Apple currently sells MacBooks equipped with its own M-series processors in a wide range of sizes and price points, all of which run the company’s newest operating system, macOS 26. Purchasing a new MacBook can be complicated if you’re trying to figure out what specs you need, but finding a deal on a relatively speedy model is surprisingly easy, especially since Apple increased the starting RAM on several models in late 2024.
Technology
Data breach exposes 400,000 bank customers’ info
NEWYou can now listen to Fox News articles!
A major data breach tied to U.S. fintech firm Marquis is rippling through banks, credit unions and their customers. Hackers broke into Marquis systems by exploiting a known but unpatched vulnerability in a SonicWall firewall, gaining access to deeply sensitive consumer data.
At least 400,000 people are confirmed to be affected so far across multiple states. Texas has been hit the hardest with more than 354,000 residents affected. That number is expected to rise as additional breach notifications are filed.
Marquis operates as a marketing and compliance provider for financial institutions. The company says it serves more than 700 banks and credit unions nationwide. That role gives Marquis access to centralized pools of customer data, which also makes it a high-value target.
PASSWORD MANAGER FINED AFTER MAJOR DATA BREACH
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
A major data breach tied to fintech firm Marquis exposed sensitive banking and identity data for hundreds of thousands of people. (Kurt “CyberGuy” Knutsson)
What information was stolen in the Marquis cyberattack
According to legally required disclosures filed in Texas, Maine, Iowa, Massachusetts and New Hampshire, hackers accessed a wide range of personal and financial data. Stolen information includes customer names, dates of birth, postal addresses, Social Security numbers and bank account, debit and credit card numbers. The breach dates back to Aug. 14, when attackers gained access through the SonicWall firewall vulnerability. Marquis later confirmed the incident was a ransomware attack.
While Marquis did not publicly name the attackers, the campaign has been widely linked to the Akira ransomware gang. Akira has previously targeted organizations running SonicWall appliances during large-scale exploitation waves. This was not a routine credential leak.
We reached out to Marquis for comment, and a company spokesperson provided CyberGuy with the following statement:
“In August, Marquis Marketing Services experienced a data security incident. Upon discovery, we immediately enacted our response protocols and proactively took the affected systems offline to protect our data and our customers’ information. We engaged leading third-party cybersecurity experts to conduct a comprehensive investigation and notified law enforcement.
“The incident was quickly contained, and our investigation was recently completed. It was determined that an unauthorized third party accessed certain non-public information within our network. However, there is no evidence indicating that any personal information has been used for identity theft or financial fraud. We have notified potentially affected individuals.
“We know our customers place great trust in us, and at Marquis, we take that responsibility seriously by making the protection of their information our highest priority. We are extremely appreciative of the cooperation, understanding, and support of our employees and customers during this time.”
HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET
Why the Marquis data breach creates long-term identity risk
When a data breach exposes your full identity, the danger does not disappear after the news cycle ends. Unlike a stolen password, this kind of information cannot be changed, which means the risk can stick around for a long time.
“With a typical credential leak, you reset passwords, rotate tokens and move on,” Ricardo Amper, CEO and Founder of Incode Technologies, a digital identity verification company, tells CyberGuy. “But core identity data is static. You cannot meaningfully change your date of birth or SSN, and once those are exposed, they can circulate on criminal markets for years. The breach is a moment in time, but the exposure it creates can follow people for the rest of their financial lives.”
That is why identity breaches are so dangerous. Criminals can reuse the same stolen data years later to open new accounts, build fake identities or run highly targeted scams that feel personal and convincing. Many attackers now combine this data with AI tools to scale their efforts. As a result, phishing emails, phone calls and even voice impersonations are harder to spot when they reference real details about your bank or account history.
The most likely scams after identity data is stolen
When criminals obtain verified identity data, fraud becomes targeted rather than opportunistic.
“Once criminals get their hands on rich, verified identity data, fraud stops being a guessing game and becomes a targeted execution,” Amper said.
The first major threat is account takeover. With enough personal details, attackers can bypass knowledge-based checks, reset passwords, change contact information and abuse accounts in ways that often look legitimate. The second risk is new account fraud. This includes credit cards, loans, buy now pay later services and even new bank accounts. High-quality data helps these applications pass automated systems and manual reviews.
The fastest-growing threat is synthetic identity fraud. Real data, like a Social Security number, is blended with fabricated details to create a new identity that matures over time before a large financial bust.
