Connect with us

Technology

Are robots coming to a McDonald’s near you?

Published

on

Are robots coming to a McDonald’s near you?

NEWYou can now listen to Fox News articles!

Walk into a McDonald’s, and you expect a familiar routine. You order, wait and grab your food. At one location in Shanghai, that routine briefly looked very different.

McDonald’s deployed robots from Chinese robotics firm Keenon Robotics in one of its fast-food restaurants as part of a short-term test tied to a store opening. The robots greeted customers, added a bit of entertainment and helped with simple service tasks.

 Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

DRONE FOOD DELIVERY LAUNCHES IN NEW JERSEY

Advertisement

Humanoid and service robots from Keenon Robotics line up outside a McDonald’s in Shanghai, highlighting the mix of experimental machines used in the short-term test. (Keenon Robotics)

What actually happened at this McDonald’s in Shanghai

This test happened at just one location. It was not a rollout. It was a short pilot tied to a store opening. Inside the restaurant, humanoid robots greeted customers and added a fun, interactive element. You can see them wearing McDonald’s uniforms and making simple gestures for diners. At the same time, other robots handled basic tasks like delivering food and clearing trays. It was a mix of different machines working together, not a fully integrated system.

Human workers still did the real work behind the counter. They handled cooking, orders and anything that required judgment.

In the end, this looked more like a live demo than a real shift in operations. The robots were there to attract attention, not replace staff.

Why McDonald’s is experimenting with robots

Even though this was a small test, it reflects a much bigger trend. Restaurants in many regions are dealing with hiring challenges. At the same time, fewer workers are interested in repetitive, lower-paid roles. That creates an opportunity for automation. Robots can handle simple, repetitive tasks with consistency. They do not get tired, and they can operate for long hours. For fast-food chains, that level of reliability is appealing. At this stage, the technology is not advanced enough to replace human workers. But it can support them in limited ways.

Advertisement

Are robot workers the future of fast food?

Not yet. This test was more about exploring possibilities than changing operations. The robots acted more like a demonstration of what could come next rather than a working solution ready for scale. Right now, the most realistic future is a hybrid model. Humans continue to handle cooking, customer issues and complex tasks. Robots assist with basic service and customer-facing roles. That balance could evolve over time as the technology improves.

Why robot tests matter for the future of fast food

Even short-term experiments can signal where things are headed. Robots can speed up service, reduce long-term labor costs and create a unique experience that attracts customers. For families and younger diners, interacting with a robot can turn a routine visit into something memorable. That novelty factor alone makes these tests valuable for companies looking to stand out.

ROBOT FIREFIGHTERS ENTER BURNING BUILDINGS FIRST

A humanoid robot greets a customer at the counter, showing how the machines were used to create an interactive, front-of-house experience. (Keenon Robotics)

Why fast food automation is still in the early stages

Today’s robots are limited. They struggle with complex tasks and unpredictable situations that require human judgment. Cooking, handling special requests and managing busy environments still depend on people. That is why this test remained small and temporary. It shows potential, but it also highlights how far the technology still has to go.

Advertisement

What this means to you

You are not about to walk into a fully automated McDonald’s. But you may start seeing more technology in everyday places. That could mean faster service and fewer delays. It could also mean less direct interaction with human staff. Jobs in fast food are unlikely to disappear overnight. Instead, they may shift toward roles that focus on customer support, problem-solving and managing technology. At the same time, these early tests raise questions about how far automation will go and how quickly it could change the workforce.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com        

A humanoid robot dressed as a chef stands on display, underscoring how the test leaned more toward demonstration and entertainment than real kitchen operations. (Keenon Robotics)

Kurt’s key takeaways

This was not a rollout. It was a glimpse. McDonald’s used humanoid robots in one location for a short period to test reactions and explore possibilities. The machines added novelty, but they did not replace workers. Still, the direction is clear. Automation is moving into everyday spaces, one small test at a time.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

If robots can already greet you and deliver your food, how long before they take on the rest of the job? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

Copyright 2026 CyberGuy.com.  All rights reserved. 

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

All the latest in AI ‘music’

Published

on

All the latest in AI ‘music’
People don’t like that they can’t identify AI music. | Image: Cath Virginia / The Verge

AI has touched every part of the music industry, from sample sourcing and demo recording, to serving up digital liner notes and building playlists. There are technical and legal challenges, fierce ethical debates, and fears that the slop will simply crush working musicians through sheer volume. Is it art or just an output? What exactly is “really active“? Whether it’s a new model or a new lawsuit, we’re covering it all to make sure you don’t miss any major developments.

So follow along as we dig into the latest in AI “music.”

