Latest news with #KURT'S
Yahoo
21-04-2025
- Health
- Yahoo
AI system restores speech for paralyzed patients using own voice
Researchers in California have achieved a significant breakthrough with an AI-powered system that restores natural speech to paralyzed individuals in real time, using their own voices, specifically demonstrated in a clinical trial participant who is severely paralyzed and cannot speak. This innovative technology, developed by teams at UC Berkeley and UC San Francisco, combines brain-computer interfaces (BCI) with advanced artificial intelligence to decode neural activity into audible speech. Compared to other recent attempts to create speech from brain signals, this new system is a major advancement. STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT'S 'THE CYBERGUY REPORT' NOW The system uses devices such as high-density electrode arrays that record neural activity directly from the brain's surface. It also works with microelectrodes that penetrate the brain's surface and non-invasive surface electromyography sensors placed on the face to measure muscle activity. These devices tap into the brain to measure neural activity, which the AI then learns to transform into the sounds of the patient's voice. The neuroprosthesis samples neural data from the brain's motor cortex, the area controlling speech production, and AI decodes that data into speech. According to study co-lead author Cheol Jun Cho, the neuroprosthesis intercepts signals where the thought is translated into articulation and, in the middle of that, motor control. Read On The Fox News App Ai Enables Paralyzed Man To Control Robotic Arm With Brain Signals Real-time speech synthesis: The AI-based model streams intelligible speech from the brain in near-real time, addressing the challenge of latency in speech neuroprostheses. This "streaming approach brings the same rapid speech decoding capacity of devices like Alexa and Siri to neuroprostheses," according to Gopala Anumanchipalli, co-principal investigator of the study. The model decodes neural data in 80-ms increments, enabling uninterrupted use of the decoder, further increasing speed. Naturalistic speech: The technology aims to restore naturalistic speech, allowing for more fluent and expressive communication. Personalized voice: The AI is trained using the patient's own voice before their injury, generating audio that sounds like them. In cases where patients have no residual vocalization, the researchers utilize a pre-trained text-to-speech model and the patient's pre-injury voice to fill in the missing details. Speed and accuracy: The system can begin decoding brain signals and outputting speech within a second of the patient attempting to speak, a significant improvement from the eight-second delay in a previous study from 2023. What Is Artificial Intelligence (Ai)? Exoskeleton Helps Paralyzed People Regain Independence One of the key challenges was mapping neural data to speech output when the patient had no residual vocalization. The researchers overcame this by using a pre-trained text-to-speech model and the patient's pre-injury voice to fill in the missing details. How Elon Musk's Neuralink Brain Chip Works This technology has the potential to significantly improve the quality of life for people with paralysis and conditions like ALS. It allows them to communicate their needs, express complex thoughts and connect with loved ones more naturally. "It is exciting that the latest AI advances are greatly accelerating BCIs for practical real-world use in the near future," UCSF neurosurgeon Edward Chang said. The next steps include speeding up the AI's processing, making the output voice more expressive and exploring ways to incorporate tone, pitch and loudness variations into the synthesized speech. Researchers also aim to decode paralinguistic features from brain activity to reflect changes in tone, pitch and loudness. Subscribe To Kurt's Youtube Channel For Quick Video Tips On How To Work All Of Your Tech Devices What's truly amazing about this AI is that it doesn't just translate brain signals into any kind of speech. It's aiming for natural speech, using the patient's own voice. It's like giving them their voice back, which is a game changer. It gives new hope for effective communication and renewed connections for many individuals. What role do you think government and regulatory bodies should play in overseeing the development and use of brain-computer interfaces? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels: Facebook YouTube Instagram Answers to the most-asked CyberGuy questions: What is the best way to protect your Mac, Windows, iPhone and Android devices from getting hacked? What is the best way to stay private, secure and anonymous while browsing the web? How can I get rid of robocalls with apps and data removal services? How do I remove my private data from the internet? New from Kurt: Try CyberGuy's new games (crosswords, word searches, trivia and more!) CyberGuy's exclusive coupons and deals Copyright 2025 All rights article source: AI system restores speech for paralyzed patients using own voice
Yahoo