“These attacks are hard to catch early because the data being presented is accurate and often reused across multiple institutions,” Amper noted. “If your defenses can’t reliably tell a real human from an AI-generated impersonation, you are starting every decision from a position of disadvantage,” he added.
Why unpatched firewall flaws pose such a serious threat
Ransomware groups like Akira increasingly focus on widely deployed infrastructure to maximize impact. Firewalls sit at the boundary of trusted networks. When one is compromised, everything behind it becomes reachable.
“What we’re seeing with groups like Akira is a focus on maximizing impact by targeting widely used infrastructure. The strategy remains the same: Find a single weak point that gives access to many downstream victims at once,” Amper said.
This approach exposes a persistent blind spot in traditional cybersecurity thinking. Many organizations still assume traffic passing through a firewall is safe.
“When the perimeter device itself is the entry point, static defenses and outdated controls simply can’t keep up,” Amper explained.
Hackers accessed names, Social Security numbers and bank details by exploiting an unpatched firewall vulnerability. (Kurt “CyberGuy” Knutsson)
How long affected consumers should assume risk remains high
Identity data does not expire. Social Security numbers and birth dates stay the same for life.
“When core identity data reaches criminal markets, the risk does not fade quickly,” Amper emphasized. “Fraud rings treat stolen identity data like inventory. They hold it, bundle it, resell it and combine it with information from new breaches.”
Warning signs of misuse can be subtle. These include credit inquiries you did not authorize, account recovery alerts from unfamiliar services or phone calls that convincingly mimic a bank’s verification process using deepfake voice tools.
“The most damaging fraud often starts long after the breach is no longer in the news,” Amper added.
The overlooked impact of identity theft
Financial losses are only part of the damage. Victims often experience a lasting erosion of trust.
Amper says, “The most overlooked consequence is the psychological toll of knowing that you can no longer trust who is contacting you. Deepfake impersonation turns every phone call, video message or urgent request into a potential attack.”
Ways to stay safe after the Marquis data breach
When a breach exposes Social Security numbers, bank details and birth dates, the risk does not end with a password reset. These steps focus on protections that reduce long-term identity misuse and help you detect fraud early.
1) Freeze your credit with all major bureaus
A credit freeze prevents criminals from opening new accounts in your name using stolen identity data. This is critical after the Marquis breach, where full identity profiles were exposed. Freezing credit does not affect your score and can be lifted temporarily when needed. Place a free credit freeze with Equifax, Experian and TransUnion online or by phone. Each bureau must be contacted separately. Once frozen, new credit cannot be opened unless you temporarily lift or remove the freeze using a PIN or account login.
2) Place a fraud alert on your credit file
A fraud alert tells lenders to take extra steps to verify your identity before approving credit. It adds protection if you are not ready to freeze credit everywhere or want an extra layer on top of a freeze. Fraud alerts last for one year and can be renewed. You only need to contact one credit bureau to place a fraud alert. Equifax, Experian or TransUnion will notify the others for you. Fraud alerts are free and last for one year.
3) Enable transaction and account alerts
Turn on alerts for withdrawal, purchase, login attempts and password changes across all financial accounts. Real-time alerts can help you catch account takeovers or unauthorized activity before serious damage occurs.
4) Review bank statements and credit reports regularly
Check statements and credit reports often, even months or years after the breach. Identity data from incidents like this is frequently reused later for delayed fraud. Watch for unfamiliar accounts, hard inquiries or small test charges.
5) Use phishing-resistant two-factor authentication
Text message codes can be intercepted or socially engineered. Where possible, switch to app-based or hardware-backed two-factor authentication. These options are harder for attackers to bypass, even when they know your personal details.
6) Rely on strong device-based biometrics where available
Biometrics tied to your physical device add a layer that criminals cannot easily replicate. Face and fingerprint authentication help block account takeovers driven by stolen identity data or AI-powered impersonation.
7) Use strong antivirus software
Reputable antivirus software helps detect malicious links, fake login pages and follow-up attacks that target breach victims. This adds protection against phishing and ransomware tied to identity-based scams.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS
8) Consider a data removal service
Data brokers collect and resell personal information that can be combined with breach data to fuel targeted fraud. A data removal service reduces how much of your personal information is publicly available and lowers your exposure over time.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Experts warn this type of identity exposure can fuel fraud and scams for years after the breach is discovered. (Kurt ‘CyberGuy’ Knutsson)
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
9) Add an identity theft protection service
Identity theft services monitor credit files, dark web markets and account activity for signs that your stolen data is being misused. Many also offer recovery assistance in the event of fraud, which can save time and stress when dealing with banks, credit bureaus and government agencies. This monitoring is especially useful after breaches like Marquis, where identity data can resurface long after the initial incident.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.
