Latest news with #TheCyberGuyReport
Yahoo
08-04-2025
- Yahoo
Android feature prevents sensitive content in Google Messages
Have you ever stumbled upon a mysterious app in your Android system settings called "SafetyCore"? If so, you're not alone. Introduced in late 2024, this system service aims to enhance on-device privacy by detecting sensitive content like nudity and enabling features such as Sensitive Content Warnings in Google Messages. While Google assures users that SafetyCore operates locally without sharing data externally, it has still sparked confusion over automatic updates. Let's dive into what SafetyCore does, how it works and the steps you can take to disable it if you choose to do so. Stay protected & informed! Get security alerts & expert tech tips – sign up for Kurt's 'The CyberGuy Report' now. By definition, SafetyCore is a system service that provides on-device machine-learning infrastructure to help detect sensitive content. It was introduced as part of Google's Nov. 7, 2024, system update for Android 9 and later. Google initially described SafetyCore as a tool that supports privacy-preserving user protections for apps. One of its first visible uses was in Google Messages, where it enables Sensitive Content Warnings, a feature that blurs images potentially containing nudity and prompts users with additional options before they can view or send them. By default, Google System services automatically update your device with security, bug fixes and new features. Some updates are delivered via system services in separate Android packages. This maintains privacy, security and data isolation following the principle of least privilege because permissions are not shared with other functionality. Read On The Fox News App SafetyCore does more than detect nude images. Its built-in machine-learning functionality can also target, detect and filter images for sensitive content. There is no app icon, and it doesn't appear in the usual list of running applications. Users must navigate through Settings > Apps > Show system processes to find it. Best Antivirus For Androids - Cyberguy Picks 2025 Google maintains that SafetyCore is purely an on-device classification service and does not report or share scanned content with Google or other entities. The company argues that the service enhances security without compromising privacy, allowing apps to detect and filter unwanted content locally. We reached out to Google, and a spokesperson told Cyberguy, "Android provides many on-device protections that safeguard users against threats like malware, messaging spam and abuse protections, and phone scam protections, while preserving user privacy and keeping users in control of their data. "SafetyCore is a new Google system service for Android 9+ devices that provides the on-device infrastructure for securely and privately performing classification to help users detect unwanted content. Users are in control over SafetyCore, and SafetyCore only classifies specific content when an app requests it through an optionally enabled feature." Google also says that as part of its continuous investment in the transparency of its products, the company is going above and beyond, adding binary transparency to SafetyCore. This allows users and developers to verify that SafetyCore is truly privacy-preserving, just like Google says it is. Looking For More Ways To Lock Down Your Android? Here's How To Do It Settings may vary depending on your Android phone's manufacturer. (Note: We tested these steps on a Samsung Galaxy S24 Ultra.) If you wish to uninstall or disable SafetyCore on your Samsung Galaxy, follow the steps below: (Note: If you decide to disable or get rid of System SafetyCore, you may not be able to benefit from the new security and privacy features or enhancements that Google offers now or in the future.) Open the Settings app on your device Tap Apps Scroll through the list or use the search bar to find Android System SafetyCore Tap on Android System SafetyCore and check if the Uninstall option is available. If Uninstall is available, tap it to remove the service. If Uninstall is grayed out, you may only be able to Disable it If you wish to uninstall or disable SafetyCore on your Pixel device, follow the steps below: Settings may vary depending on your Android phone's manufacturer. (Note: We tested these steps on a Pixel 9 Pro.) Open the Settings app on your device Tap Apps Select See all apps Scroll through the list or use the search bar to find Android System SafetyCore. Tap on Android System SafetyCore Check if the Uninstall option is available. If Uninstall is available, tap it to remove the service. If Uninstall is grayed out, you may only be able to disable it How To Cancel Subscriptions On An Android To Save Money If you're concerned about Google's data collection and want to keep your personal information safe, here are four steps you can take. 1) Limit app permissions: Regularly review and restrict app permissions, especially for access to your camera, microphone, storage or location. If an app doesn't need access, revoke it in your device settings. 