Connect with us

Technology

Smart glasses detector app warns if you’re being recorded

Published

on

Smart glasses detector app warns if you’re being recorded

NEWYou can now listen to Fox News articles!

Smart glasses are built to blend in. Most of the time, they look just like a normal pair of glasses. The difference is that some models can quietly take photos or record video without anyone nearby realizing it.

As these wearable cameras start showing up in everyday places, more people are wondering when they might be on camera. That concern helped inspire a new Android app called Nearby Glasses, which lets you check whether smart glasses may be nearby.

The idea behind the app is simple. If a nearby device is broadcasting a Bluetooth signal linked to smart glasses, the app tries to detect it. For people worried about hidden cameras in public spaces, even a small warning could help them stay more aware of their surroundings.

META SMART GLASSES PRIVACY CONCERNS GROW

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Mark Zuckerberg sported a pair of Meta Ray-Ban Display AI glasses while speaking at the Meta Connect event in Menlo Park, California, on Sept. 17, 2025. (David Paul Morris/Bloomberg via Getty Images)

Why smart glasses are raising privacy concerns

Smart glasses are designed to blend in. Unlike a phone or camera, they often look identical to regular eyewear. That means someone could be filming without anyone around them realizing it.

Modern versions of these devices can capture photos, record video and even livestream. Some models also connect to AI tools that can analyze what the wearer sees. Privacy advocates say the biggest problem is visibility. When someone pulls out a phone to record, people usually notice.

With smart glasses, the camera may be hidden in plain sight. As a result, conversations about consent and privacy are becoming more urgent as wearable cameras spread.

Advertisement

How the nearby glasses app works

Nearby Glasses works by scanning for Bluetooth signals that devices broadcast to connect with phones and other hardware. Each manufacturer uses unique Bluetooth identifiers. The app listens for those signals and compares them to known identifiers from companies that produce wearable devices. If the app detects one of those signals, it alerts the user.

Here is how the process works:

  • The app scans nearby Bluetooth devices in real time
  • It checks each signal against known manufacturer identifiers
  • If a match appears, the user receives an alert

The app currently focuses on devices made by companies such as Meta and Snap. Users can also add additional Bluetooth identifiers to expand what the app detects. That allows the tool to flag more types of wearable tech. To keep scanning continuously, users must enable a foreground service in the app and press Start Scanning. A debug log then displays the scanning activity while the app runs.

Why the developer created the app

The app was developed by software creator Yves Jeanrenaud, who says he built it after seeing how wearable cameras were being used. On the project page, Jeanrenaud described smart glasses as a major privacy concern. He believes the devices could open the door to more recording without consent.

He also pointed to reports about smart glasses appearing in sensitive situations. Those examples include cases where wearable cameras were allegedly used during immigration enforcement or in situations where people were filmed without permission.

According to Jeanrenaud, the app represents what he calls a form of technological resistance. In other words, using technology to push back against technology. Still, even he admits it may only address part of the problem.

Advertisement

As smart glasses become more common in public places, tools like the Nearby Glasses app aim to help people stay aware of possible hidden recording devices. (Kurt “CyberGuy” Knutsson)

The app is helpful but not perfect

Like any detection tool, Nearby Glasses has limitations. Bluetooth signals do not always reveal exactly what device is nearby. For example, a device made by the same manufacturer could trigger an alert. That means a headset or other gadget might appear as a possible pair of smart glasses.

False positives are possible. However, those alerts still give users more awareness of nearby devices that could be capturing data. Right now, the app is available only for Android. The developer has said an iPhone version could happen in the future, depending on time and demand.

Ways to stay safe around smart glasses

Smart glasses are becoming more common. While tools like Nearby Glasses can help, awareness is still the best defense. Here are several ways to protect your privacy.

Pay attention to visible camera indicators

Some smart glasses include small LED lights that turn on while recording. If you notice a light on someone’s frames, they may be filming.

Advertisement

Speak up if you feel uncomfortable

If you suspect someone is recording you in a private setting, you can ask them directly. Many people stop when confronted.

Avoid sensitive conversations in crowded areas

Wearable cameras thrive in public environments where people are distracted. Avoid discussing personal information in places where recording could occur.

Disable Bluetooth visibility on your own devices

Limiting the signals your devices broadcast can reduce how easily others track or scan your hardware.

WORLD’S THINNEST AI GLASSES FEATURE BUILT-IN AI ASSISTANT

Stay informed about wearable tech

Smart glasses are evolving quickly. Learning how they work helps you recognize when someone might be using one nearby.

Advertisement

Mark Zuckerberg wears the Meta Ray-Ban Display glasses while speaking at the company’s headquarters in Menlo Park, California, on Sept. 17, 2025. (Reuters/Carlos Barria)

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Smart glasses represent a strange moment in the evolution of technology. On one hand, they promise convenience. People can capture moments hands-free or access digital information instantly. On the other hand, they blur the line between everyday life and constant surveillance. Apps like Nearby Glasses show that some people are already pushing back. They want tools that reveal when hidden cameras might be nearby. However, technology alone will not settle the debate. The real question is how society decides to balance innovation with basic expectations of privacy.