10) Verify unexpected outreach through official channels
Be cautious of urgent calls, emails or texts that reference real banking or personal details. Scammers now use accurate breach data to sound legitimate. Hang up and contact your bank directly using the number on your card or official website.
11) Lock down tax and government accounts
Create or secure online accounts with the IRS, Social Security Administration and your state tax agency. Enable strong authentication and monitor for unexpected notices. Stolen identity data is often used for tax refund fraud or benefit scams long after a breach.
Kurt’s key takeaways
The Marquis data breach highlights how dangerous unpatched infrastructure vulnerabilities have become for the financial sector. When a single vendor holds data for hundreds of institutions, the fallout spreads quickly. For you, identity protection is no longer a one-time response. It is an ongoing necessity that can last years beyond the initial breach.
What questions do you still have about protecting your identity after a major data breach like this one? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
The best deals on MacBooks right now
These days, it’s not uncommon to see various MacBooks discounted by up to $800. Alternatively, purchasing refurbished options directly from Apple is another way to save money without waiting for the changing deal winds to blow your way. It’s also the only option to find certain configurations of older models as Apple continues to move forward with newer releases. Apple’s refurbished store offers a one-year warranty and generally discounts new units by up to 20 percent.
But if you want to buy new and you’re looking to save whatever you can, here are the best MacBook Air, MacBook Pro, and Mac Mini deals available.
The best MacBook Air deals
In March, Apple released an updated MacBook Air, which comes in both a 13- and 15-inch configuration with an M4 processor. Interestingly, the latest Air starts at a lower price than the prior model, yet it offers slightly faster performance and twice as much base RAM at 16GB. It can also connect to two external monitors with the lid open, comes in a fresh sky blue color, and features the 12-megapixel Center Stage webcam from the latest MacBook Pro. Needless to say, there’s a lot to like.
Both the 13-inch and 15-inch MacBook Airs are currently receiving some sizable discounts, too. You can pick up the 13-inch base model with a 10-core CPU, an eight-core GPU, 16GB of RAM, and 256GB of storage on sale at Amazon and Best Buy for around $799 ($200 off), which is just $50 shy of its lowest price to date. If you prefer the larger 15-inch model, the entry-level configuration with a 10-core GPU, 16GB of RAM, and 256GB of storage is on sale for about $999 ($200 off) at Amazon and Best Buy, which remains its second-best price to date.



The best MacBook Pro deals
M4 and M4 Pro MacBook Pro
In November 2024, Apple released the M4-series MacBook Pro. Notably, the base 14-inch M4 MacBook Pro is the first to launch with 16GB of RAM — double the previous generation’s starting memory — and 512GB of storage for the same $1,599 starting price as the last-gen model. It also picks up a third Thunderbolt 4 port, which is positioned on the right side and supports dual external monitors while the lid is open. Also new in this model is an upgraded 12-megapixel webcam that supports Center Stage and a new Desk View feature, plus the option to add a nano-texture display for an extra $150. It’s also available in space black.
The 14- and 16-inch MacBook Pro models with M4 Pro and M4 Max chips also received additional RAM, bringing them up to 24GB. They start with 512GB of storage, too, and retail for $1,999 and $2,499, respectively. While the total port selection hasn’t changed compared to their respective M3 Pro and M3 Max counterparts, you’ll get faster Thunderbolt 5 ports on these more substantial models. That’s in addition to the SD slot, dedicated full-sized HDMI port, and 3.5mm jack. They also have the upgraded 12-megapixel Center Stage webcam with Desk View, as well as the optional nano-texture display option.
Many variations of the M4 MacBook Pro with different screen and processor configurations are on sale right now. For example, the 14-inch M4 Pro with a 10-core CPU, 10-core GPU, 16GB of RAM, and 512GB of storage is available for $1,299 ($300 off) at B&H Photo. You can also pick up the 14-inch Pro with 24GB of RAM, 512GB of storage, and an M4 Pro chip (12-core CPU / 16-core GPU) at Amazon and Best Buy for $1,749 ($250 off), which is a solid discount even if it’s not the biggest price drop we’ve seen in recent months.