2) Disable background data and tracking: Prevent unnecessary tracking by turning off background data for apps that don't require constant internet access. You can also disable location tracking and opt out of Google's personalized ads in your account settings. 3) Use a VPN for secure browsing: A VPN (virtual private network) encrypts your internet traffic, preventing your ISP, Google or other entities from tracking your online activity. Privacy-focused VPNs are great options that do not log user data. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices. 4) Regularly clear personal data: Delete unnecessary stored data such as search history, location history and cached files. You can do this in your Google Account settings and within individual apps to minimize your digital footprint. SafetyCore is an interesting addition to Android, offering on-device content filtering with machine learning. While it aims to enhance privacy and security, some users might have questions about its presence and functionality. Whether you decide to keep it or explore disabling it, staying informed about your device's features is always a good idea. This way, you can make choices that best fit your needs and preferences for managing your Android device. Do you trust Google's claim that SafetyCore operates entirely on-device and does not share your data? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels: Facebook YouTube Instagram Answers to the most-asked CyberGuy questions: What is the best way to protect your Mac, Windows, iPhone and Android devices from getting hacked? What is the best way to stay private, secure and anonymous while browsing the web? How can I get rid of robocalls with apps and data removal services? How do I remove my private data from the internet? New from Kurt: Try CyberGuy's new games (crosswords, word searches, trivia and more!) CyberGuy's exclusive coupons and deals Copyright 2025 All rights article source: Android feature prevents sensitive content in Google Messages
Yahoo
27-03-2025
- Automotive
- Yahoo
Scary AI-powered swarm robots team up to build cars faster than ever
The automotive industry is undergoing a seismic shift driven by the integration of AI-powered humanoid robots into production lines. UBTech Robotics, in collaboration with Zeekr, has pioneered a groundbreaking initiative where swarm robots work together to build cars faster and more efficiently than ever before. But is this technological advancement a leap toward innovation or a step closer to human replacement? Stay protected & informed! Get security alerts & expert tech tips – sign up for Kurt's The CyberGuy Report now. Swarm Intelligence, inspired by collective behaviors in nature, is now being applied to robotics, enabling multiple humanoid robots to collaborate seamlessly on complex tasks. UBTech's Walker S1 robots are at the forefront of this revolution, operating in Zeekr's 5G-enabled smart factory. These robots are not just individual agents but part of a networked system that communicates and works in unison. Creepy Humanoid Robot Moves Using 1,000 Eerie Artificial Muscles BrainNet framework: UBTech's proprietary BrainNet software links cloud-based and on-device intelligence to form a "super brain" for high-level decision-making and a "sub-brain" for localized control. Multimodal reasoning model: This AI engine allows robots to analyze, schedule and coordinate tasks autonomously, adapting to dynamic industrial environments. Read On The Fox News App Collaborative capabilities: From sorting and handling heavy loads to precision assembly, these robots excel in tasks requiring dexterity and real-time decision-making. Malware Steals Bank Cards And Passwords From Millions Of Devices Chinese Humanoid Robot Lands World's First Front Flip These AI-powered robots are revolutionizing car manufacturing in several key areas. Let's take a closer look at how they're changing the game. Using advanced vision-based perception and hybrid decision-making systems, Walker S1 robots optimize sorting tasks by dynamically tracking targets and sharing intelligence across the swarm. Robots face challenges like uneven load distribution and complex trajectories. UBTech's joint planning system ensures stability and efficiency by enabling robots to adjust posture and force dynamically. In delicate tasks like handling deformable materials, Walker S1 robots utilize tactile sensing and adaptive control to ensure precision without damaging components. These capabilities have already been deployed in Zeekr's factory for tasks ranging from quality inspection to vehicle assembly, showcasing unparalleled efficiency and accuracy. China Launches Facility To Train 100-Plus Humanoid Robots Simultaneously Swarm Intelligence is not just limited to automotive manufacturing. Its applications span logistics, healthcare, agriculture and more. By decentralizing decision-making and optimizing resource allocation, swarm systems promise increased scalability and adaptability across industries. While the integration of humanoid robots offers numerous benefits, such as addressing labor shortages and enhancing production efficiency, it