Latest news with #REPORT
Yahoo
21-04-2025
- Health
- Yahoo
AI system restores speech for paralyzed patients using own voice
Researchers in California have achieved a significant breakthrough with an AI-powered system that restores natural speech to paralyzed individuals in real time, using their own voices, specifically demonstrated in a clinical trial participant who is severely paralyzed and cannot speak. This innovative technology, developed by teams at UC Berkeley and UC San Francisco, combines brain-computer interfaces (BCI) with advanced artificial intelligence to decode neural activity into audible speech. Compared to other recent attempts to create speech from brain signals, this new system is a major advancement. STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT'S 'THE CYBERGUY REPORT' NOW The system uses devices such as high-density electrode arrays that record neural activity directly from the brain's surface. It also works with microelectrodes that penetrate the brain's surface and non-invasive surface electromyography sensors placed on the face to measure muscle activity. These devices tap into the brain to measure neural activity, which the AI then learns to transform into the sounds of the patient's voice. The neuroprosthesis samples neural data from the brain's motor cortex, the area controlling speech production, and AI decodes that data into speech. According to study co-lead author Cheol Jun Cho, the neuroprosthesis intercepts signals where the thought is translated into articulation and, in the middle of that, motor control. Read On The Fox News App Ai Enables Paralyzed Man To Control Robotic Arm With Brain Signals Real-time speech synthesis: The AI-based model streams intelligible speech from the brain in near-real time, addressing the challenge of latency in speech neuroprostheses. This "streaming approach brings the same rapid speech decoding capacity of devices like Alexa and Siri to neuroprostheses," according to Gopala Anumanchipalli, co-principal investigator of the study. The model decodes neural data in 80-ms increments, enabling uninterrupted use of the decoder, further increasing speed. Naturalistic speech: The technology aims to restore naturalistic speech, allowing for more fluent and expressive communication. Personalized voice: The AI is trained using the patient's own voice before their injury, generating audio that sounds like them. In cases where patients have no residual vocalization, the researchers utilize a pre-trained text-to-speech model and the patient's pre-injury voice to fill in the missing details. Speed and accuracy: The system can begin decoding brain signals and outputting speech within a second of the patient attempting to speak, a significant improvement from the eight-second delay in a previous study from 2023. What Is Artificial Intelligence (Ai)? Exoskeleton Helps Paralyzed People Regain Independence One of the key challenges was mapping neural data to speech output when the patient had no residual vocalization. The researchers overcame this by using a pre-trained text-to-speech model and the patient's pre-injury voice to fill in the missing details. How Elon Musk's Neuralink Brain Chip Works This technology has the potential to significantly improve the quality of life for people with paralysis and conditions like ALS. It allows them to communicate their needs, express complex thoughts and connect with loved ones more naturally. "It is exciting that the latest AI advances are greatly accelerating BCIs for practical real-world use in the near future," UCSF neurosurgeon Edward Chang said. The next steps include speeding up the AI's processing, making the output voice more expressive and exploring ways to incorporate tone, pitch and loudness variations into the synthesized speech. Researchers also aim to decode paralinguistic features from brain activity to reflect changes in tone, pitch and loudness. Subscribe To Kurt's Youtube Channel For Quick Video Tips On How To Work All Of Your Tech Devices What's truly amazing about this AI is that it doesn't just translate brain signals into any kind of speech. It's aiming for natural speech, using the patient's own voice. It's like giving them their voice back, which is a game changer. It gives new hope for effective communication and renewed connections for many individuals. What role do you think government and regulatory bodies should play in overseeing the development and use of brain-computer interfaces? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels: Facebook YouTube Instagram Answers to the most-asked CyberGuy questions: What is the best way to protect your Mac, Windows, iPhone and Android devices from getting hacked? What is the best way to stay private, secure and anonymous while browsing the web? How can I get rid of robocalls with apps and data removal services? How do I remove my private data from the internet? New from Kurt: Try CyberGuy's new games (crosswords, word searches, trivia and more!) CyberGuy's exclusive coupons and deals Copyright 2025 All rights article source: AI system restores speech for paralyzed patients using own voice