The base 16-inch MacBook Pro, meanwhile, is on sale at Amazon and Best Buy with an M4 Pro chip, 24GB of RAM, and 512GB of storage for around $2,249 ($250 off), which is $120 more than the all-time low we saw during Black Friday.






Apple’s latest revision of the 14.2-inch MacBook Pro adds the M5 processor. The generational leap will be felt most by those who have an older MacBook Pro, not those upgrading from the M4, unless you use specific AI apps that tap into the chip’s new Neural Accelerators. As for other design changes and upgrades to the inside and outside of this MacBook Pro, there really aren’t any major ones to note; in fact, it’s so similar to the M4 model that our reviewer Antonio Di Benedetto had to write “M5” on a sticky note just to be able to tell them apart. That being said, it’s still an amazing laptop, one that’s just now starting to get minor discounts.
The 14.2-inch base model with the M5 processor, 16GB of RAM, and 512GB of storage is down to $1,449 ($150 off) at Amazon, Best Buy, and B&H Photo, which is $100 shy of its best price to date.


The newest Mac Minis in town are the M4-based models, which arrived in late 2024. Apple reduced the horizontal footprint of its desktop and paired it with its M4 chipset and 16GB of RAM, which is double that of the previous generation and brings it in line with other base model Macs from 2024. That makes Apple’s newest desktop computer a tremendous value.
Deals on the newest Mac Mini are a bit easier to come by now than they were at launch, which is good since the outgoing M2 model is becoming more difficult to find. The M4 Mac Mini starts with an M4 processor, 16GB of RAM, and 256GB of storage for $599. That’s an incredible value for a tiny desktop computer that can rival the Mac Studio and Mac Pro when it comes to certain tasks, including light gaming, 4K video editing, and 3D modeling. Vertically, the M4 Mac Mini is a fair bit thicker than the last-gen M2 model at 2 inches tall, yet it measures a mere 5 inches wide and 5 inches deep.
In addition to the odd decision to place the power button on its underside, Apple moved the 3.5mm headphone jack and two of its five USB-C / Thunderbolt 4 ports to the front. The rear features an additional three Thunderbolt ports, HDMI-out, and a gigabit ethernet port. You can also get the Mac Mini with an M4 Pro chipset starting at $1,399, which comes with faster Thunderbolt 5 storage and the option to upgrade to 10-gigabit ethernet for another $100.
In the past, we’ve seen the base Mac Mini drop to as low as $469, but right now it’s only on sale at Amazon and B&H Photo with an M4 chip, 16GB of RAM, and a 256GB SSD for $499 ($100 off). If you need more storage, you can step up to the version with 16GB of RAM and a 512GB SSD for $689 ($110 off) at Amazon and B&H Photo. Meanwhile, the base M4 Pro model with 24GB of RAM and 512GB of storage is on sale for $1,269 ($130 off) at Amazon and B&H Photo.


Update, January 16th: Updated to reflect current pricing and availability.
Technology
ChatGPT Health promises privacy for health conversations
NEWYou can now listen to Fox News articles!
OpenAI is rolling out ChatGPT Health, a new space for private health and wellness conversations. Importantly, the company says it will not use your health information or Health chats to train its core artificial intelligence (AI) models. As more people turn to ChatGPT to understand lab results and prepare for doctor visits, that promise matters. For many users, privacy remains the deciding factor.
Meanwhile, Health appears as a separate space inside ChatGPT for early-access users. You will see it in the sidebar on desktop and in the menu on mobile. If you ask a health-related question in a regular chat, ChatGPT may suggest moving the conversation into Health for added protection. For now, access remains limited. However, OpenAI says it plans to roll out ChatGPT Health gradually to users on Free, Go, Plus and Pro plans.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
AI DISCLOSURE IN HEALTHCARE: WHAT PATIENTS MUST KNOW
Health chats stay isolated from regular conversations and are excluded from AI training by default. (OpenAI)
What makes ChatGPT Health different from regular chats
ChatGPT Health is built as a separate environment, not just another chat thread. Here is what stands out:
A dedicated private space
Health conversations live in their own area. Files, chats and memories stay contained there. They do not mix with your regular ChatGPT conversations.
Clear medical boundaries
ChatGPT Health is not meant to diagnose conditions or replace a doctor. You will see reminders that responses are informational only and not medical advice.