also raises concerns about job displacement. The question remains: How do we balance technological advancement with societal impact? Experts argue that these innovations could complement human workers rather than replace them entirely. Robots can take over repetitive or hazardous tasks, allowing humans to focus on more creative and strategic roles. However, careful planning is essential to ensure a constructive transition. Subscribe To Kurt's Youtube Channel For Quick Video Tips On How To Work All Of Your Tech Devices The automotive industry is really changing, with AI-powered robots taking center stage. UBTech and Zeekr are showing us how these robots can work together to make manufacturing faster and smarter. But as we get excited about these advancements, we also need to think about how they'll affect people's jobs. Let's hope we can find a way to make robots and humans work together seamlessly, rather than one replacing the other. As AI-powered robots increasingly take on complex tasks in car manufacturing, do you think the benefits of efficiency and precision outweigh the potential risks of job displacement, or are we trading human ingenuity for machine speed? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Alert: Malware steals bank cards and passwords from millions of devices. Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels: Facebook YouTube Instagram Answers to the most-asked CyberGuy questions: What is the best way to protect your Mac, Windows, iPhone and Android devices from getting hacked? What is the best way to stay private, secure and anonymous while browsing the web? How can I get rid of robocalls with apps and data removal services? How do I remove my private data from the internet? New from Kurt: Try CyberGuy's new games (crosswords, word searches, trivia and more!) CyberGuy's exclusive coupons and deals Copyright 2025 All rights article source: Scary AI-powered swarm robots team up to build cars faster than ever


Fox News
10-03-2025
- Fox News
Is that iPhone app spying? Apple's App Privacy Report reveals all
Apple's App Privacy Report is a powerful tool that allows iPhone users to monitor how apps access their data and interact with third-party services. This feature provides valuable insights into app behavior, helping users make informed decisions about their privacy. Here's what you need to know about using the App Privacy Report to protect your personal protected & informed! Get security alerts & expert tech tips – sign up for Kurt's The CyberGuy Report access and enable the App Privacy Report on your iPhone (we're running iOS 18.3.1), follow these steps:Once activated, the report will collect data for seven days, providing a comprehensive overview of app ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKSThe App Privacy Report is divided into four main section shows which apps have accessed sensitive data such as your location, contacts, photos, camera and microphone. Pay attention to apps that access data when not in use, as this might indicate suspicious TO REMOVE YOUR PRIVATE DATA FROM THE INTERNETHere, you can see the network traffic generated by apps and the connections they establish with external domains. This information helps identify if and how your data is being shared with third section provides insights into the network activity of websites you visit within part of the report shows which external domains and websites your apps interact with most frequently. It's particularly useful for understanding where your data might be sent after leaving an IOS VULNERABILITY EXPOSES IPHONES TO STEALTHY HACKER ATTACKSAfter reviewing the App Privacy Report, you can take several steps to protect your privacy:To limit ad tracking:Apple's App Privacy Report is a great starting point, but it doesn't stop apps, websites and data brokers from tracking you. For full protection, consider using trusted security tools:Cybercriminals use malware, phishing emails and ransomware scams to steal personal data. A reliable antivirus program can:Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS private information is constantly collected and sold by data brokers, making you a target for scammers and identity theft. A personal data removal service can:While no service can remove all of your data from the internet, ongoing monitoring helps keep your information out of the hands of data my top data removal services App Privacy Report is a valuable tool for iPhone users concerned about their digital privacy. By regularly reviewing this report, you can gain a clearer understanding of how apps handle your personal data and take appropriate actions to protect your privacy. While not all network connections indicate malicious intent, being informed allows you to make conscious decisions about the apps you use and the permissions you reviewing your App Privacy Report, were there any app behaviors that surprised or concerned you? Let us know by writing us at more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Kurt a question or let us know what stories you'd like us to Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 All rights reserved.