09-04-2025
- Business
- Yahoo
US bank regulator tells Congress it suffered 'major' hack that exposed sensitive information
The Office of the Comptroller of the Currency, which regulates and supervises national banks, on Tuesday said it notified Congress of a February hack that it called a "major information security incident." The breach was first disclosed in February when it learned of "unusual interactions between a system administrative account in its office automation environment and OCC user mailboxes," an OCC news release states. According to Bloomberg, the hackers had access to more than 150,000 emails after breaching the system in June 2023. "The confidentiality and integrity of the OCC's information security systems are paramount to fulfilling its mission," said Acting Comptroller of the Currency Rodney Hood. Malware Exposes 3.9 Billion Passwords In Huge Cybersecurity Threat The OCC first learned of the incident on Feb. 11. Compromised administrative accounts were shut off the next day. Read On The Fox News App "The OCC discovered that the unauthorized access to a number of its executives' and employees' emails included highly sensitive information relating to the financial condition of federally regulated financial institutions used in its examinations and supervisory oversight processes," the agency said. The OCC said it has reached out to third-party cybersecurity experts to conduct a review of IT security protocols to prevent future attacks. STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT'S 'THE CYBERGUY REPORT' NOW "I have taken immediate steps to determine the full extent of the breach and to remedy the long-held organizational and structural deficiencies that contributed to this incident," Hood said. "There will be full accountability for the vulnerabilities identified and any missed internal findings that led to the unauthorized access." Throughout its review, the OCC has coordinated with the Treasury Department to share information about its article source: US bank regulator tells Congress it suffered 'major' hack that exposed sensitive information
Yahoo
18-03-2025
- Yahoo
Warning signs your mail has been fraudulently redirected
Change-of-address scams involve some of the most seemingly harmless personal information getting into the wrong hands. This can lead to a whole host of problems, including financial losses and identity theft, although change-of-address fraud is technically a form of identity theft. This kind of fraud involves a scammer impersonating you to request a change of address with the United States Postal Service (USPS). Once they have your mail redirected to an address they control, they can go through it at their leisure, looking for mail they can steal and information they can use to perpetrate further scams, like taking out loans or credit cards in your name or using your identity to defraud others. STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT'S THE CYBERGUY REPORT NOW This detailed breakdown explains the process of a change-of-address scam, from initial targeting to the potential consequences and warning signs to watch for. A person with criminal intent gets your postal address and full name, something that's most easily done using a so-called people search site. People search sites, also known as people finder sites, are a kind of data broker that specializes in collecting, organizing and selling access to personal information. Read On The Fox News App The scammer then mails a change-of-address request to the USPS, providing your name and a new address he has access to. The online change-of-address form is generally more secure, requiring confirmation via a bank account. That's why scammers will almost always mail in the request. The form requires a signature, but this is unlikely to be verified when processing the request. So, the scammer will either find an image of your signature somewhere, steal a document that includes your signature or simply sign your name any which way. Now that they've redirected your mail straight into their hands, the scammer just has to patiently wait for sensitive mail to arrive. They're on the lookout for anything they can use to steal from you or defraud you. Bank statements, tax documents, checks and even your household bills can be used to commit further acts of fraud and identity theft. One of the scariest things a scammer can do once he has enough of your personal information is to commit deed fraud, otherwise known as home title theft. You're far from helpless, though. There are telltale signs that you can watch for to catch change-of-address scams early. The most obvious sign to watch for is a sudden and persistent drop in the amount of mail entering your mailbox. This only applies to mail addressed to you by name. Mail delivered to your address without an addressee, including mail addressed to "homeowner" or "occupant," won't be affected by a change-of-address scam. The other major things to keep an eye on are your credit report, credit card statements and bank statements. You can request a free credit report from one of the three credit bureaus once per year. How Data Brokers Are