Connect with us

Technology

6 sneaky scams that could ruin your holiday season

Published

on

6 sneaky scams that could ruin your holiday season

The holiday season is a time filled with joy, festivities and cherished moments with family and friends. However, amidst the hustle and bustle of shopping, cooking and celebrating, it’s easy to overlook a lurking danger: scams. Scammers thrive during this busy time, preying on our excitement and stress to trick us into revealing personal information or losing money. We’re going to discuss six sneaky scams that could ruin your holiday spirit and provide you with essential tips on how to protect yourself from these deceptive tactics.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Scam alert illustration (Kurt “CyberGuy” Knutsson)

1) Package delivery scam

With the holiday season in full swing, the end-of-year sales have begun, and you probably have already started your holiday shopping and are expecting packages coming via different types of delivery services like FedEx, UPS or USPS. So, if you receive a text that mentions a package delivery, you may be likely to easily fall for a scam. I was expecting a package recently and received this text out of the blue (see image).

Fake package delivery scam text (Kurt “CyberGuy” Knutsson)

Advertisement

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS – CYBERGUY PICKS

Even though the text says the sender is not in my contact list and that it may be junk, I almost clicked the link because I was so focused on the fact that there may have been a typo in my delivery address. But once I looked a little closer, there were a few red flags in this text message that tipped me off to it being a scam.

  • First, the link does not lead you to usps.com. It’s a fake link that scammers hope you won’t notice. Notice it is uspsts.top and not usps.com. This is a common scam going around called typosquatting wherein a scammer uses a domain that looks close to a real website. Next, the text says “pls,” which is lingo for “please” that you likely wouldn’t see in correspondence from the USPS. Scammers often make typos or use poor grammar when communicating, so always double-check.
  • Scammers are sending emails, texts and even occasionally there could be a phone call that is regarding an issue with package delivery. It may be something like this text I received that has a link where they’ll end up asking for information, or you may be asked to pay a “shipping fee” to get your package.
  • Be sure to always have strong antivirus software running on your devices to prevent any disasters from happening if you were to click on a malicious link. See my expert review of the best antivirus protection for your Windows, Mac, Android and iOS devices.

How to avoid package delivery scams

If you are expecting a package, and you’re wondering if you’ve received real information or not about it, the best way to check is to go to the original confirmation you received about shipping. You most likely received an email regarding your package, and if you go to that email to get your order number, you should be able to look up the status of your order directly on any website.

A woman shopping on her laptop (Kurt “CyberGuy” Knutsson)

8 PHISHING EMAIL SCAMS TO WATCH OUT FOR THIS HOLIDAY SEASON

2) Charity scams

Sadly, charity scams aren’t new, but they are way more prevalent during the holiday season since scammers are hoping you’re feeling more generous during this time of year. Sometimes, scammers may create fake names of organizations to get you to donate money, or they may reach out to you via phone/email/text posing as someone working for a legitimate charity. Social media has also become a popular place for charities to market themselves and reach more eyes in hopes of donations, so scammers may try to pose as fake charities. These schemes will try to appeal to your emotions during this season, so be sure to check where you donate your money so you don’t fall for a scam.

Advertisement

How to avoid charity scams

Never give your money to anyone immediately who approaches you or reaches out on behalf of any organization without doing your own independent research. Either do a little googling or check with a family member to see if it’s real, and if it is, you should be able to donate to an official website or an official address. You can always mention this to anyone who asks you to donate somewhere. Don’t fall into the pressure of donating right then and there. Also, always double-check the name of an organization. Sometimes (especially online), scammers will alter the name of a known organization slightly to trick you into donating.

9 WAYS SCAMMERS CAN USE YOUR PHONE NUMBER TO TRY TO TRICK YOU

3) Social media gift exchange scam

The Better Business Bureau is warning about a gift exchange scam with a new twist, which has been occurring during recent holiday seasons. It’s an online version of the popular “Secret Santa” gift exchange. However, the BBB says these social media-driven gift exchanges are actually pyramid schemes, and you will most likely be disappointed if you participate.