And that leads to a bigger question. If cameras can hide in ordinary glasses, should people be required to reveal when they are recording you? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Sotomayor’s Wabi Sabi is the funnest record of 2026

Published

on

Sotomayor’s Wabi Sabi is the funnest record of 2026

Shout out to subscriber N_Gorski for today’s pick. They popped into the comments on last week’s recommendation to ask what I thought of the new Sotomayor record. Well, I hadn’t actually heard it yet, but now I’m obsessed.

The group consists of siblings Raul and Paulina Sotomayor from Mexico City. Wabi Sabi is their first record since 2020’s Origenes, and it is pure joy. You can look back through everything I’ve recommended over the last several months, and “fun” is not how you’d describe most of it. But that’s what Wabi Sabi is — it’s fun, chaotic, and dancey as hell.

I was only familiar with Sotomayor before this because of a short documentary about Raul’s various projects made by Ableton. In that video, he discusses how his approach to making music has changed over the years. How he used to try to make things sound “proper” and “clean,” but now it’s about “how much can we distort it” or “how much can we stretch it.”

You can certainly hear that in the music. The first track, “Me dejo llevar,” opens with a synth arpeggio that has clearly been timestretched to within an inch of its life. It’s loaded with digital artifacts. The whole track has a light crust, as if everything is clipping just ever so slightly. “Who’s there” similarly bristles as the edges, sounding like a dance floor constantly on the verge of erupting into a riot.

The vintage electronic drum hits, droning bass, and reverb-drenched noise stabs never reach full catharsis, but simmer beautifully into album highlight “Vida.” Here, Paulina finds a sultry gear as she croons over a UK garage-inflected track that eventually erupts into an afrohouse club banger.

Advertisement

Wabi Sabi ricochets between genres with infectious abandon. Afrobeat, cumbia, electro pop, R&B, and more all collide in what is easily the most fun album of 2026 so far. What makes it all the more impressive is that, for all its unconventional sounds (a donkey jaw?) and stylistic excursions, Sotomayor still has a distinct vision that holds the record together.

At no point does the chaos threaten to overwhelm. Never does it feel like the duo are simply throwing things at the wall to see what sticks; everything is a carefully made decision in service of the party. The gently meandering guitar of “Yo se todo de ti,” the classic house of “Todo se derrumba,” and the dancehall of “Prende la palma” all feel unified by Paulina’s undeniable charisma on the mic and Raul’s uninhibited sonic curiosity.

Continue Reading

Technology

Trump administration is allegedly collecting $10 billion on the TikTok deal

Published

on

Trump administration is allegedly collecting  billion on the TikTok deal

In September, Donald Trump claimed that “the United States is getting a tremendous fee” for brokering the TikTok deal. Now sources tell the Wall Street Journal and the New York Times that fee is expected to be in the range of $10 billion. The money is supposedly being paid by new investors, including Oracle and Silver Lake. Reports are that $2.5 billion was already paid to the Treasury when the deal closed on January 22nd. The rest will be paid out in installments.

This is the latest example of the Trump administration inserting itself into private business in unprecedented ways, including taking on a 10-percent stake in Intel last August, a “golden share” in US Steel, and a 20-percent cut in chip sales from Nvidia to China. In this instance, the deal also involves one of Trump’s biggest supporters and fundraisers, Larry Ellison, co-founder and CTO of Oracle.

If the reporting is accurate, the fee would represent over 70 percent of the deal’s value, which saw a group of investors take a majority stake in TikTok for $14 billion.

Continue Reading

Technology

Iran-linked hackers target US medical tech company

Published

on

Iran-linked hackers target US medical tech company

NEWYou can now listen to Fox News articles!

When most people hear about cyberattacks tied to geopolitical conflict, it can seem far away. It sounds like something that happens to governments or giant corporations. Yet the latest cyber incident involving a U.S. medical technology company shows how fragile digital systems can be. Even more important, it raises a question you should all ask yourself: Are you protected against trouble, too?

A hacker group linked to Iran has claimed responsibility for a cyberattack on Stryker, a Michigan-based company that produces medical equipment and healthcare technology used worldwide. Stryker employs about 56,000 people and operates in more than 60 countries, making it one of the largest medical technology companies in the world.

Stryker disclosed the incident in a filing with the U.S. Securities and Exchange Commission, saying the disruption affected parts of its Microsoft environment and that investigators are working to determine the full scope.

The incident appears to be one of the most significant cyber incidents linked to the current conflict so far.

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Laboratory assistants from the company BioNTech wear Stryker medical gear in a clean room at a production site in Marburg, Germany, in March 2021. (Boris Roessler/picture alliance via Getty Images)

What happened in the Stryker cyberattack

According to reports, the attack disrupted parts of Stryker’s global network environment. Reports indicate the outages began shortly after midnight on Wednesday on the East Coast. Employees suddenly discovered that their work-issued phones stopped functioning. Communication across teams stalled as devices became unusable.

