Technology
Baseball is changing forever with robot ump challenges
NEWYou can now listen to Fox News articles!
For generations, baseball has followed a simple rule. The umpire calls balls and strikes, and that call stands. That changes now. This season, Major League Baseball is introducing something that once felt unthinkable. Players can challenge an umpire’s call and let technology decide the outcome.
It is called the Automated Ball-Strike Challenge System, or ABS. Most fans already know it by another name. The robot ump. And whether you love it or hate it, the game is stepping into a new era.
Sign up for my FREE CyberGuy Report. Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
YANKEES SHORTSTOP JOSÉ CABALLERO MAKES MLB HISTORY, BECOMES FIRST PLAYER TO USE AUTOMATED BALL-STRIKE SYSTEM
Replay of an automated ball-strike challenge appears on the videoboard during an AAA MiLB game between the Buffalo Bisons and Worcester Red Sox at Polar Park in Worcester, Mass., on May 5, 2023. (Erica Denhoff/Icon Sportswire via Getty Images)
What is the MLB robot ump challenge system?
At a basic level, ABS uses advanced cameras to track every pitch with precision. It creates a digital strike zone that removes guesswork. But MLB is not handing full control to machines just yet.
Instead, this is a hybrid system. Human umpires still make every call on the field. Players now have a limited way to challenge those calls when they believe something was missed. So the umpire still runs the game. Technology simply keeps them honest.
How the robot ump actually sees every pitch
The system uses a network of high-speed cameras placed around the stadium to track the baseball in three dimensions. It measures the pitch as it crosses home plate and compares it to a digital strike zone that is customized to each batter’s height.
All of that happens in milliseconds. The result is sent almost instantly to the scoreboard, which is why the challenge feels fast and seamless instead of disruptive.
Scott Jacka, Sr. Director of Technology Development Strategy at T-Mobile, told CyberGuy:
“T-Mobile’s private 5G network enables the real-time transmission of pitch data to the ABS operator during ABS challenges. As pitches are tracked by cameras around the field, that data is transmitted quickly and reliably to the ABS system operator in the press box, who can then deliver the results back to the field within seconds.”
Jacka added:
“ABS depends on fast, reliable data transmission in a live game environment. T-Mobile’s private 5G network is designed to provide secure, low-latency connectivity through a dedicated spectrum in every U.S. MLB stadium. This helps pitch data move quickly and consistently so decisions can be delivered without disrupting the rhythm of play.”
How the challenge system works during a game
The process is surprisingly simple and fast. Each team starts with two challenges per game. Only the pitcher, catcher or batter can call for one. No dugout help. No replay delays.
The player signals by tapping their head. Within seconds, the stadium screen shows the pitch location and whether it was truly a ball or a strike. If the challenge is correct, the team keeps it. If not, they lose one.
That quick moment has already become one of the most intense parts of the game. Teams may also receive additional challenges in extra innings, giving them a bit more flexibility in longer games.
What happens if the tech gets it wrong
One big concern with any new system is reliability. MLB designed ABS to deliver results almost instantly, without slowing down the game.
If anything ever goes wrong, the human umpire is still there as the final authority. That built-in fallback helps ensure the game keeps moving smoothly without long delays or confusion.
Who is powering the robot ump tech?
The system behind MLB’s robot ump is powered by Hawk-Eye Innovations, the same camera tracking technology used in tennis and soccer for line calls and goal decisions. That alone gives the system a proven track record for accuracy.
MLB UMPIRE CAUGHT ON HOT MIC BEGGING PITCH TO ‘PLEASE BE A STRIKE’ AFTER CATCHER ISSUES ABS CHALLENGE
T-Mobile supports the infrastructure behind the scenes, helping deliver results quickly to stadium displays and broadcast feeds.
Why MLB decided now was the time
Bad ball and strike calls have always been part of baseball. Sometimes they even become part of the story. But fans, players and teams have grown less patient with mistakes that technology can easily fix. MLB sees this system as a way to clean up the most frustrating part of the game without removing the human element entirely.
It is not about perfection. It is about fairness in the biggest moments.
Why fans might end up loving it
You might expect this to slow things down. It does the opposite. Every challenge creates a moment. The crowd pauses. The screen lights up. Everyone waits for the answer.
It adds tension without dragging out the game. Even better, it removes the endless arguing. Instead of debating calls for hours, fans get a clear answer almost instantly. It turns controversy into drama.
