[Fox News] 5 ways to make your Facebook account bulletproof

Scammers are constantly looking for ways to access your Facebook account. It doesn’t matter who you are; they want your information. They’re even stealing accounts from dog shelters. And if they get in, some users say recovering your account is a hassle. That’s why it’s important to make sure your account is locked down.

Here’s how to keep your Facebook account secure and safe from any potential scammers or hackers.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

One of the biggest things you can do is use a secure password on your account. Make sure it’s different from your other accounts. However, with data leaks becoming more frequent, it would be wise to change your passwords frequently — we recommend every three months.

Changing your Facebook password from your iPhone is not much different from changing it from your computer. Here’s what you do:

Changing your Facebook password from your Android also has very similar steps. Keep in mind that many Android phones act slightly different from one another, so these instructions may be similar, though not exact, for your phone and version of Android software.

Consider using a password manager to generate and store complex passwords for your Facebook account. It will help you create unique and difficult-to-crack passwords that a hacker could never guess. Second, it also keeps track of all your passwords in one place and fills in passwords for you when you’re logging into an account so that you never have to remember them yourself. The fewer passwords you remember, the less likely you will be to reuse them for your accounts.

MORE: DON’T FALL FOR THAT ‘LOOK WHO DIED’ FACEBOOK MESSAGE TRAP

Also known as 2FA, two-factor authentication has become a standard security setting. Working from home has made this even more common, as companies want to make sure you’re on a secure network before you use their programs. While it might seem annoying to follow a few extra steps to log in to your Facebook account, it’s worth it to protect your account from anyone else getting in.

Two-factor authentication requires you to approve a login on a separate device, so you’ll need to enable this feature on a desktop computer and then make sure you have the Facebook mobile app installed and logged in on your smartphone. Here’s how to turn it on from your computer:

Here’s how to turn it on from your smartphone:

MORE: HOW TO OUTSMART CRIMINAL HACKERS BY LOCKING THEM OUT OF YOUR DIGITAL ACCOUNTS

You can opt in for text messages and email updates if anyone logs into your Facebook account from a device you haven’t marked as a recognized device. You can also have the notification pop up on your Facebook app. Here’s how to set up alerts for logins from unrecognized devices on your computer:

Here’s how to set up alerts for logins from unrecognized devices on your smartphone:

MORE: SCAMMERS ARE USING FAKE NEWS AND MALICIOUS LINKS TO TARGET YOU IN AN EMOTIONAL FACEBOOK PHISHING TRAP

Conduct a Privacy Checkup on your account about once a month to ensure it is still secure. Facebook will guide you through settings so you can ensure your data settings, ad preferences and search settings are all as you’d like them to be.

Do not click on suspicious links on Facebook, even if they appear to come from a friend or a company you know. This includes links as posts or in emails. Here’s what you can do to protect yourself:

Hover over the link: Most browsers show the actual destination URL when you hover your cursor over a link. Check if it matches the text displayed and looks legitimate.

Report suspicious links on Facebook. If you see a suspicious link on Facebook, be sure to report it. This helps keep the platform safe for everyone.

Have good antivirus software: The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.

You may realize a hacker has taken over your account if you can’t log in, or you may notice some red flags while still logged into your account – like posts you didn’t create. If you’ve already been hacked, follow these steps:

If you do not have access to the phone number or email associated with your Facebook account, head to facebook.com/login/identify. You’ll be able to fill out a form to have Facebook review your account while answering a few security questions to prove the account you’re trying to recover is yours. You’ll have to provide proof of ID, like a photo of a driver’s license. We understand there is hesitance to upload your ID, but Facebook says these uploads are encrypted and stored securely.

Another option:

While locking down your Facebook account seems like a lot of work, it’s worth it. The peace of mind you’ll have knowing that hackers will have a hard time breaking into your account is priceless. Recovering your account can be difficult, so it’s better to get ahead of any hackers.

Do you feel like Facebook’s parent company, Meta, is doing enough to protect your Facebook account from hackers? What else do you think should be done to protect your account? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Read More 

[Fox News] How to create or leave group text on your iPhone

Group texts can be a convenient way to stay in touch with multiple people simultaneously. However, sometimes, you may find yourself in a group chat by mistake. Group chats can also be a pain if you constantly receive notifications, interrupting your focus on other tasks.