In the past few years, variations of the gift exchange have popped up, with someone asking you to select a random person and send them a gift to pay it forward. Another asks you to exchange bottles of wine with someone else, and while it seems fun and light-hearted, you don’t know who is on the receiving end.

How to avoid social media gift exchange scams

It may sound nice to send a holiday gift to a stranger in turn for receiving multiple gifts yourself, but you’re never going to receive many (if any) gifts at all. Don’t participate in gift exchanges with anyone you don’t know, or you won’t be able to guarantee you’ll actually be gifting someone who isn’t a scammer.

Advertisement

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

4) Gift card scams

Gift card scams are another popular method that has been rising in popularity recently, but it’s especially important to watch out for the possibilities, since you may be purchasing gift cards for friends or family for the holidays. Scammers often steal gift cards and use the information before they make it look like they didn’t. They have a number of methods for tricking you using gift cards, so if you can send an online one (so that you can ensure you’ve purchased it on a legitimate, official website), that would be a much safer alternative.

How to avoid gift card scams

If you’re getting anyone a gift card and buying it in person, be sure to check that the package hasn’t been tampered with. Double-check that nothing on the packaging looks suspicious since scammers will try to make it seem like the package was sealed, but they will already have used the gift card, so you’re essentially buying a useless piece of plastic.

Illustration of a gift card (Kurt “CyberGuy” Knutsson)

THE BEST WAY TO BUY GIFT CARDS EVER

Advertisement

5) Home Depot email confirmation scam

Scammers are capitalizing on the festive spirit with a deceptive email campaign targeting people at this time of year. This scam involves a deceptive email that appears to be from Home Depot with such wording as “Confirmation needed: please confirm receipt.” The email body typically contains enticing text like “Congratulations! The Home Depot – You are our winner!” along with a customer number and a blue circle that says, “Check if you won.” Who couldn’t use a little extra cheer or perhaps a holiday prize from Home Depot this season?

The problem is this is a scam, and the goal of this scam is to lure you into clicking on an embedded link, which can lead to various malicious outcomes. These include phishing for personal and financial information, installing malware on your device, redirecting to a fake website that resembles Home Depot’s or prompting you to pay a “delivery fee” for a non-existent prize.

How to avoid Home Depot email scams

To protect yourself from this and similar scams, scrutinize the sender’s email address for any discrepancies. Hover over links without clicking to reveal their true destination. Be wary of unexpected “winnings” or requests for confirmation. If you receive an email that raises suspicion, contact Home Depot directly through their official website or customer service number to verify its legitimacy. Finally, remember that legitimate companies will not ask you to confirm sensitive information via email or require you to click on links to claim prizes.

Fake Home Depot winning email (Kurt “CyberGuy” Knutsson)

6) Fake online shopping sites scam

One of the most common scams during the holiday season is the fake online shopping site scam. Scammers create websites that look like legitimate online stores but are actually designed to steal your personal and financial information. They may offer products at very low prices or claim to have limited-time deals or exclusive items. They may also send you phishing emails or text messages with links to these fake sites.

Advertisement

A woman shopping on her laptop (Kurt “CyberGuy” Knutsson)

Some signs of a fake online shopping site are:

  • The website address does not match the name of the store or brand.
  • The website has poor design and/or spelling and grammar errors.
  • The website does not have a secure connection (https) or a padlock icon in the address bar.
  • The website asks for too much personal information, such as your Social Security number or bank account details.
  • The website does not have a clear return policy, contact information or customer reviews.

How to avoid falling victim to this scam

By following a few simple precautions, you can significantly reduce your risk of falling prey to online scams and ensure a safer shopping experience.

1) Shop only from trusted and reputable online stores that you know and have used before.

2) Check the website address carefully and look for any red flags.

3) Do some research on the online store before making a purchase. Read customer reviews, look for ratings or search for complaints online.

4) Use a credit card or a secure payment service like PayPal when shopping online. Do not use debit cards, wire transfers or gift cards.

Advertisement

5) Keep track of your online purchases and monitor your bank statements for any unauthorized charges.

