of this list, each funeral provider is required to provide a general price list, which should disclose fees for any services involved in a funeral and pricing for most aspects of the funeral. If a scammer calls claiming new fees for services or items, remember that all those factors would have been provided to you with the general price list and agreed upon when hiring the funeral home.

MORE: HOW TO PROTECT YOURSELF FROM THE VENMO, ZELLE AND CASH APP SCAM THAT CAN WIPE OUT YOUR SAVINGS IN SECONDS

While it may seem worthwhile to give the scammer a tongue-lashing, it is not worth your time, energy and further violation of privacy. You do not know what information these scammers are gathering during the conversation, and it is best to hang up as soon as possible and report it to the FTC here.

Consider using an identity theft protection service to shield yourself from potential scams, especially those related to funeral fraud. This is more for you than the deceased’s personal and financial information.

Identity theft companies can monitor personal information like your Social Security Number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

MORE: THIS FACEBOOK MESSENGER PHISHING SCAM IS STEALING MILLIONS OF PASSWORDS

Consider these essential precautions to safeguard your family’s privacy and financial well-being from scammers after a loved one has died.

Craft obituaries mindfully: When writing an obituary, omit sensitive details that could be exploited for identity theft. Avoid including the deceased’s date and place of birth, middle name, maiden name, mother’s maiden name and home address. Additionally, refrain from mentioning the date and time of the funeral to prevent potential burglaries during the service.

Promptly report to Social Security: If a loved one has died, immediately notify the Social Security Administration by calling 800-772-1213. This step ensures benefits are appropriately handled.

Inform the IRS: Send a copy of the death certificate to the IRS. This allows officials to flag the deceased’s tax account, preventing any fraudulent activity.

Notify financial institutions: Reach out to banks and other financial institutions where the late loved one had accounts. If you decide to close these accounts, request that they be marked as “Closed: Account holder is deceased.”

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Alert credit bureaus: Contact the major credit bureaus — Equifax, Experian and TransUnion — to have them place a death notice in the deceased’s credit file. This step helps prevent unauthorized credit applications.

Monitor credit reports: Obtain a copy of the deceased’s credit report shortly after death and again a few months later. Regular checks can help detect any fraudulent activity.

Dealing with debts: Don’t let debt collectors intimidate you into paying financial obligations for a late spouse, parent or sibling. Generally, the estate is responsible for debts, not the survivors. However, there are exceptions for cosigned loans and jointly held financial accounts. For specific guidance, consult the U.S. Consumer Financial Protection Bureau.

Exercise caution with contacts: Be cautious if you receive communication from “long-lost” relatives or friends of the deceased, especially on social media. Verify their identity by asking family and old friends if they recognize the person.

Scammers have a knack for finding new ways to prey on the vulnerable. While fending off scammers is the last thing on one’s mind while grieving the loss of a loved one, it is important to stay informed and empowered so that your time and energy are spent on what really matters — remembering our lost loved ones.

What do you think should be done to stop these heartless scammers from exploiting people’s grief? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com.  All rights reserved.

Read More 

[Fox News] A new type of pilot could be key to solving a looming crisis in the skies

A fully autonomous aviator, equipped with artificial intelligence, could help alleviate a looming pilot shortage, according to the head of a company working on the tech.

“We simply don’t have enough pilots to be able to keep up with the burgeoning need for things in the sky,” Merlin Labs CEO Matt George told Fox News. “It’s something that we need to start looking forward at to design an aviation system and design an aerospace system … as the demand for aviation grows around the world.”

The airline industry will be short 13,300 pilots by 2032, the management consulting firm Oliver Wyman projected last year, when it found there was a shortage of about 12,710 aviators. And the Air Force, one of Merlin’s main clients, has been about 2,000 pilots short of its target for years, and, according to Stars and Stripes, was offering up to $600,000 in bonuses to retain experienced aviators.

WATCH MORE FOX NEWS DIGITAL ORIGINALS HERE

“The amount of commercial traffic in the world doubles every 15 years,” George said. “As billions and billions of new consumers come online who also want their package delivered in two days or less or also want to be able to go access the air system … we need to think differently about humanity’s relationship to the sky.”

Merlin aims to both alleviate the shortage by replacing one human pilot in cargo plane cockpits with its software and make the remaining aviator’s job easier by taking on some of their responsibilities. George stressed that this would make flying safer, adding that his company’s system largely relies on traditional aviation technology and only uses AI to fill in the gaps.

“The Merlin software is designed to perform what we call the aviate, navigate and communicate functions traditionally performed by a human pilot,” George said. “The system is determining where the aircraft should go, how the aircraft should interact in airspace, even things like understanding the instructions of air traffic controllers and talking back.”

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Human pilots, as a result, can focus more on the larger mission and “use their brains for what matters versus using their brains for performing basic aviation functions,” George continued.