Yahoo
09-04-2025
- Business
- Yahoo
US bank regulator tells Congress it suffered 'major' hack that exposed sensitive information
The Office of the Comptroller of the Currency, which regulates and supervises national banks, on Tuesday said it notified Congress of a February hack that it called a "major information security incident." The breach was first disclosed in February when it learned of "unusual interactions between a system administrative account in its office automation environment and OCC user mailboxes," an OCC news release states. According to Bloomberg, the hackers had access to more than 150,000 emails after breaching the system in June 2023. "The confidentiality and integrity of the OCC's information security systems are paramount to fulfilling its mission," said Acting Comptroller of the Currency Rodney Hood. Malware Exposes 3.9 Billion Passwords In Huge Cybersecurity Threat The OCC first learned of the incident on Feb. 11. Compromised administrative accounts were shut off the next day. Read On The Fox News App "The OCC discovered that the unauthorized access to a number of its executives' and employees' emails included highly sensitive information relating to the financial condition of federally regulated financial institutions used in its examinations and supervisory oversight processes," the agency said. The OCC said it has reached out to third-party cybersecurity experts to conduct a review of IT security protocols to prevent future attacks. STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT'S 'THE CYBERGUY REPORT' NOW "I have taken immediate steps to determine the full extent of the breach and to remedy the long-held organizational and structural deficiencies that contributed to this incident," Hood said. "There will be full accountability for the vulnerabilities identified and any missed internal findings that led to the unauthorized access." Throughout its review, the OCC has coordinated with the Treasury Department to share information about its article source: US bank regulator tells Congress it suffered 'major' hack that exposed sensitive information
Yahoo
07-04-2025
- Yahoo
How to free up space on your Android
Is your Android running out of storage space again? Let's fix it with three simple tricks that can free up valuable space on your device. IPhone users, here's how to free up space on your device. Hidden files and folders often consume significant storage space. Here's how to clean them up: STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT'S THE CYBERGUY REPORT NOW Settings may vary depending on your Android phone's manufacturer. Read On The Fox News App Open your File Manager (it might be called "My Files"). Tap the three dots in the top-right. Select Settings. Enable "Show Hidden System Files". Now, let's go to the ".thumbnails" folder by tapping on the folder that says "My Files". Next, select "Internal Storage". Tap the Pictures folder. Then, click .thumbnails. Select "All" images. Then tap Delete. Confirm by clicking Move to Trash. By deleting the thumbnail folder, you'll free up valuable storage space on your Android by removing the small preview images of photos and videos stored on your device. Note, the file or folder will come back automatically as you browse photos again, so if you're constantly low on storage, clearing the .thumbnails folder every so often can help — but it's just a temporary fix. The system will rebuild it as needed. Now, go back twice by clicking the back arrow. Open "Movies" or "Downloads", and repeat the above steps to clear more space. Finally, find the Trash and click on it. Select "All". Tap Delete all. Confirm your decision by clicking Delete. Space Running Low? Securely Store Your Heavy Files With These Free Cloud Storage Solutions Google Photos offers a seamless way to manage photo storage without losing your memories. Here's how to free up space using Google Photos: Settings may vary depending on your Android phone's manufacturer. Open the Google Photos app. Tap your profile picture in the top-right corner. Choose Free up space on this device. Review the files and tap the blue bar at the bottom of the screen. Click Allow to clear local copies of photos already backed up. Your photos stay safe, but won't take up your phone's storage. Now, before deleting files in your downloads, movies, or .thumbnails folders, take a moment to review them. These may contain files you've saved intentionally, including important documents or personal media. While cleaning up unused files can free up space, be sure not to remove anything you still need. What To Do When Your Phone Storage Is Full Uninstalling unused apps can significantly free up storage space on your Android device. Here's how to uninstall unused apps: Settings may vary depending on your Android phone's manufacturer. Open Settings on your Android. Click on Apps or Apps and Notifications. Click the Filter and sort icon. Tap Uninstalled by you, then tap OK. What Is Artificial Intelligence (Ai)? Review your installed apps and identify those you no longer use. Uninstall these apps to free up space by clicking on the