Players can challenge a call instantly, triggering a real-time ABS review on the stadium screen. (AP Photo/Jeff Roberson, File)
Why timing and emotions matter more than ever
One of the biggest lessons from early testing is that when you challenge matters more than what you challenge. Players who use challenges too early may regret it later in high-pressure moments.
There is also a human factor. Players admit emotions can get the best of them, leading to impulsive challenges that cost their team later in the game.
Some pitches are harder to judge than others
Not every pitch is easy to challenge. High-velocity pitches and those with heavy movement, like sinkers, can be extremely difficult to judge in real time.
Even experienced players can misread a pitch by inches, which makes deciding whether to challenge even more difficult.
How MLB players feel about robot umps
This is where things get interesting. Hitters with elite plate discipline could gain an edge. Players like Juan Soto are known for recognizing the strike zone better than almost anyone. That skill now has real strategic value.
Catchers face a different reality. Pitch framing has long been one of the most valuable defensive skills in baseball, where catchers subtly position their glove to make pitches look like strikes to the umpire. With ABS, framing is not disappearing. Instead, it is evolving into a more strategic tool while still influencing live calls from the human umpire.
Pitchers are the least likely to use the system. Many do not believe they have the best view of the strike zone in real time. Veterans like Max Scherzer have also raised a bigger question. How much technology should be allowed to shape the game? That debate is far from settled.
The hidden data boom behind robot umps
Beyond making calls, ABS is generating a massive amount of data. Teams can now analyze pitch accuracy, player tendencies and challenge success rates in real time.
This opens the door to deeper analytics, from evaluating hitters’ strike zone awareness to measuring how effective catchers are at identifying missed calls. Over time, this data could influence coaching decisions and even player value.
Could this lead to full robot umps?
That question is already on the table. MLB has tested fully automated strike zones in the minor leagues. Other sports like tennis have already moved in that direction.
But baseball is different. Many players and fans still want a human behind the plate. They believe the personality, judgment and even the imperfections are part of what makes the game special.
Right now, the challenge system feels like a middle ground. It fixes the worst mistakes while keeping the human touch.
BASEBALL HALL OF FAME PITCHER GOES IN DEPTH HOW ABS SYSTEM WILL IMPROVE OFFENSE, HOW ARMS HAVE TO ADJUST
What this means to you
If you watch baseball, you will notice the difference right away. Games could feel fairer. Big moments are less likely to hinge on a missed call. You will also see more strategy. Players must decide when to challenge and when to hold back. One wrong decision could matter later in the game.
Teams are already treating challenges like a limited resource, often saving them for the most important moments late in the game. If you are a casual fan, this may actually make baseball easier to follow. The strike zone becomes visible and understandable in real time. In short, the game becomes more transparent, more strategic and more engaging.
The ABS system tracks each pitch in real time and shows exactly where the ball crossed the strike zone. (AP Photo/Alex Brandon)
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com
Kurt’s key takeaways
Baseball has never stood still. From instant replay to pitch clocks, the game keeps evolving while trying to protect what makes it unique. The robot ump challenge system fits that pattern. It does not replace umpires. It simply gives players a voice when something looks wrong. And in a sport built on inches, that voice could change everything.
If technology can get every call right, would you trust it more than the human behind the plate? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
FBI email hack shows why you must lock down your tech
NEWYou can now listen to Fox News articles!
Here’s the uncomfortable truth. If someone can break into the personal email of the head of the Federal Bureau of Investigation, your inbox is not off limits.
Malicious actors targeted the personal email account of FBI Director Kash Patel, according to the FBI, and a group known as the Handala Hack Team in Iran has claimed responsibility for posting photos and documents online.
No classified systems were breached. But that is not the point. The real story is this: the front lines of cyber warfare now run straight through personal accounts like yours.
FBI SAYS ‘MALICIOUS ACTORS’ TARGETED PATEL’S PERSONAL EMAIL, IRAN-BASED HACKING GROUP CLAIMS RESPONSIBILITY
Hackers didn’t breach FBI systems; they accessed a personal email account, showing how everyday accounts can become targets. (Donato Fasano/Getty Images)
Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
What happened in the FBI director’s email hack
Hackers gained access to Patel’s personal email account, not any official FBI systems. The stolen material included photos, travel details and older messages that spanned more than a decade, with emails dating from around 2011 through 2022.
The FBI said “malicious actors” targeted Patel’s personal email account but did not attribute the attack to a specific country. A group known as the Handala Hack Team, which operates out of Iran, has claimed responsibility for the breach.