Yahoo
03-03-2025
- Yahoo
New malware exploits fake updates to steal data
Windows has always been a favorite target for hackers, but it seems they have now figured out how to actively target Macs as well. We've seen an alarming rise in malware affecting Mac computers, stealing personal data and cryptocurrency. Threat actors are now using AI along with elaborate social engineering tricks to target Apple users, and the company doesn't seem to be doing much about it. Meanwhile, a cybersecurity report has identified a new Mac malware called FrigidStealer, which spreads through fake browser updates and compromised websites. Stay protected & informed! Get security alerts & expert tech tips – sign up for Kurt's The CyberGuy Report now. A new malware strain called FrigidStealer is targeting macOS users as part of a broader campaign involving fake update scams, cybersecurity firm Proofpoint reported. FrigidStealer spreads through compromised websites that display deceptive browser update prompts. When users click on these prompts, they unknowingly download a malicious DMG file. Once executed, the malware requests the user's system password to gain elevated privileges before stealing sensitive information, including browser cookies, password-related files, cryptocurrency data and Apple Notes. Proofpoint identified two new threat actors behind the operation: TA2726, which functions as a traffic distribution service provider, and TA2727, which delivers FrigidStealer to Mac users. The campaign also deploys malware on Windows and Android devices, signaling a multi-platform attack strategy. The cybersecurity firm assessed with high confidence that TA2726 distributes traffic for other malware campaigns as well. Some operations previously attributed to TA569 have now been reclassified under TA2726 and TA2727. TA569 – also known as Mustard Tempest, Gold Prelude and Purple Vallhund – is linked to the cybercrime syndicate EvilCorp and was first identified in 2022. Read On The Fox News App Proofpoint also assessed with moderate confidence that TA2727 purchases traffic through online forums to spread malware, which could be its own or that of potential clients. "These are traffic sellers and malware distributors and have been observed in multiple web-based attack chains like compromised website campaigns," the report stated, "including those using fake update-themed lures." Best Antivirus For Mac, Pc, Iphones, Androids - Cyberguy Picks Threat intelligence platform Kela reported that hackers using Lumma, along with StealC, Redline and other infostealers, infected 4.3 million machines in 2024, compromising an estimated 330 million credentials. Security researchers also observed 3.9 billion credentials circulating in lists that appear to originate from infostealer logs. Infostealer malware is expected to remain a persistent threat in 2025. With malware-as-a-service platforms on the rise and infostealers becoming more sophisticated, cybercriminals will likely continue relying on them as a primary tool for stealing credentials and infiltrating systems. From Tiktok To Trouble: How Your Online Data Can Be Weaponized Against You As infostealer malware continues to grow in sophistication, taking proactive steps to protect your data is more important than ever. Here are four key ways to safeguard yourself from threats like FrigidStealer, Lumma and other credential-stealing malware. 1) Beware of fake software updates: One of the most common infection methods is through deceptive browser update prompts. Never download updates from pop-ups or random websites. Instead, always update your software directly from official sources, such as the App Store or the application's official website. If in doubt, check out my detailed guide on how to keep your device and software updated. 2) Enable two-factor authentication (2FA): Even if your credentials are stolen, 2Fa adds an extra layer of security by requiring a secondary verification method, such as a one-time code sent to your phone. Use 2FA for all critical accounts, including email, banking and cloud services. 3) Use a password manager: Many infostealers target saved passwords in web browsers. Instead of relying on your browser to store credentials, use a dedicated password manager. Get more details about my best expert-reviewed Password Managers of 2025 here. 4) Be cautious with downloads and links. Use a strong antivirus: Infostealer malware often spreads through malicious downloads, phishing emails and fake websites. Avoid downloading software or files from untrusted sources and always double-check links before clicking them. Attackers disguise malware as legitimate software, game cheats or cracked applications, so it is best to stick to official websites and app stores for downloads. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. HERE'S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS As the digital landscape evolves, so do the nasty threats we face. FrigidStealer is just the latest reminder that no platform, not even macOS, is immune to the growing sophistication of cybercriminals. With infostealers like Lumma, StealC and Redline already compromising millions of devices and billions of credentials in 2024, the rise of AI-driven attacks and social engineering scams signals a challenging road ahead. Do you think companies like Apple should be doing more to combat these evolving threats? Let us know by writing us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Ask Kurt a question or let us know what stories you'd like us to cover. Follow Kurt on his social channels: Facebook YouTube Instagram Answers to the most-asked CyberGuy questions: What is the best way to protect your Mac, Windows, iPhone and Android devices from getting hacked? What is the best way to stay private, secure and anonymous while browsing the web? How can I get rid of robocalls with apps and data removal services? How do I remove my private data from the internet? New from Kurt: Try CyberGuy's new games (crosswords, word searches, trivia and more!) CyberGuy's exclusive coupons and deals Copyright 2025 All rights article source: New malware exploits fake updates to steal data