Fueling Elder Fraud In America If you have good reason to believe that someone has redirected your mail without permission, don't hesitate to take action. The sooner you catch this, the better. Here's what you can do: Start by keeping detailed records: Document everything that's led you to believe your mail has been redirected. This includes the mail you were expecting, any communication with the senders of the missed mail (such as confirming dispatch dates), suspicious phone calls, texts or emails, and any unusual activity in your online accounts, bank accounts or credit reports. Reach out to the USPS for help: Use the online locator to find and contact your local U.S. Postal Inspection Service (USPIS) office. They can assist with investigating fraudulent mail redirection. Take action if identity theft is suspected: If you believe you've become a victim of identity fraud, visit the Federal Trade Commission's identity theft portal. This resource will help you develop a recovery plan and guide you through the steps to protect yourself. Taking these steps will put you on the road to regaining control and getting through what can quickly become a stressful situation. What Is Artificial Intelligence (Ai)? Don't Let This Credit Card Fraud Nightmare Happen To You Prevention is better than a cure, and, luckily, there's a lot you can do to stop change-of-address scams before they start. 1. Invest in personal data removal services: Have your personal information removed from data broker databases, including people search sites. They're the first port of call for many scammers. Without these companies in the mix, scammers aren't likely to come across your address in the first place. A reputable personal information removal service can take your data down from hundreds of sites and keep it off by resending removal requests, even as data brokers try to add your information to their databases. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 2. Reduce the amount of sensitive mail in your mailbox: Start by switching to paperless options wherever available. This will dramatically reduce the amount of sensitive mail heading to your mailbox, leaving criminals with little value to steal. Check your mail daily, as soon as possible after it's delivered. Get someone to do this for you if you're away. Some redirection scams start with mail being stolen from your mailbox. Definitely avoid allowing your mailbox to overflow. 3. Secure your mailbox: Consider upgrading to a locked mailbox to prevent mail theft. If you live in an area prone to mail theft, this simple step can stop criminals from intercepting sensitive documents before they even reach you. 4. Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft. 5. Set up USPS Informed Delivery: Enroll in USPS Informed Delivery, a free service that lets you preview images of incoming mail before it arrives. This can help you spot missing mail early and identify potential issues with mail redirection. 6. Report suspicious activity immediately: If you notice anything unusual, such as missing mail or unauthorized changes to your accounts, report it right away. Contact the USPS, your bank and the Federal Trade Commission to ensure the issue is documented and addressed promptly. Beware Of Fraudsters Posing As Government Officials Trying To Steal Your Cash Change-of-address scams might sound like an unlikely threat, but they can wreak havoc on your finances and peace of mind if left unchecked. By staying alert, securing your personal information and taking proactive measures like monitoring your mail and credit, you can greatly reduce the risk of falling victim to these scams. Remember, catching fraud early is key. So, don't hesitate to act if something feels off. What do you think should be done to prevent change-of-address scams? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channels Facebook YouTube Instagram Answers to the most asked CyberGuy questions: What is the best way to protect your Mac, Windows, iPhone and Android devices from getting hacked? What is the best way to stay private, secure and anonymous while browsing the web? How can I get rid of robocalls with apps and data removal services? How do I remove my private data from the internet? New from Kurt: Try CyberGuy's new games (crosswords, word searches, trivia and more!) CyberGuy's Exclusive Coupons and Deals Copyright 2025 All rights article source: Warning signs your mail has been fraudulently redirected
Yahoo
16-03-2025
- Yahoo
Apple releases emergency security update for serious vulnerability