You can leave a group chat pretty easily if you’re an iPhone user. But before we cover that, let’s review how to create group chats first. Also, if you are an Android user, here’s how to leave a group chat on your device.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

It’s surprisingly easy to create a group text on an iPhone. First, make sure that your device has the latest version of iOS or iPadOS.

To add someone to a group message, they must be using an Apple device. If you want to add someone who is using a non-Apple device, you’ll need to create a new group message. This new group message will use SMS/MMS by default since someone in the group is using a non-Apple device.

Note: Your texts will only appear blue by default if everyone in the group chat is using an iPhone. All texts will appear green if anyone in the group has an Android instead.

Here’s how to add additional people to an already existing group text.

MORE: BEST ACCESSORIES FOR YOUR PHONE

MORE: BEST PORTABLE PHONE CHARGERS OF 2024

If you’re the one who created the group and want to delete it entirely, follow these steps.

MORE: A SECRET TRICK TO TURN YOUR IPHONE INTO A COUNTDOWN TIMER FOR ANY OCCASION

In iOS 17 and later, you can delete and block an entire group MMS (multimedia messaging service) message. It allows you to send multimedia content such as pictures, videos and audio messages in addition to standard text messages. Here’s how to delete and block an MMS group message.

Note: You can only remove someone from a group message if the group consists of four or more people, and everyone is using an Apple device (such as an iPhone or iPad). Also, you can only add someone to a group message that already includes three or more people. You cannot add someone to a message conversation that you’re already having with just one other person.

Group chats can be a mixed bag. On one hand, they’re super convenient for coordinating with friends or colleagues. But on the other hand, they can quickly become overwhelming if you find yourself stuck in a never-ending flurry of messages. Your iPhone has your back, though. Whether you want to kick off a group chat, keep it under control or gracefully exit, there are tools at your disposal. It’s all about finding that sweet spot between staying connected and preserving your sanity.

What future features would you like to see in group chat technology to improve your communication experience? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Read More 

[Fox News] NASA seeks participants for second year-long Mars mission simulation

NASA is searching for the next four-person crew to participate in a one-year program at Johnson Space Center in Houston, simulating life and conditions on the planet Mars.

The mission will be the second of three year-long Mars surface simulations called Crew Health and Performance Exploration Analog, or CHAPEA, and is expected to kick off in the Spring of 2025.

The first four-person crew was locked into the habitat, called the Mars Dune Alpha, in June 2023, and is more than half way through their mission.

The inaugural crew consists of Commander Kelly Haston, a research scientist with experience in stem cell-based projects; flight engineer Ross Brockwell, a structural engineer and public works administrator; medical officer Nathan Jones; and science officer Anca Selariu.

ROBOT CHEMIST COULD CREATE OXYGEN NEEDED FOR COLONIZING MARS: STUDY

The data acquired through the simulations is intended to help NASA prepare for human exploration of Mars.

NASA said in a press release that the Mars Dune Alpha habitat simulates challenges of a mission to Mars, including resource limitations, equipment failures, communication delays and other environmental stressors.

Some of the tasks crew members may participate in are robotic operations, spacewalks, habitat maintenance, exercise and crop growth.

ELON MUSK WAS WARNED THAT AI COULD DESTROY HUMAN COLONY ON MARS: REPORT

NASA is looking for U.S. citizens or permanent residents who are healthy, non-smokers, between 30-55 years old and proficient in English.

The selection follows the standards NASA uses when considering astronaut candidates.

Specifically, a master’s degree in a STEM field like engineering, mathematics, or biological, physical or computer science from an accredited institution, plus two years of professional experience is required. Alternatively, anyone with over 1,000 hours piloting a plane will be considered.

NASA SEALS 4-PERSON CREW IN MARS SIMULATOR FOR NEXT 378 DAYS

NASA said it may consider candidates with two years of work completed toward a doctoral program in STEM, a medical degree, four years of professional experience, military officer training or a Bachelor of Science degree in a STEM field.

The deadline to apply is April 2.

With backgrounds in science and engineering, the crew members will be part of a simulated mission to Mars, where the crew will eat, drink and exercise while in simulation.

The 1,700-square-foot, 3D printed facility is about the size of a three-to-four-bedroom house and will be used for NASA’s longest analog mission to date: 378 days.