  • Suno leans into customization with v5.5
  • The music industry has embraced a “don’t ask, don’t tell” policy about AI.
  • North Carolina man pleads guilty to AI music streaming fraud.
  • Apple Music adds optional labels for AI songs and visuals
  • Qobuz is automatically detecting and labeling AI music now, too.
  • This Chainsmokers-approved AI music producer is joining Google
  • Google’s AI music maker is coming to the Gemini app
  • Deezer opens its AI music detection tool to other platforms
  • ElevenLabs made an AI album to plug its music generator
  • Bandcamp becomes the first major music platform to ban AI content
  • Universal Music signs a new AI deal with Nvidia
  • Musicians are getting really tired of this AI clone ‘bullshit’
  • Get ready for an AI country music explosion
  • 97 percent of people struggle to identify AI music, but it’s not as bad as it seems
  • Warner Music Group partners with Suno to offer AI likenesses of its artists
  • The music industry is all in on AI
  • No, typing an AI prompt is not ‘really active’ music creation
  • Suno valued at $2.45 billion in latest funding round as lawsuits loom.
  • The human behind AI music artist Xania Monet, revealed.
  • Suno’s upgraded AI music generator is technically impressive, but still soulless
  • What happens when an AI-generated artist gets a record deal? A copyright mess
  • Record labels claim AI generator Suno illegally ripped their songs from YouTube
  • Can the music industry make AI the next Napster?
  • AI music company Suno acquired a browser-based audio editing tool called WavTool.
  • The music industry is building the tech to hunt down AI songs
  • Sabotaging AI music with sick beats.
  • YouTube’s new AI tool generates free background music for videos
  • Splice CEO Kakul Srivastava on where to draw hard lines around AI in music
  • Making human music in an AI world
  • AI music startups say copyright violation is just rock and roll
  • The music industry’s AI fight
  • Listen to the AI songs music labels say violate their copyright.
  • Warner Music Group’s CEO says we might see AI prompt-generated music really soon.
  • AI-generated music isn’t just a copyright hazard.
  • How AI is solving one of music’s most expensive problems
Continue Reading

Technology

Red Rooms makes online poker as thrilling as its serial killer

Published

on

Red Rooms makes online poker as thrilling as its serial killer

It’s rare for a movie to get technology right. And it’s even rarer for that movie to be a thriller or horror, where realism takes a backseat to scares and tension. But Red Rooms mostly gets it. Nothing takes me out of a film quicker than a tech MacGuffin that might as well be literal magic. Yes, the phrase “dark web” will always sound a bit silly, but at no point during its 118 minutes does the tech become a distraction.

It’s not the tech that makes Red Rooms great, though. It’s just something that could have easily tanked an otherwise excellent movie. What carries the film is the expert tension building by director Pascal Plante. The perfect slow-burn pacing. And the incredible performances by Juliette Gariépy as Kelly-Anne and Laurie Babin as Clementine.

The film centers mostly on Kelly-Anne, a model / hacker / professional gambler who attends the trial of serial killer Ludovic Chevalier. She befriends Clementine, a fan of Chevalier who insists that he is being framed.

Clementine neurotically and loudly defends Chevalier, calling into TV shows and shouting at reporters outside the courtroom. She makes a spectacle of herself. But Kelly-Anne remains more mysterious, her motives unclear. Even at the end of the film, there is ambiguity about what she was trying to accomplish and why.

The ambiguity is part of what makes Red Rooms so enthralling. The movie feels unpredictable. None of the characters seem trustworthy or relatable. The world they inhabit is familiar, yet uncanny.

Advertisement

The movie lingers in that discomfort for long periods of time, making you squirm. Giving you the opportunity to play through all the possible scenarios that could play out in your head. Is Chevalier really the killer? Is Kelly-Anne the killer? Was one of the victim’s mothers an accomplice? Is the prosecutor keeping a secret?

The movie inches along, drawing out a tale of kidnapping, live-streamed torture, and snuff films before erupting into a climax that unexpectedly mines online poker and Bitcoin for legitimate drama. It’s ultimately less about the murders themselves than it is about obsession, internet bubbles, and the media. It almost feels like a grimier companion piece to David Fincher’s Gone Girl.

Continue Reading

Technology

FBI email hack shows why you must lock down your tech

Published

on

FBI email hack shows why you must lock down your tech

NEWYou can now listen to Fox News articles!

Here’s the uncomfortable truth. If someone can break into the personal email of the head of the Federal Bureau of Investigation, your inbox is not off limits.

Malicious actors targeted the personal email account of FBI Director Kash Patel, according to the FBI, and a group known as the Handala Hack Team in Iran has claimed responsibility for posting photos and documents online.

No classified systems were breached. But that is not the point. The real story is this: the front lines of cyber warfare now run straight through personal accounts like yours.

FBI SAYS ‘MALICIOUS ACTORS’ TARGETED PATEL’S PERSONAL EMAIL, IRAN-BASED HACKING GROUP CLAIMS RESPONSIBILITY

Advertisement

Hackers didn’t breach FBI systems; they accessed a personal email account, showing how everyday accounts can become targets. (Donato Fasano/Getty Images)

Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

What happened in the FBI director’s email hack

Hackers gained access to Patel’s personal email account, not any official FBI systems. The stolen material included photos, travel details and older messages that spanned more than a decade, with emails dating from around 2011 through 2022.