Connecting your health data
If you choose, you can connect medical records and wellness apps to Health. This helps ground responses in your own data. Supported connections include:
- Medical records, such as lab results and visit summaries
- Apple Health for sleep, activity, and movement data
- MyFitnessPal for nutrition and macros
- Function for lab insights and nutrition guidance
- Weight Watchers for GLP-1 meal ideas
- Fitness and lifestyle apps like Peloton, AllTrails and Instacart
You control access. You can disconnect any app at any time and revoke permissions immediately.
Extra privacy protections
OpenAI says Health uses additional encryption and isolation designed specifically for sensitive health data. Health chats are excluded from training foundation models by default.
CAN AI CHATBOTS TRIGGER PSYCHOSIS IN VULNERABLE PEOPLE?
ChatGPT Health creates a separate space designed specifically for health and wellness conversations. (OpenAI)
Things you should not share on ChatGPT
Even with stronger privacy promises, caution still matters. Avoid sharing:
- Full Social Security numbers
- Insurance member IDs or policy numbers
- Login credentials or passwords
- Scans of government-issued IDs
- Financial account numbers
- Highly sensitive details you would not tell a clinician
Health is designed to inform and prepare you, not to replace professional care or secure systems built for identity protection.
ChatGPT Health was built with doctors
OpenAI built ChatGPT Health with direct input from more than 260 physicians across many medical specialties worldwide. Over two years, those clinicians reviewed hundreds of thousands of example responses and flagged wording that could confuse readers or delay care.
As a result, their feedback guides how ChatGPT Health explains lab results, frames risk, and prompts follow-ups with a licensed clinician. More importantly, the system focuses on safety, clarity, and timely escalation when needed. Ultimately, the goal is to help you have better conversations with your doctor, not replace one.
OPENAI LIMITS CHATGPT’S ROLE IN MENTAL HEALTH HELP
Users can connect medical records and wellness apps to better understand trends before talking with a doctor. (OpenAI)
What this means for you
For many people, health information is scattered across portals, PDFs, apps and emails. ChatGPT Health aims to pull that context together in one place.
That can help you:
The key takeaway is control. You decide what to connect, what to delete and when to walk away.
How to get access to ChatGPT Health
If you do not see Health yet, you can join the waitlist inside ChatGPT. Once you have access:
- Select Health from the sidebar
- Upload files or connect apps from Settings
- Start asking questions grounded in your own data
You can also customize instructions inside Health to control tone, topics, and focus.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com
Kurt’s key takeaways
ChatGPT Health reflects how people already use AI to understand their health. What matters most is the privacy line OpenAI is drawing. Health conversations stay separate and are not used to train core models. That promise builds trust, but smart sharing still matters. AI can help you prepare, understand and organize. Your doctor still makes the call.
Would you trust an AI assistant with your health data if it promised stronger privacy than standard chat tools, or does that still feel like a step too far? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Google brings its AI videomaker to Workspace users
Google is expanding access to its AI videomaking tool. Launched last May, Flow was initially only available to Google AI Pro and AI Ultra subscribers, but now, those with Business, Enterprise, and Education Workspace plans can access it, too.
Flow uses Google’s AI video generation model Veo 3.1 to generate eight-second clips based on a text prompt or images. You can stitch together the clips to create longer scenes, as well as access a bunch of other tools that allow you to change the lighting, adjust the “camera” angle, and insert or remove objects in scenes. Earlier this week, Google added vertical video support inside Flow.
Google brought audio support to more features within Flow late last year, allowing you to generate audio whether you prompt the app based on reference images, ask it to create transitions between scenes, or have the tool extend a clip. The company also integrated its AI-powered image generator Nano Banana Pro into Flow, which you can use to create characters or starting points for your clips.
-
Montana7 days agoService door of Crans-Montana bar where 40 died in fire was locked from inside, owner says
-
Delaware1 week agoMERR responds to dead humpback whale washed up near Bethany Beach
-
Dallas, TX1 week agoAnti-ICE protest outside Dallas City Hall follows deadly shooting in Minneapolis
-
Virginia7 days agoVirginia Tech gains commitment from ACC transfer QB
-
Montana1 week ago‘It was apocalyptic’, woman tells Crans-Montana memorial service, as bar owner detained
-
Minnesota7 days agoICE arrests in Minnesota surge include numerous convicted child rapists, killers
-
Oklahoma6 days agoMissing 12-year-old Oklahoma boy found safe
-
Lifestyle2 days agoJulio Iglesias accused of sexual assault as Spanish prosecutors study the allegations