The habitat will be a place where the crew will practice personal hygiene and healthcare, like drawing blood, while also allowing them to exercise, grow food and collect geological samples.

The habitat will be packed with all the supplies that will go to Mars. What the habitat will not be able to simulate, though, is the red planet’s gravity.

But that is where virtual reality comes into play. While in the habitat, virtual reality will allow crew members to simulate space walks or Mars walks, as well as other tasks the crew may encounter on Mars, including removing dust from the space suit or solar panels or repairing the habitat.

As crew members live within the confines of the simulator, scientists will be measuring their performance, cognition and health over the year to understand what the crew will go through.

The data collected will then be handed to the vehicle planners.

Read More 

[Fox News] How scammers use AI tools to file perfect-looking tax returns in your name

When you think of “tax fraud,” you probably think of people who find ways not to file their taxes honestly. But with the advancement of artificial intelligence, there’s a new type of tax fraud out there. 

This one involves hackers using a form of identity hijacking to file a tax return in someone else’s name and get the refund sent to them.

The dark web is revealing that tax fraud is on the rise. Here’s what you need to look out for to avoid becoming a victim.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER 

AI-powered fraud is when hackers utilize AI’s abilities to commit sophisticated acts of fraud. One type of AI-powered fraud is known as identity hijacking, which is when hackers not only steal someone’s identity but impersonate them in all sorts of ways. One example is through deepfakes, which can have scary consequences for more than just the person being impersonated.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Another is through AI tax fraud, which is when the hacker uses AI to take your sensitive information and use it to ultimately get your tax return sent to them.

But how exactly do they do this?

MORE: DON’T FALL FOR THESE SNEAKY TAX SCAMS THAT ARE OUT TO STEAL YOUR IDENTITY AND MONEY

This new type of tax fraud was reported by the CEO of LexisNexis Risk Solutions’ Government group, Haywood Talcove, a cybersecurity and data analysis company.

Historically, tax fraud has involved the use of stolen Personally Identifiable Information (PII), which refers to data that can be used to identify you. It includes both sensitive and non-sensitive information.

Sensitive PII: Full name, Social Security number, driver’s license, mailing address, credit card details, passport information, financial records and medical history. Companies often use anonymization techniques to protect sensitive PII when sharing data.

Non-sensitive PII: Zip code, race, gender, date of birth and even information available on social media sites. While non-sensitive PII is less critical, it can still contribute to identifying you.

Thanks to AI, criminals can now more efficiently exploit stolen (PII) Personally Identifiable Information for fraudulent activities.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Hackers may acquire PII through various means, such as phishing scams or malware. This information is then used to create fraudulent IDs, complete with the victim’s details but the fraudster’s photograph.

With a fake ID in hand, fraudsters can bypass the IRS’s facial recognition security measures, allowing them to file tax returns in the victim’s name and redirect refunds to their accounts.

Experts are urging government agencies to implement more robust verification processes, such as cross-referencing IDs with DMV records, to combat this sophisticated form of tax fraud.

MORE: WHY YOU SHOULD NEVER CARRY THESE THINGS IN YOUR WALLET

When the IRS identifies issues with your tax return, it will send you a letter before issuing any refunds. This notification provides an opportunity for you to flag the initial return as fraudulent and proceed with filing normally.

The IRS employs systems to detect suspicious returns. However, if its algorithms fail to identify anomalies and process a fraudulent return, you won’t discover it until you attempt to file your own return and encounter rejection.

In most cases, the second option is more common. Taxpayers typically receive an e-file rejection notice, which indicates a problem. Unfortunately, these notifications lack specific details. Instead, they merely highlight an issue related to the Social Security number. If you haven’t accidentally transposed any digits, it’s likely that tax identity theft caused the rejection.

The primary consequence of a fake tax return is the theft of your tax refund. The scammer essentially impersonates you and diverts your rightful return into his bank account. But the trouble doesn’t stop there. When you try to file your legitimate return, the IRS system will likely reject it due to a duplicate filing. This throws you into a bureaucratic maze to resolve the issue and prove your identity.

Adding to the frustration, tax identity theft is a growing crime, and the IRS processes for resolving these situations are still evolving. This can mean extended delays and uncertainty while you straighten things out.