The FBI said “malicious actors” targeted Patel’s personal email account but did not attribute the attack to a specific country. A group known as the Handala Hack Team, which operates out of Iran, has claimed responsibility for the breach.

The Federal Bureau of Investigation says no government or classified data was compromised. The U.S. State Department is offering up to a $10 million reward for information leading to the identification of members of the Handala Hack Team. CyberGuy reached out to the FBI for comment, but did not receive a response before our deadline.

Advertisement

A cybersecurity expert described the exposed material as a “personal junk drawer.” That detail is what makes this incident hit close to home. Most people have one too.

The threat is real and it is getting more sophisticated

This does not appear to be random. U.S. officials have warned for years that foreign government-linked hackers, including groups associated with Iran, have targeted Americans, especially those connected to government or politics. These campaigns often ramp up during periods of geopolitical tension. Similar actors have previously targeted individuals tied to the Trump administration, including:

  • Donald Trump Jr.
  • Todd Blanche
  • Lindsey Halligan

These groups also hit private companies. In one recent case, hackers claimed responsibility for disrupting operations at a U.S. medical device company and spreading propaganda tied to geopolitical events. This is coordinated. It is persistent. And it is not slowing down.

Why your everyday tech is now part of the battlefield

Cyber warfare used to target government systems. Now it targets you. Why? Because personal accounts are easier to break into. They are often protected by reused passwords, old emails and weak security habits.

Once hackers get in, they can:

  • Map out your life through old messages
  • Steal personal photos or financial details
  • Impersonate you in scams
  • Use your contacts to spread attacks

FBI Director Kash Patel speaks during a press briefing at the White House in Washington, D.C., on Nov. 12, 2025. (AP Photo/Evan Vucci)

In simple terms, your digital life can be used against you or someone you know. 

Advertisement

IF SOMEONE GETS INTO YOUR EMAIL, THEY OWN EVERY ACCOUNT YOU HAVE. THESE 3 MOVES LOCK THEM OUT FOR GOOD

What you need to do right now to lock down your tech

I know it can sound intimidating, but it really comes down to this. You don’t need special skills, just a few smarter habits starting today.

1) Turn on two-factor authentication everywhere

Two-factor authentication (2FA) is one of the strongest defenses you have. Even if someone steals your password, they cannot get in without the second code. Focus on your email first. That is the master key to everything else.

2) Stop reusing passwords

If you reuse one password across accounts, one breach can unlock your entire digital life. Use a password manager and create unique passwords for each account. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

3) Clean out your “digital junk drawer”

Remember that phrase from the FBI case? Old emails, documents and attachments can expose years of your life. Go back and delete anything you no longer need, especially files that contain personal, financial or travel details. For anything important, move it to a secure location instead of leaving it sitting in your inbox. You can also check out CyberGuy’s 5 digital clean-up tips you didn’t know you needed to reduce long-term clutter and limit what attackers could access if your account is ever compromised.

Advertisement

4) Watch for highly targeted phishing

These attacks are getting more convincing. Hackers can use stolen data to craft emails that look personal and real. Always double-check links and sender addresses before clicking. Use strong antivirus software that can detect suspicious links, block malicious downloads and warn you before you interact with a dangerous site. Think of it as an extra layer of defense you do not have to think about. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

5) Consider using a data removal service

Even if you clean up your inbox, your personal information may already be circulating online through data broker sites. These companies collect and sell details like your address, phone number and even past activity. A data removal service can help automatically request the removal of your information from hundreds of these sites, reducing what hackers can find and use against you.

 6) Keep your devices updated Updates fix known security flaws. Delaying them gives attackers a window to exploit your device.

7) Separate your digital life

Use different email accounts for banking, shopping and personal communication. This limits the damage if one account is compromised. Consider using email aliases, which are alternate addresses that forward to your main inbox. For example, you can use one alias for online shopping and another for signups. If one alias gets exposed or starts receiving spam, you can disable it without affecting your primary email account. For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com

Cyberattacks today often focus on personal data like emails and photos, which can be used to expose or manipulate victims. (Philip Dulian/picture alliance via Getty Images)

Advertisement

8) Use passkeys where available

Passkeys replace passwords with a secure login tied to your device or biometrics. They cannot be reused or phished, which makes them one of the safest ways to protect your accounts today.

Kurt’s key takeaways

The U.S. is facing capable cyber adversaries. Hacker groups have shown they can keep pushing, adapt quickly and target both institutions and individuals. At the same time, the most common entry point is still simple. A weak password. An old email account. A moment of inattention. That means the first line of defense is not just government agencies. It is you.

What’s one thing you’ve done or haven’t done to protect your accounts that still worries you? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

Advertisement

Copyright 2026 CyberGuy.com.  All rights reserved.  

Continue Reading
Advertisement

Trending