Last month, Merlin announced that aspects of its autonomous pilot would be tested and demonstrated on the Air Force’s KC-135 Stratotanker, an aerial refueling jet. George also teased that an announcement would come in a few weeks “around some of the final endpoints in our [civil] certification process as we start to bring it to market.”

HOW A LIZARD-LIKE ROBOT COULD HELP THE NAVY ‘PREVENT CATASTROPHES’: DECORATED VETERAN

Still, George emphasized that human pilots won’t be going anywhere anytime soon.

“We think that the future is a combination of autonomy and humans,” George said. “This isn’t necessarily a bunch of aircraft flying around without people aboard, but it’s a bunch of aircraft flying around with high levels of autonomy that are supplementing the humans’ capability aboard the aircraft.”

Read More 

[Fox News] How to cancel subscriptions on an Android to save money

Have you ever signed up for a free trial of an app or service on your Android device, only to forget about it and end up paying for a subscription you don’t use? You’re not alone.

Many people fall into this trap and end up wasting money on things they don’t need or want. However, don’t worry. 

There is a simple way to check and cancel your subscriptions on Android. Just follow these easy steps. 

For those of you who have an iPhone and want to check and cancel your subscriptions click here

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER 

Settings may vary depending on your Android phone’s manufacturer 

MORE: TOP ANDROID PHONES OF 2024 

MORE: BEST ACCESSORIES FOR YOUR PHONE 

THE INCREDIBLE ONE-HANDED TYPING TRICK ON ANY ANDROID

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Now, you will no longer be charged for that particular subscription, but you can still use it until the end of the current billing cycle. After that, the service will stop working, and you will lose access to any features or content included in the subscription.

MORE: BEWARE OF NEW ANDROID MALWARE HIDING IN POPULAR APPS 

Now you know how to check and cancel your subscriptions on Android. You can save money and avoid paying for things you don’t use or want. You can also manage your subscriptions anytime by following the same steps. Just remember to review your subscriptions regularly and cancel the ones you don’t need.

Do you think app stores have a responsibility to make canceling subscriptions easier for users? Why or why not? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com.  All rights reserved.

Read More 

[Fox News] Hackers use pirated software to hijack Mac, Android and Windows devices

Trading in cryptocurrency? You might be sitting on a pretty penny in that digital wallet of yours. Feels great, doesn’t it? But here’s the catch with digital currency: Keeping it secure isn’t a walk in the park.

Hackers are out there, working overtime to come up with new tricks to swipe your crypto, potentially emptying your wallet in one fell swoop. Yep, for these cyber thieves, your digital cash is the ultimate prize. And the worst part? Most of the time, you won’t even realize you’ve been hit until your balance is zero.

Case in point: There’s this fresh malware out there, specifically targeting macOS, Android and Windows devices. It sneaks in through pirated software, hunting for your cryptocurrency to make it its own. Here’s how it works.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER

The cybersecurity company Kaspersky has uncovered a sophisticated new malware campaign designed to pilfer cryptocurrency from users’ wallets. This campaign leverages pirated or improperly licensed software as a vector for infection, exploiting the common practice of seeking out “free” versions of paid software online.

These cracked applications, distributed through unauthorized websites, are embedded with a Trojan-Proxy type of malware. This malware is not limited to just macOS users, as recent findings have shown; variants targeting Android and Windows platforms have also been discovered, connecting to the same Command and Control (C&C) server. These variants, like their macOS counterparts, are concealed within cracked software, illustrating the widespread risk across different operating systems.

CHICAGO CHILDREN’S HOSPITAL REGAINS ACCESS TO MEDICAL RECORDS A MONTH AFTER CYBERATTACK

Once the malware is downloaded onto your device, it will immediately start checking for Bitcoin and Exodus cryptocurrency wallets. If it discovers either one (which is very unfortunate for some users who have both), the malware replaces the wallet and infects it with another version that’s able to steal the cryptocurrency. For some people, this could amount to thousands of dollars. And, it’s all because you unintentionally downloaded the malware to your macOS, Android and Windows devices.

MORE: HOW CROOKS ARE USING SKIMMERS AND SHIMMERS TO STEAL YOUR MONEY AT YOUR ATM MACHINE

Kaspersky reported that this new malware is coming through cracked software applications online. A cracked software has broken protection, thus making it easier for hackers to infiltrate it with code. With this, the malware’s creator took pre-compromised versions of the pirated software — one example being xScope, a paid macOS utility — and altered a few bytes of code to get the job done.

Then, in February, security firm Jamf found another cryptocurrency-focused macOS malware circulating through a pirated version of Apple’s Final Cut Pro software.

Attackers can use this malware to gain money or perform criminal activities using your device. It is distributed as .PKG installers, which contain scripts that execute after installation, altering system files and setting up the malware to run as a system process.