6) Use strong antivirus protection software. An effective antivirus software is a must-have. The best way to protect yourself from clicking on any malicious links on fake websites or in phishing emails and text messages is to have antivirus protection installed and actively running on all your devices. It’s the best to help stop and alert you of any malware in your system and ultimately protect you from being hacked. See my expert review of the best antivirus protection for your Windows, Mac, Android and iOS devices.

7) Use a personal data removal service. Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams during the busy holiday season.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

I’ve been scammed! What to do next?

Below are some next steps if you find you or your loved one is a victim of identity theft.

Advertisement

1) If you can regain control of your accounts, change your passwords and inform the account provider

2) Look through bank statements and checking account transactions to see where outlier activity started

3) Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any lossesSee my tips and best picks on how to protect yourself from identity theft.

4) Report any breaches to official government agencies like the Federal Communications Commission.

Advertisement

5) Get the professional advice of a lawyer

  • Before speaking to law enforcement, especially when you are dealing with criminal identity theft
  • If being a victim of criminal identity theft leaves you unable to secure employment or housing

6) Alert all three major credit bureaus and possibly place a fraud alert on your credit report.

7) Run your own background check or request a copy of one if that is how you discovered your information has been used by a criminal.

If you are a victim of identity theft, the most important thing to do is to take immediate action to mitigate the damage and prevent further harm.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Kurt’s key takeaways

As we dive into the holiday season, let’s keep our guard up against those sneaky scams that could spoil our celebrations. Remember to stay vigilant while shopping online or responding to unexpected messages. A little caution can go a long way in ensuring that your holidays remain joyful and stress-free. So, enjoy the festivities, cherish the moments with loved ones, and keep these tips in mind to outsmart the scammers.

Advertisement

What are some of your personal experiences with holiday scams, and how did you protect yourself from them? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

Xbox’s Towerborne is switching from a free-to-play game to a paid one

Published

on

Xbox’s Towerborne is switching from a free-to-play game to a paid one

Towerborne, a side-scrolling action RPG published by Xbox Game Studios that has been available in early access, will officially launch on February 26th. But instead of launching as a free-to-play, always-on online game as originally planned, Towerborne is instead going to be a paid game that you can play offline.

“You will own the complete experience permanently, with offline play and online co-op,” Trisha Stouffer, CEO and president of Towerborne developer Stoic, says in an Xbox Wire blog post. “This change required deep structural rebuilding over the past year, transforming systems originally designed around constant connectivity. The result is a stronger, more accessible, and more player-friendly version of Towerborne — one we’re incredibly proud to bring to launch.”

“After listening to our community during Early Access and Game Preview, we learned players wanted a complete, polished experience without ongoing monetization mechanics,” according to an FAQ. “Moving to a premium model lets us deliver the full game upfront—no live-service grind, no pay-to-win systems—just the best version of Towerborne.”

With the popular live service games like Fortnite and Roblox getting harder to usurp, Towerborne’s switch to a premium, offline-playable experience could make it more enticing for players who don’t want to jump into another time-sucking forever game. It makes Towerborne more appealing to me, at least.

With the 1.0 release of the game, Towerborne will have a “complete” story, new bosses, and a “reworked” difficulty system. You’ll also be able to acquire all in-game cosmetics for free through gameplay, with “no more cosmetic purchasing.” Players who are already part of early access will still be able to play the game.

Advertisement

Towerborne will launch on February 26th on Xbox Series X / S, Xbox on PC, Game Pass, Steam, and PS5. The standard edition will cost $24.99, while the deluxe edition will cost $29.99.

Continue Reading

Technology

Hackers abuse Google Cloud to send trusted phishing emails

Published

on

Hackers abuse Google Cloud to send trusted phishing emails

NEWYou can now listen to Fox News articles!

Cybercriminals have found a clever new way to get phishing emails straight into inboxes.

Instead of spoofing brands, they are abusing real cloud tools that people already trust. Security researchers say attackers recently hijacked a legitimate email feature inside Google Cloud. 

The result was thousands of phishing messages that looked and felt like normal Google notifications. Many slipped past spam filters with ease.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – when you join my CYBERGUY.COM newsletter.

Advertisement

How this Google Cloud phishing attack worked

At the center of the campaign was Google Cloud Application Integration. This service allows businesses to send automated email notifications from workflows they build. Attackers exploited the Send Email task inside that system. Because the messages came from a real Google address, they appeared authentic to both users and security tools. 