If you own an iPhone or iPad, it's time to stop what you're doing and update your device. A newly discovered security flaw, CVE-2025-24201, could leave your personal information vulnerable to hackers. The good news? Apple has released iOS 18.3.2 and iPadOS 18.3.2 to fix the issue. Let me explain what all this means for you and how you can stay protected. STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT'S THE CYBERGUY REPORT NOW This vulnerability resides in WebKit, the open-source browser engine that powers Safari, Mail, App Store and other apps on Apple devices. The flaw is an out-of-bounds write issue, which allows attackers to use maliciously crafted web content to bypass the Web Content sandbox, a key security layer that isolates web content from accessing sensitive system resources. Apple has acknowledged that this vulnerability may have been exploited in highly advanced attacks targeting specific individuals using older versions of iOS before 17.2. These attacks are believed to involve well-funded threat actors, such as state-sponsored hackers or advanced cybercriminal groups. Zero-day vulnerabilities like CVE-2025-24201 are particularly dangerous because they are exploited before developers can patch them. In this case, the attacks were highly targeted, meaning most users are unlikely to have been affected directly. However, these incidents underscore the importance of regularly updating your devices to stay protected against evolving threats. Read On The Fox News App HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE The vulnerability impacts a wide range of Apple devices, including: iPhone XS and later iPad Pro 13-inch, iPad Pro 12.9-inch 3rd generation and late-r, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 7th generation and later and iPad mini 5th generation and later. If you own any of these devices, it's crucial to update your software immediately. Apple released emergency patches on March 11, 2025, as part of iOS 18.3.2 and iPadOS 18.3.2 updates. These updates introduce improved checks to prevent unauthorized actions caused by the vulnerability. This patch is a supplementary fix for an earlier attack mitigated in iOS 17.2. What Is Artificial Intelligence (Ai)? Your Iphone Has A Hidden Folder Eating Up Storage Space Without You Even Knowing Go to Settings Tap General Click Software Update Download and install the latest update Your iPhone will restart once the update is complete Go to the Settings app on your iPad Tap General Then click Software Update Tap Download and Install to begin the update process Enter your passcode if prompted and agree to the terms and conditions The update will download and install Your iPad will restart once the update is complete 1. Enable two-factor authentication: Turn on two-factor authentication for your Apple ID to add an extra layer of security to your account. 2. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 3. Use a strong passcode: Set up a strong alphanumeric passcode instead of a simple four-digit PIN. Avoid using easily guessable information like birth dates. 4. Enable face ID or touch ID: Utilize biometric authentication to prevent unauthorized access to your device. 5. Manage app permissions: Regularly review and adjust app permissions to ensure they only access necessary data. 6. Secure lock screen notifications: Disable or limit sensitive information displayed in lock screen notifications. 7. Use Apple's App Privacy Report: Apple's App Privacy Report is a powerful tool that allows iPhone users to monitor how apps access their data and interact with third-party services. This feature provides valuable insights into app behavior, helping you make informed decisions about your privacy. 8. Download apps from official sources: Only install apps from the Apple App Store to avoid potential malware. 9. Keep your Apple ID secure: Never share your Apple ID or password with others, even family members. 10. Enable Find My iPhone: Ensure Find My iPhone is activated to help locate your device if it's lost or stolen. 11. Invest in a password manager: To go beyond iCloud's keychain for increased security, you'll want to invest in a password manager. These are created specifically for the protection of passwords and include features for important documents and photos. This is also beneficial when sharing private data with family members. Get more details about my best expert-reviewed password managers of 2025 here. While it might be tempting to put off updates, you don't want to delay this one. CVE-2025-24201 is a serious threat that's already been used in the wild. Sure, you might not be a high-profile target, but why take chances with your personal data? Updating your device is like giving it a digital suit of armor, and it only takes a few minutes. So, hit that update button and give yourself some peace of mind. Do you think Apple is doing enough to stay ahead of evolving cyber threats, or are there additional steps the company should take to protect its users? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels: Facebook YouTube Instagram Answers to the most-asked CyberGuy questions: What is the best way to protect your Mac, Windows, iPhone and Android devices from getting hacked? What is the best way to stay private, secure and anonymous while browsing the web? How can I get rid of robocalls with apps and data removal services? How do I remove my private data from the internet? New from Kurt: Try CyberGuy's new games (crosswords, word searches, trivia and more!) CyberGuy's exclusive coupons and deals Alert: Malware Steals Bank Cards And Passwords From Millions Of Devices Copyright 2025 All rights article source: Apple releases emergency security update for serious vulnerability