The pirated applications are versions of software that have been modified to remove or disable features that are only available in paid versions, such as license verification. These applications are often distributed illegally and without the consent of the software creator. These are identified as being loaded with this Trojan-Proxy malware:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Furthermore, the malware campaign extends beyond macOS, as shown by the fact that Android and Windows platforms are also being targeted by malware that communicates with the same command and control server. The applications or files identified for these platforms are:

The lesson is to avoid downloading pirated software from unauthorized sources to protect yourself from such malware infections.

MORE: STEALTHY BACKDOOR MAC MALWARE THAT CAN WIPE OUT YOUR FILES

When you download one of these apps, it launches “Activator,” which prompts you to put in your device’s username and password to install and launch the software, when you think you’re installing an app.

When this happens successfully (or, rather — unsuccessfully to you), the hacker can spy on your device and receive commands from their server. This is when the hacker executes their dirty work: searching for cryptocurrency wallets, replacing them and looting your dough.

MORE: BEWARE OF FAKE BROWSER UPDATES ON YOUR MAC

Another note that Kaspersky mentioned about this particular malware is that it has been targeting users with the macOS Ventura 13.6, which was just released in September. We don’t know for sure, but this seems to suggest that if you’re not running that, then you might be safe from this hack, this time.

Of course, if you also don’t have cryptocurrency, you’re probably okay, too. However, this unique type of malware that uses pirated software to get on your device is not all that new. Hackers have used this method of exploiting pirated software before, and they’ll do it again.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

Remember, for the hacker to get the malware on your device, you have to download it. This is done by clicking on a link or a file that’s generally suspicious, but not always. In the case of this threat, hackers understand that cryptocurrency users are probably more tech-savvy than the average person, and are therefore more attuned to hacks that are out there. Because of this, hackers have to find ways to trick you into downloading the malware in the first place. So here are five things you can do to protect yourself.

1) Don’t download bootleg software: It’s not worth the risk to download bootleg software. It exposes your device to potential security threats, such as viruses and spyware. Downloading software from reputable app stores is definitely the way to go to protect your devices.  

2) Don’t click on suspicious links or files: If you encounter a link that looks suspicious, misspelled or unfamiliar, avoid clicking on it. Instead, consider going directly to the company’s website by manually typing in the web address or searching for it in a trusted search engine. Typically, the first or second result that appears is legitimate.

3) Update your device with software regularly: Regularly updating your device’s software is crucial for security because it ensures that you receive the latest patches, bug fixes and security enhancements. These updates help protect your device from vulnerabilities and potential threats that could be exploited by malicious actors.

4) Consider storing your cryptocurrency wallet in an external hard drive: If you do have cryptocurrency, you can always consider storing your wallet in an external hard drive. This storage method means that it’s safe from hackers on the internet.

5) Have good antivirus software: The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Mac, Windows, Android & iOS devices.

A new day comes with new malware that’s targeting those of you who use Mac, Windows and Android devices and who have cryptocurrency wallets. It’s a scary threat that could cost you a lot of money if you’re not careful. But you can protect yourself by following the steps above, so you can enjoy your cryptocurrency without worrying about losing it to hackers.

Do you believe government regulations should play a stronger role in protecting crypto users? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most-asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Read More 

[Fox News] Fox News AI Newsletter: Google Gemini is ‘tip of the iceberg’

IN TODAY’S NEWSLETTER:

– Google Gemini is ‘the tip of the iceberg’: AI bias can have ‘devastating impact’ on humanity, say experts
– Elon Musk takes on OpenAI
– AI weapon detection company seeks to prevent school, other shootings: ‘a proactive measure’

‘BIGOT IN THE MACHINE’: Substantial backlash against Google’s Gemini artificial intelligence (AI) chatbot has elevated concern about bias in large language models (LLMs), but experts warn that these issues are just the “tip of the iceberg” when it comes to the potential impact of this tech across industries.

ENERGY STRAIN: The artificial intelligence (AI) boom, increased clean technology manufacturing and cryptocurrency mining are straining U.S. energy supplies as energy sources struggle to keep pace with rising demand.

‘A PROACTIVE MEASURE’: ZeroEyes, an artificial intelligence (AI) weapon detection software company, has partnered with Fort Smith public schools in Arkansas to prevent potential firearm threats. 

MUSK VS. OPENAI: OpenAI on Tuesday hit back at Elon Musk’s lawsuit claiming the startup abandoned its original nonprofit mission by revealing communications showing the billionaire backed OpenAI’s move to create a for-profit entity and suggested it should merge with Tesla.

RED TAPE: House Rep. Andy Biggs is eyeing artificial intelligence (AI) technology as a way to cut unnecessary government red tape.

‘CRITICAL OVERSIGHTS’: Backlash to the Google Gemini artificial intelligence (AI) is prompting responses from tech leaders, including a former Google software engineer and a tech entrepreneur working closely with one of Google’s startup programs.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Read More