app. Click App details in store. Then, tap Uninstall. It'll ask you to confirm your decision by clicking Uninstall. Best Antivirus For Androids — Cyberguy Picks 2025 You can also delete unused files and images on Android. These are files or images you haven't edited in the past 30 days. Settings may vary depending on your Android phone's manufacturer. Navigate to Settings on your Android. Tap Device Care. Click Storage. Click Review old files. Tap All in the upper left-hand corner of the screen to free up space. Click Delete at the bottom of the screen. Confirm your decision by clicking Delete. By incorporating these steps, you can efficiently manage your Android device's storage and maintain optimal performance. Subscribe To Kurt's Youtube Channel For Quick Video Tips On How To Work All Of Your Tech Devices Running out of storage on your Android can be frustrating, but these tricks provide quick solutions to reclaim space without compromising essential data. By implementing simple strategies like deleting hidden clutter, leveraging Google Photos to free up space, and uninstalling unused apps, you can significantly improve your device's performance. Additionally, regularly reviewing and deleting old files can help maintain a clutter-free phone. What's the most surprising thing you've found taking up space on your device? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels: Facebook YouTube Instagram Answers to the most-asked CyberGuy questions: What is the best way to protect your Mac, Windows, iPhone and Android devices from getting hacked? What is the best way to stay private, secure and anonymous while browsing the web? How can I get rid of robocalls with apps and data removal services? How do I remove my private data from the internet? New from Kurt: Try CyberGuy's new games (crosswords, word searches, trivia and more!) CyberGuy's Exclusive Coupons and Deals Copyright 2025 All rights article source: How to free up space on your Android
Yahoo
26-03-2025
- Yahoo
U.S. Border Patrol seizes 115 pounds of meth at California checkpoint
INDIO, Calif. (FOX 5/KUSI) — A U.S. citizen was arrested for allegedly smuggling methamphetamine into the country from Mexico, according to a news release from U.S. Customs and Border Protection on Tuesday. The agency said that Border Patrol agents with the El Centro Sector stopped a sedan around 11:50 a.m. Monday at the Highway 86 immigration checkpoint. During the inspection, a Border Patrol K-9 team alerted agents to the vehicle and referred it for secondary inspection. The K-9 alerted agents to the floorboards of the vehicle, where an aftermarket compartment was located, the news release said. Read BORDER REPORT stories about life along the U.S.-Mexico border Several wrapped packages were discovered inside, with one testing positive for methamphetamine. The packages contained nearly 115 pounds of the drug with an estimated street value of $96,942, according to authorities. 'This hefty seizure represents something significant happening here in the Premier Sector and across the Border Patrol, namely that cartel terrorists have an ever more difficult time smuggling drugs,' said El Centro Sector Chief Gregory K. Bovino in the release. 'Our checkpoints are open for business and Border Patrol agents know more, much more, than cartel terrorists know.' The driver was arrested for the transportation of a controlled substance and turned over to the Drug Enforcement Administration along with the vehicle and narcotics. Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
Yahoo
18-02-2025
- Yahoo
Mac users beware: AI-powered malware threats are on the rise
Apple devices are believed to be pretty secure, and that's what the company will tell you. You might have seen the tagline "Privacy. That's Apple." in their promotions. However, the tech landscape is changing, and even Apple products aren't beyond cybercriminals' reach. A new report suggests Mac users will need to be more vigilant this year because AI advancements are helping hackers breach even the most secure systems. I have consistently reported on how Mac malware is targeting users, and experts now believe this will only get worse. STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT'S THE CYBERGUY REPORT NOW Mac malware is not what it used to be. For years, the biggest threats were annoying adware and browser hijackers, more of a nuisance than a real danger. But that is changing fast. As highlighted by Malwarebytes, a new wave of information stealers is taking over, and they are far more dangerous, going after passwords, authentication cookies, credit card details and even cryptocurrency. This shift started in mid-2023 with the arrival of Atomic Stealer, also known as AMOS, a piece of malware that looked much more like something you would see on Windows than the typical Mac threats. AMOS was not just effective. It was easy to use and sold as a service for $1,000 a month with a slick web-based control panel. That success led to the rise of even more dangerous variants. Read On The Fox News App What Is Artificial Intelligence (Ai)? One of them, Poseidon, launched in mid-2024 and quickly became the dominant Mac stealer, responsible for 70% of infections. It can drain over 160 different cryptocurrency wallets, steal passwords from browsers and password managers and even grab VPN credentials. At the same time, cybercriminals have doubled down on malvertising, using fake ads on Google and Bing to trick users into downloading malware instead of real software. These campaigns are highly targeted, allowing attackers to pinpoint Mac users and serve fake downloads based on their searches. With AI now being used to create and execute many of these attacks, they are likely to increase in scale. 