The Federal Bureau of Investigation says no government or classified data was compromised. The U.S. State Department is offering up to a $10 million reward for information leading to the identification of members of the Handala Hack Team. CyberGuy reached out to the FBI for comment, but did not receive a response before our deadline.
A cybersecurity expert described the exposed material as a “personal junk drawer.” That detail is what makes this incident hit close to home. Most people have one too.
The threat is real and it is getting more sophisticated
This does not appear to be random. U.S. officials have warned for years that foreign government-linked hackers, including groups associated with Iran, have targeted Americans, especially those connected to government or politics. These campaigns often ramp up during periods of geopolitical tension. Similar actors have previously targeted individuals tied to the Trump administration, including:
- Donald Trump Jr.
- Todd Blanche
- Lindsey Halligan
These groups also hit private companies. In one recent case, hackers claimed responsibility for disrupting operations at a U.S. medical device company and spreading propaganda tied to geopolitical events. This is coordinated. It is persistent. And it is not slowing down.
Why your everyday tech is now part of the battlefield
Cyber warfare used to target government systems. Now it targets you. Why? Because personal accounts are easier to break into. They are often protected by reused passwords, old emails and weak security habits.
Once hackers get in, they can:
- Map out your life through old messages
- Steal personal photos or financial details
- Impersonate you in scams
- Use your contacts to spread attacks
FBI Director Kash Patel speaks during a press briefing at the White House in Washington, D.C., on Nov. 12, 2025. (AP Photo/Evan Vucci)
In simple terms, your digital life can be used against you or someone you know.
IF SOMEONE GETS INTO YOUR EMAIL, THEY OWN EVERY ACCOUNT YOU HAVE. THESE 3 MOVES LOCK THEM OUT FOR GOOD
What you need to do right now to lock down your tech
I know it can sound intimidating, but it really comes down to this. You don’t need special skills, just a few smarter habits starting today.
1) Turn on two-factor authentication everywhere
Two-factor authentication (2FA) is one of the strongest defenses you have. Even if someone steals your password, they cannot get in without the second code. Focus on your email first. That is the master key to everything else.
2) Stop reusing passwords
If you reuse one password across accounts, one breach can unlock your entire digital life. Use a password manager and create unique passwords for each account. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com
3) Clean out your “digital junk drawer”
Remember that phrase from the FBI case? Old emails, documents and attachments can expose years of your life. Go back and delete anything you no longer need, especially files that contain personal, financial or travel details. For anything important, move it to a secure location instead of leaving it sitting in your inbox. You can also check out CyberGuy’s 5 digital clean-up tips you didn’t know you needed to reduce long-term clutter and limit what attackers could access if your account is ever compromised.
4) Watch for highly targeted phishing
These attacks are getting more convincing. Hackers can use stolen data to craft emails that look personal and real. Always double-check links and sender addresses before clicking. Use strong antivirus software that can detect suspicious links, block malicious downloads and warn you before you interact with a dangerous site. Think of it as an extra layer of defense you do not have to think about. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
5) Consider using a data removal service
Even if you clean up your inbox, your personal information may already be circulating online through data broker sites. These companies collect and sell details like your address, phone number and even past activity. A data removal service can help automatically request the removal of your information from hundreds of these sites, reducing what hackers can find and use against you.
6) Keep your devices updated Updates fix known security flaws. Delaying them gives attackers a window to exploit your device.
7) Separate your digital life
Use different email accounts for banking, shopping and personal communication. This limits the damage if one account is compromised. Consider using email aliases, which are alternate addresses that forward to your main inbox. For example, you can use one alias for online shopping and another for signups. If one alias gets exposed or starts receiving spam, you can disable it without affecting your primary email account. For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com
Cyberattacks today often focus on personal data like emails and photos, which can be used to expose or manipulate victims. (Philip Dulian/picture alliance via Getty Images)
8) Use passkeys where available
Passkeys replace passwords with a secure login tied to your device or biometrics. They cannot be reused or phished, which makes them one of the safest ways to protect your accounts today.
Kurt’s key takeaways
The U.S. is facing capable cyber adversaries. Hacker groups have shown they can keep pushing, adapt quickly and target both institutions and individuals. At the same time, the most common entry point is still simple. A weak password. An old email account. A moment of inattention. That means the first line of defense is not just government agencies. It is you.
What’s one thing you’ve done or haven’t done to protect your accounts that still worries you? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
The best deals we’ve found from Amazon’s Big Spring Sale (so far)
Amazon loves to manufacture an event. March is historically a dry spell for deals; however, with Amazon’s third annual Big Spring Sale, which runs through March 31st, the retail behemoth is hoping to lure in would-be shoppers with the promise of steep(ish) savings and discounts on more seasonal, spring-centric items to hold folks over until Prime Day surfaces at the onset of summer.