According to Check Point, a global cybersecurity firm that tracks and analyzes large-scale threat campaigns, the emails were sent from a legitimate Google-owned address and closely matched Google’s notification style. Fonts, wording, and layout all looked familiar. Over a two-week period in December 2025, attackers sent more than 9,000 phishing emails targeting roughly 3,200 organizations across the U.S., Europe, Canada, Asia Pacific, and Latin America.

Attackers used trusted Google Cloud infrastructure to route victims through multiple redirects before revealing the scam. (Thomas Fuller/SOPA Images/LightRocket via Getty Images)

MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA

Why Google phishing emails were so convincing

The messages looked like routine workplace alerts. Some claimed you had received a voicemail. Others said you were granted access to a shared document, like a Q4 file. That sense of normalcy lowered suspicion. Many people are used to seeing these exact messages every day. Even more concerning, the emails bypassed common protections like SPF and DMARC because they were sent through Google-owned infrastructure. To email systems, nothing looked fake.

Advertisement

What happens after you click

The attack did not stop at the email. Once a victim clicked the link, they were sent to a page hosted on storage.cloud.google.com. That added another layer of trust. From there, the link redirected again to googleusercontent.com. Next came a fake CAPTCHA or image check. This step blocked automated security scanners while letting real users continue. After passing that screen, victims landed on a fake Microsoft login page hosted on a non-Microsoft domain. Any credentials entered there were captured by the attackers.

Who was targeted in the Google Cloud phishing attack

Check Point says the campaign focused heavily on industries that rely on automated alerts and shared documents. That included manufacturing, technology, finance, professional services, and retail. Other sectors like healthcare, education, government, energy, travel and media were also targeted. These environments see constant permission requests and file-sharing notices, which made the lures feel routine.

“We have blocked several phishing campaigns involving the misuse of an email notification feature within Google Cloud Application Integration,” a Google spokesperson told Cyberguy. “Importantly, this activity stemmed from the abuse of a workflow automation tool, not a compromise of Google’s infrastructure. While we have implemented protections to defend users against this specific attack, we encourage continued caution as malicious actors frequently attempt to spoof trusted brands. We are taking additional steps to prevent further misuse.”

The incident demonstrates how attackers can weaponize legitimate cloud automation tools without resorting to traditional spoofing.

Ways to stay safe from trusted-looking phishing emails

Phishing emails are getting harder to spot, especially when attackers abuse real cloud platforms like Google Cloud. These steps help reduce risk when emails look familiar and legitimate.

Advertisement

1) Slow down before acting on alerts

Attackers rely on urgency. Messages about voicemails, shared files or permission changes are designed to make you click fast. Pause before taking action. Ask yourself whether you were actually expecting that alert. If not, verify it another way.

2) Inspect links before you click

Always hover over links to preview the destination domain. In this campaign, links jumped across multiple trusted-looking Google domains before landing on a fake login page. If the final destination does not match the service asking you to sign in, close the page immediately.

3) Treat file access and permission emails with caution

Shared document alerts are a favorite lure because they feel routine at work. If an email claims you were granted access to a file you do not recognize, do not click directly from the message. Instead, open your browser and sign in to Google Drive or OneDrive manually to check for new files.

The final step led users to a fake Microsoft login page, where entered credentials were silently stolen. (Stack Social)

4) Use a password manager to catch fake login pages

Password managers can be a strong last line of defense. They will not autofill credentials on fake Microsoft or Google login pages hosted on non-official domains. If your password manager refuses to fill in a login, that is a red flag worth paying attention to.

Advertisement

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

NEW GOOGLE AI MAKES ROBOTS SMARTER WITHOUT THE CLOUD

5) Run strong antivirus software with phishing protection

Modern antivirus tools do more than scan files. Many now detect malicious links, fake CAPTCHA pages, and credential harvesting sites in real time. Strong antivirus software can block phishing pages even after a click, which matters in multi-stage attacks like this one.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Advertisement

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

6) Reduce your exposure with a data removal service

Phishing campaigns often succeed because attackers already know your email, employer or role. That information is commonly pulled from data broker sites. A data removal service helps remove your personal information from these databases, making it harder for attackers to craft convincing, targeted emails.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Advertisement

7) Enable two-factor authentication (2FA) everywhere

Even if attackers steal your password, two-factor authentication (2FA) can stop them from accessing your account. Use app-based authentication or hardware keys when possible, especially for work email, cloud storage, and Microsoft accounts.