ANDROID FIXES 129 SECURITY FLAWS IN MAJOR PHONE UPDATE

The hacker group Handala claimed responsibility on social media platforms, including Telegram and X. However, the claim has not been independently verified. Some employees also reported seeing the hacker group’s logo appear on company login pages during the disruption. In posts online, the group said the attack was retaliation for a bombing at a school in Minab, Iran, though those claims have not been independently verified.

Advertisement

Security experts believe the attackers may have gained access to the company’s Microsoft Intune management console. This platform allows companies to manage corporate devices such as smartphones and laptops remotely. Once inside that system, attackers appear to have triggered a powerful administrative feature. Reports suggest many company-connected phones and laptops were wiped back to factory settings.

Signage at the Stryker Corp. headquarters in Portage, Michigan, on Thursday, March 12, 2026. A cyberattack on Stryker Corp. has kept the medical technology company’s ordering and shipping systems offline as the firm continues to struggle to address a crippling hack claimed by a group linked to Iran.   (Kristen Norman/Bloomberg via Getty Images)

How hackers may have used legitimate tools against the company

The attack did not rely on traditional ransomware or malware. Instead, the hackers appear to have used a legitimate system feature in a destructive way. Remote wipe tools exist for good reasons. Companies use them when a device is lost, stolen or retired. However, if attackers gain control of the management console, those same tools can become weapons. Some cybersecurity researchers believe attackers may have accessed the company’s Microsoft Intune device management system, though the exact method of the attack has not been publicly confirmed.

Once the attackers accessed the device management system, they likely triggered remote wipe commands across multiple employee devices. The result looked like a mass reset event that effectively shut down normal operations. Stryker later confirmed it experienced a cybersecurity incident affecting its Microsoft environment. The company said it saw no evidence of ransomware or malware and believes the incident is contained. Stryker said it has activated business continuity measures so it can continue supporting customers and partners while systems are restored.

Iran’s long history of destructive cyberattacks

This type of attack fits into a broader pattern. Iran-linked groups have previously launched some of the most damaging “wiper” cyberattacks on record. These attacks aim to destroy data rather than steal it.

Advertisement

Two notable examples include:

Since the start of the current conflict, cybersecurity companies such as Google and Proofpoint have mostly observed Iranian groups conducting espionage operations. However, the Stryker disruption may signal a shift toward more aggressive actions targeting corporate infrastructure. We contacted both Stryker and Microsoft for comment but did not hear back before our deadline.

Why this matters beyond one company

Large cyber incidents rarely stay isolated. When attackers demonstrate a new method, other groups often study and reuse it. That means techniques used against a corporation today can show up in smaller attacks tomorrow. Small businesses, hospitals and even individuals sometimes become targets when criminals adapt the same tactics. In other words, this story about a medical technology company also carries a warning for everyday digital life. 

The logo of Stryker medical technology is seen on their plant in the IDA (Industrial Development Agency) estate, in Carrigtwohill, County Cork, Ireland on March 28, 2025. (Reuters/Clodagh Kilcoyne)

How to protect yourself from cyberattacks and device wipe threats

Cyberattacks against corporations reveal weaknesses that can affect anyone who uses connected devices. A few proactive steps can reduce your risk.

Advertisement

1) Use strong and unique passwords

Never reuse passwords across accounts. If attackers obtain one password, they often test it across many services. Consider using a password manager to generate and securely store complex passwords, so you do not need to remember them. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

2) Enable two-factor authentication

Adding a second verification step, such as two-factor authentication (2FA), can stop attackers even if they obtain your password.

3) Consider a data removal service

Data broker sites collect and sell personal details that criminals may exploit. Removing that information can reduce your exposure. Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

4) Install strong antivirus software

Reliable antivirus protection helps detect suspicious activity, phishing attempts and malware before it can spread. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

5) Back up important files regularly

If a device is wiped or compromised, backups allow you to restore critical data quickly.

Advertisement

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Cyberattacks once focused mainly on stealing information. Today, many attackers try to disrupt systems, erase data or create chaos. The reported incident involving Stryker shows how hackers can turn everyday administrative tools into powerful weapons. If someone gains access to the right controls, they may not need traditional malware at all. For many people, cyber conflict between countries can seem far away. Yet the same technology involved in those attacks powers the devices and services we rely on every day. Your phone, laptop and cloud accounts all connect to systems that depend on trust and access permissions. That is why digital safety now requires layers of protection. Strong passwords help. Secure devices help. Staying aware of threats helps, too. Preparation can make the difference between a quick recovery and a major disruption. If something unexpected happens, the people who bounce back fastest are usually those who took a few steps to protect themselves in advance.

And that leads to an important question: If your phone, laptop or cloud account were suddenly wiped tomorrow, would you be ready to recover? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report

Advertisement

Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Trending