The bulk of the deals we’re seeing right now aren’t quite on par with Black Friday or Prime Day, and, as with most shopping events, not everything on sale is worth picking up. That said, Amazon’s latest sale is one of the first big opportunities we’ve seen this year to save — and bypass some tariff-induced pain — especially since some of our favorite gadgets are currently matching their lowest prices to date, including headphones, robot vacuums, and a slew of charging accessories.
To help you sift through it all, we’re focusing squarely on the gadgets that are actually worth picking up, many of which we’ve tested and recommend even at full price. You’re not limited to Amazon, either. Retailers like Best Buy and Walmart are offering the same deals in a lot of cases, meaning you don’t necessarily need to succumb to shopping at the so-called “Everything Store” just to save a buck (or 50).
Headphone and earbud deals
Streaming and soundbar deals
Fitness tracker and smartwatch deals
Other Verge-approved deals
Update, March 28th: Adjusted to reflect current pricing / availability and several new deals, including those for Apple’s latest entry-level iPad, the Breville Barista Express, and JBL’s Flip 7 speaker.
Technology
Why that $4 charge on your statement could be fraud
NEWYou can now listen to Fox News articles!
A $4 charge is easy to ignore. It might appear as a parking fee, a small purchase or a vague merchant name that doesn’t raise any red flags. Consumer protection groups and law enforcement say scammers are counting on that.
Recent warnings describe a pattern sometimes called “ghost tapping,” where small, unfamiliar charges show up on contactless payment cards without a clear point of purchase. The amounts are easy to miss, but they can signal unauthorized access to your payment method rather than a simple billing error.
Sign up for my FREE CyberGuy Report. Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
GHOST-TAPPING SCAM TARGETS TAP-TO-PAY USERS
A small, unfamiliar charge can be the first sign your payment details are being tested without your knowledge. (Leonie Asendorpf/picture alliance via Getty Images)
How does ghost tapping work?
Better Business Bureau (BBB) warnings use the term “ghost tapping” to describe these incidents in consumer alerts. In simple terms, it means a payment can be triggered without you actively making a purchase.
One reported method involves compromised payment terminals that quietly process low-value contactless charges. Another involves unauthorized NFC readers operating at close range, sometimes in crowded places. In these cases, a card or mobile wallet can be charged within inches.
Because these transactions run through standard contactless payment networks, they appear as normal card-present purchases. There is usually no clear sign on your statement that anything was wrong.
The small charges aren’t arbitrary
Low-dollar transactions are used to confirm that a card can be charged without being declined. When a small charge goes through, it signals that the payment details are active and usable. Once that charge goes through, it establishes a working payment path. Scammers can then run additional transactions using the same card details, sometimes across different merchants or terminals. Many people only notice these charges after they post to an account. At that point, the transaction appears as a completed purchase, not a pending authorization.
Why acting quickly matters
This means a charge that looks harmless could actually be the first step in a larger fraud attempt. Over time, these fraudulent charges may extend beyond a single card. If your payment details have been exposed or are stored in a compromised system, they can be reused until you cancel the card. That can result in multiple charges over several days or even billing cycles.
Delays in reporting also affect how quickly you can stop fraud. The Federal Trade Commission (FTC) advises you to report unauthorized charges as soon as they are identified. In practice, that means contacting your card issuer as soon as you see a charge you don’t recognize, either through the issuer’s app or customer service line.
Credit cards typically offer stronger fraud protections than debit cards, where money may be withdrawn directly from your bank account. Under federal law, liability for unauthorized credit card charges is limited, but those protections depend on when you report it.
Scammed? What federal agencies say to do next
If you spot a charge you don’t recognize, acting quickly can limit damage and protect your rights under federal law.
Review transactions as they post
The FTC recommends checking account activity regularly and flagging any unfamiliar charges as soon as they appear.
Contact your card issuer immediately
The Consumer Financial Protection Bureau (CFPB) advises reporting the charge right away and opening a dispute through your issuer’s app or customer service line.
Submit a formal dispute within 60 days
To preserve protections under the Fair Credit Billing Act, you must send a billing error notice within 60 days of the statement that includes the charge.
Understand the investigation timeline
Card issuers must acknowledge your dispute within 30 days and resolve it within two billing cycles, typically no more than 90 days.
Confirm the charge details before disputing
Check the merchant name, date and amount, since some transactions may appear under payment processors or parent companies.