8) Report suspicious emails immediately

If something feels off, report it. Flag suspicious Google or Microsoft alerts to your IT or security team so they can warn others. Early reporting can stop a phishing campaign before it spreads further inside an organization.

Google phishing emails looked like routine workplace alerts. (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaways

This campaign highlights a growing shift in phishing tactics. Attackers no longer need to fake brands when they can abuse trusted cloud services directly. As automation becomes more common, security awareness matters more than ever. Even familiar emails deserve a second look, especially when they push urgency or ask for credentials.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

If a phishing email comes from a real Google address, how confident are you that you would spot it before clicking? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2025 CyberGuy.com.  All rights reserved.

Continue Reading

Technology

Most dubious uses of AI at CES 2026

Published

on

Most dubious uses of AI at CES 2026

You can’t shake a stick without hitting an AI gadget at CES this year, with artificial smarts now embedded in just about every wearable, screen, and appliance across the show floor, not to mention the armies of AI companions, toys, and robots.

But those are just the beginning. We’ve seen AI pop up in much stranger places too, from hair clippers to stick vacs, and at least one case where even the manufacturer itself seemed unsure what made its products “AI.”

Here are the gadgets we’ve seen at CES 2026 so far that really take the “intelligence” out of “artificial intelligence.”

Glyde smart hair clippers

An extremely normal hair-cutting experience.
Photo: Dominic Preston / The Verge
Advertisement

This is a product that would be silly enough without the AI add-on. These smart hair clippers help amateur hairdressers deliver the perfect fade by dynamically altering the closeness of the cut, helped along by an ominous face mask that looks like it belongs in an optician’s office.

But it’s taken to the next level by the real-time AI coach, which gives you feedback as you cut. Glyde told me it’s working on voice controls for the AI too, and that eventually it will be able to recommend specific hairstyles, so long as you’re willing to trust its style advice. Are you?

Gotta love a CES booth that hands out mystery pills like they’re candy.

Gotta love a CES booth that hands out mystery pills like they’re candy.
Photo: Dominic Preston / The Verge

“Where Pills meet AI.”

That was the message emblazoned across the SleepQ booth, where company reps were handing out boxes of pills — a multivitamin with ashwagandha extract according to the box, supposedly good for sleep, though I wasn’t brave enough to test that claim on my jetlag.

Manufacturer Welt, originally spun out of a Samsung incubator, calls its product “AI-upgraded pharmacotherapy.” It’s really just using biometric data from your smartwatch or sleep tracker to tell you the optimal time to take a sleeping pill each day, with plans to eventually cover anxiety meds, weight-management drugs, pain relief, and more.

Advertisement

There may well be an argument that fine-tuning the time people pop their pills could make them more effective, but I feel safe in saying we don’t need to start throwing around the term “AI-enhanced drugs.”

I always wished my vacuum was more intelligent.

I always wished my vacuum was more intelligent.
Photo: Antonio G. Di Benedetto / The Verge

Startup Deglace claims that its almost unnecessarily sleek-looking Fraction vacuum cleaner uses AI in two different ways: first to “optimize suction,” and then to manage repairs and replacements for the modular design.

It says its Neural Predictive AI monitors vacuum performance “to detect issues before they happen,” giving you health scores for each of the vacuum’s components, which can be conveniently replaced with a quick parts order from within the accompanying app. A cynic might worry this is all in the name of selling users expensive and proprietary replacement parts, but I can at least get behind the promise of modular upgrades — assuming Deglace is able to deliver on that promise.

AI-generated art of a bulldog wearing 18th-ish-century military garb and seated on a golden throne, in the style of an old oil painting.