4.3 Million Americans Exposed In Massive Health Savings Account Data Breach While Mac malware is evolving, the situation on Android is even more alarming. Phishing attacks on the platform have reached staggering levels, with thousands of malicious apps designed to steal credentials and bypass security measures. So far in 2024, researchers have detected 22,800 phishing-capable apps, alongside 3,900 apps designed to read OTPs from notification bars and 5,200 apps capable of extracting OTPs from SMS messages. These numbers highlight how widespread and effective Android phishing malware has become. Just like phishing emails, phishing apps trick users into handing over their usernames, passwords and two-factor authentication codes. Once stolen, these credentials can be sold or used for fraud, identity theft or further cyberattacks. Because phishing apps require minimal code and fewer permissions than traditional malware, they are much easier to sneak onto app stores, including Google Play. Many phishing apps look like regular, fully functional software. Some impersonate games or utilities, while others appear as cracked versions of popular apps like TikTok, WhatsApp or Spotify. Some stay dormant for days to avoid detection before launching their attacks. Others rely on ad functionality to redirect users to phishing sites, making the malicious code harder to trace. Google Play Protect, which is built-in malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices. Massive Security Flaw Puts Most Popular Browsers At Risk On Mac Follow these essential tips to safeguard your devices from the latest malware threats, including the notorious info stealer malware. 1. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 2. Be cautious with downloads and links: Only download software from reputable sources such as the Mac App Store, Google Play Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages. 3. Keep your software updated: Ensure that both macOS, Android and all installed applications are up to date. Apple and Android frequently release security patches and updates that address vulnerabilities. Enable automatic updates for macOS, Android and your apps to stay protected without having to manually check for updates. If you need more help, see my guide on keeping all your devices updated. 4. Use strong and unique passwords: To protect your Mac from malware, it's also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. A password manager can be incredibly helpful here. It generates and stores complex passwords for you, making them difficult for hackers to crack. It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don't have to remember them yourself. By reducing the number of passwords you need to recall, you're less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed Password Managers of 2025 here. 5. Use two-factor authentication (2FA): Enable 2Fa for your important accounts, including your Apple ID, Google account, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password. How To Remove Your Private Data From The Internet The days when Mac users could assume they were safe are long gone. Cybercriminals are evolving their tactics, with Mac malware shifting from simple adware to advanced information stealers. Android phishing apps are also becoming harder to detect and more widespread than ever. From stealing passwords and authentication cookies to intercepting OTPs and draining cryptocurrency wallets, these threats are growing in both sophistication and scale. No platform is immune, and as cybercriminals continue refining their techniques, users and organizations must stay ahead with strong security measures. Do you trust official app stores like the App Store and Google Play, or do you think they need to do more to prevent malware? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Ask Kurt a question or let us know what stories you'd like us to cover Follow Kurt on his social channels Facebook YouTube Instagram Answers to the most asked CyberGuy questions: What is the best way to protect your Mac, Windows, iPhone and Android devices from getting hacked? What is the best way to stay private, secure and anonymous while browsing the web? How can I get rid of robocalls with apps and data removal services? How do I remove my private data from the internet? New from Kurt: Try CyberGuy's new games (crosswords, word searches, trivia and more!) Copyright 2025 All rights article source: Mac users beware: AI-powered malware threats are on the rise