MORE: HOW IMPOSTERS ARE TRYING TO EXPLOIT YOUR GRIEF AND WALLET IN A NEW FUNERAL SCAM  

Again, since this is a relatively new scam, cybersecurity experts are still learning a lot about what it looks like and, therefore, how to mitigate it. However, now that you are aware it’s out there, here are six things you can do to keep yourself safe.

1. File your taxes as early as possible. If you beat them to it, they can’t commit the fraud.

2. Never share your personal information, especially your Social Security number or other PII information, on messaging apps or during a phone call with someone you don’t know. Many phishing attempts lead people to give this information away before they’ve even realized what has happened.

3. Use strong passwords and reset them often. Create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess.

4. Use an identity theft protection service: Using an identity theft protection service can be a crucial step in safeguarding yourself against tax fraud. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

5. Don’t click on links or files when you don’t know what they are, even if they are from a trusted friend. That friend could have been hacked, and now someone is after you. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.

6. Do your best to make sure your sensitive data is not easy to find online. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for removal services here. 

If you suspect you’ve been a victim of tax fraud, the official IRS website provides step-by-step guidance on how to handle the situation.

It’s no doubt scary to think about all the different ways hackers and scammers can take advantage of you. And because AI is making their work easier, it’s hard to keep up. What will they think of next? That’s why, here at CyberGuy, we do our best to keep you up to date on the latest hacking news, so you can stay one step ahead of the crooks.

In light of the growing threat of AI-powered fraud, what additional security measures do you think the government should implement to safeguard your personal information? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com.  All rights reserved.

Read More 

[Fox News] Forget hands, Toyota’s hug-ready robot picks up with its entire body

In the world of robotics, we’ve often seen robots rely on their mechanical hands to pick up and manipulate objects. 

But that approach doesn’t quite capture the full essence of how humans interact with the world, especially when dealing with hefty items.

Enter Toyota’s groundbreaking creation, the Punyo soft robot. Unlike its traditional counterparts, Punyo takes inspiration from our own human behavior. 

Imagine a robot that doesn’t just use its hands but also incorporates its chest, hips and arms to handle objects — just like we do.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER 

Punyo features a cute and approachable face reminiscent of Disney’s Baymax from Big Hero 6. But there’s more. Punyo appears to be wearing a cozy looking sweater, which serves a practical purpose. It’s highly hug-focused.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

MORE: THE CREEPY-EYED ROBOT THAT WANTS TO BE YOUR FRIEND AND TEACHER  

The sweater-like covering is made from grippy materials that provide a squishy, compliant layer over Punyo’s hard metal skeleton. Embedded within the fabric are tactile sensors that allow Punyo to feel precisely what it’s hugging, whether it’s a person or an object.

MORE: STOP LOADING THE DISHWASHER: THIS ROBOT AIMS TO DO ALL THE CLEAN-UP FOR YOU  

Instead of traditional hands, Punyo has what Toyota calls “paws.” These aren’t your typical paws. They’re more like inflatable hooves. These paws have tiny dots printed on the inside. When the paw touches something, the dots distort, revealing the shape and force of contact. The clever camera captures this deformation, and the information is fed directly to the robot’s brain to help it grasp objects effectively.

MORE: CONSTRUCTION WORKERS BEING REPLACED BY AI ROBOT BRICKLAYERS  

Punyo’s arms are arrays of air-filled bubbles, air tubes and pressure sensors that extend from shoulder to wrist. These bubbles can be individually pressure regulated, allowing for optimal stiffness based on the task at hand.

Through teleoperation, Toyota Research Group roboticists have been training Punyo to handle various large objects. Some techniques include:

TOYOTA IS USING AI TO DESIGN BETTER CARS FASTER

The lean and lift: Punyo leans forward, hugs items to its ches and then leans back to lift them.

Heap it up: Punyo even has the ability to heap objects, making it versatile for different scenarios.

Creative carrying: Imagine slinging a water jug up onto Punyo’s shoulder, where it remains steady from above.

Punyo’s innovative design and emphasis on cuddling break new ground in soft robotics. Its gentle and precise grasp on large, awkward objects suggests exciting possibilities for robotic helpers in homes and other environments in the future.

Would you feel comfortable having a robot like Punyo in your home or at your workplace? Why or why not? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com.  All rights reserved.

Read More