Replace or block the card if needed
If the charge is unauthorized, the issuer can cancel the card and issue a replacement to stop further transactions.
Scammers often use small charges to confirm your card works before making larger unauthorized transactions. (Clara Margais/picture alliance via Getty Images)
Simply keeping an eye on your accounts may not be enough
Even if you check your statements regularly, small charges can still slip through and delay detection.
Timing can work against you
A lot hinges on when you check your account. If you review transactions infrequently or rely on monthly statements, unauthorized charges may only surface after they’ve already posted. By then, multiple transactions can appear across different dates or merchant names, making them harder to spot.
Alerts don’t always catch small charges
Notifications are not always consistent across accounts. Some banks alert you only after a transaction is completed, while others set thresholds that don’t flag low-dollar amounts. That can allow small charges to slip through without notice. If the same payment details are used elsewhere, activity may not appear in one place.
Ways to protect yourself from ghost tapping
These simple steps can help reduce your risk and catch suspicious charges before they turn into bigger fraud.
1) Turn on transaction alerts
Set up real-time alerts for all charges, even small ones, so you can spot suspicious activity immediately.
2) Use mobile wallets when possible
Apple Pay and Google Pay use tokenization, which means your real card number is not shared with merchants.
3) Keep your card secure in crowded places
Contactless cards can be read at close range, so avoid leaving them exposed in busy environments.
4) Check your accounts more frequently
Do not rely on monthly statements. Review transactions every few days to catch issues early.
How broader monitoring can help
Even with these steps, some suspicious activity may not show up in one place or right away. That’s where broader monitoring comes in. Identity and credit monitoring services are designed to track changes tied to your financial and personal information as they happen. This can include transaction monitoring along with three-bureau credit monitoring, so activity linked to your identity can be seen across accounts and credit files at the same time. That includes new inquiries, account openings and changes that would not appear in any one banking app.
Some services also scan known data breach records and dark web marketplaces for exposed personal information. If your data appears in those sources, you can receive an alert tied to the specific identifier that was found.
HOW DEBIT CARD FRAUD CAN HAPPEN WITHOUT USING THE CARD
If suspicious activity is detected, many platforms offer tools to take action quickly. This may include locking your credit file and working with a U.S.-based fraud resolution team to contact card issuers, dispute charges and close affected accounts.
Some identity protection services also include insurance coverage, often up to $1 million per adult, to help cover eligible losses and legal fees, along with 24/7 fraud resolution support to help restore your identity.
No service can prevent every kind of identity theft. If it happens, monitoring and guided support can make recovery easier to manage.
How to check if your personal information was exposed
If you are unsure whether your personal information has already been exposed, take action now. Our No. 1 identity theft protection pick includes a free identity breach scan, which allows you to see whether your data appears in known leaks. Early detection gives you more control and helps you respond before fraud spreads.
See my tips and best picks on Best Identity Theft Protection at Cyberguy.com.
Catching a suspicious charge early and reporting it quickly can help stop further fraud before it escalates. (M. Scott Brauer/Bloomberg via Getty Images)
Kurt’s key takeaways
A small charge is easy to ignore, especially when it blends in with everyday purchases. But as these reports show, that’s exactly what scammers are counting on. A few dollars can be the first sign that your payment details are active and vulnerable, giving attackers a way to test and expand access without raising alarms.
The sooner you catch it, the easier it is to stop. This is one of those situations where habits matter. Checking your transactions regularly, acting quickly on anything unfamiliar and adding an extra layer of monitoring can make a real difference. Fraud doesn’t always start big, but it often starts small.
Have you ever spotted a small charge you almost ignored that turned out to be fraud, and how did you handle it? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report. Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
-
Sports1 week agoIOC addresses execution of 19-year-old Iranian wrestler Saleh Mohammadi
-
New Mexico7 days agoClovis shooting leaves one dead, four injured
-
Miami, FL3 days agoJannik Sinner’s Girlfriend Laila Hasanovic Stuns in Ab-Revealing Post Amid Miami Open
-
Tennessee6 days agoTennessee Police Investigating Alleged Assault Involving ‘Reacher’ Star Alan Ritchson
-
Minneapolis, MN3 days agoBoy who shielded classmate during school shooting receives Medal of Honor
-
Technology1 week agoYouTube job scam text: How to spot it fast
-
Politics1 week agoSchumer gambit fails as DHS shutdown hits 36 days and airport lines grow
-
Science1 week agoRecord Heat Meets a Major Snow Drought Across the West