You too can hang beautiful art like this in your home.
Photo: Dominic Preston / The Verge

Most digital picture frames let you display photos of loved ones, old holiday snaps, or your favorite pieces of art. Fraimic lets you display AI slop.

It’s an E Ink picture frame with a microphone and voice controls, so you can describe whatever picture you’d like, which the frame will then generate using OpenAI’s GPT Image 1.5 model. The frame itself starts at $399, which gets you 100 image generations each year, with the option to buy more if you run out.

Advertisement

What makes the AI in Fraimic so dubious is that it might be a pretty great product without it. The E Ink panel looks great, you can use it to show off your own pictures and photos too, and it uses so little power that it can run for years without being plugged in. We’d just love it a lot more without the added slop.

Into the ModuVerse.

Into the ModuVerse.
Photo: Dominic Preston / The Verge

Infinix, a smaller phone manufacturer that’s had success across Asia for its affordable phones, didn’t launch any actual new products at CES this year, but it did bring five concepts that could fit into future phones. Some are clever, like various color-changing rear finishes and a couple of liquid-cooling designs. And then there’s the AI ModuVerse.

Modular phone concepts are nothing new, so the AI hook is what makes ModuVerse unique — in theory. One of the “Modus” makes sense: a meeting attachment that connects magnetically, generating AI transcripts and live translation onto a mini display on the back.

But when I asked what made everything else AI, Infinix didn’t really have any good answers. The gimbal camera has AI stabilization, the vlogging lens uses AI to detect faces, and the microphone has AI voice isolation — all technically AI-based, but not in any way that’s interesting. As for the magnetic, stackable power banks, Infinix’s reps eventually admitted they don’t really have any AI at all. Color me shocked.

This looks pretty smart, but it really is just a microwave.

This looks pretty smart, but it really is just a microwave.
Photo: Dominic Preston / The Verge

There’s a growing trend for AI and robotic cooking hardware — The Verge’s Jen Tuohy reviewed a $1,500 robot chef just last month — but Wan AIChef is something altogether less impressive: an AI-enabled microwave.

Advertisement

It runs on what looks suspiciously like Android, with recipe suggestions, cooking instructions, and a camera inside so you can see the progress of what you’re making. But… it’s just a microwave. So it can’t actually do any cooking for you, other than warm up your food to just the right temperature (well, just right plus or minus 3 degrees Celsius, to be accurate).

It’ll do meal plans and food tracking and calorie counting too, which all sounds great so long as you’re willing to commit to eating all of your meals out of the AI microwave. Please, I beg you, do not eat all of your meals out of the AI microwave.

A vertical monitor displaying an image of a margarita. There is a webcam mounted on top.

Yes, that is just a Dell monitor with a Logitech webcam stuck on top.
Photo: Dominic Preston / The Verge

The tech industry absolutely loves reinventing the vending machine and branding it either robotics or AI, and AI Barmen is no different.

This setup — apparently already in use for private parties and corporate events — is really just an automatic cocktail machine with a few AI smarts slapped on top.

The AI uses the connected webcam to estimate your age — it was off by eight years in my case — and confirm you’re sober enough to get another drink. It can also create custom drinks, with mixed success: When asked for something to “fuck me up,” it came up with the Funky Tequila Fizz, aka tequila, triple sec, and soda. What, no absinthe?

Advertisement
A palm-sized device with a small screen displaying a cartoon version of Elon Musk.

Photo: Dominic Preston / The Verge

Should you buy your kid an AI toy that gives it a complete LLM-powered chatbot to speak to? Probably not. But what if that AI chatbot looked like chibi Elon Musk?

He’s just one of the many avatars offered by the Luka AI Cube, including Hayao Miyazaki, Steve from Minecraft, and Harry Potter. Kids can chat to them about their day, ask for advice, or even share the AI Cube’s camera feed to show the AI avatars where they are and what they’re up to. Luka says it’s a tool for fun, but also learning, with various educational activities and language options.

The elephant in the room is whether you should trust any company’s guardrails enough to give a young kid access to an LLM. Leading with an AI take on Elon Musk — whose own AI, Grok, is busy undressing children as we speak — doesn’t exactly inspire confidence.

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Continue Reading

Trending