Connect with us

Technology

DoorDash launches Zesty, an AI app for finding local food

Published

on

DoorDash launches Zesty, an AI app for finding local food

NEWYou can now listen to Fox News articles!

DoorDash wants to help you decide where to eat, not just how your food arrives. The company has launched Zesty, a new artificial intelligence-powered social app built to make finding local restaurants faster and easier. 

Zesty is now in public testing in the San Francisco Bay Area and New York. Instead of scrolling through endless reviews, menus and social videos, the app lets you ask an AI chatbot for recommendations in plain language.

Think of it as a digital concierge for food discovery.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

How Zesty works

Once you open Zesty and sign in with your DoorDash account, the experience feels familiar and simple. You see nearby restaurants and a chat box where you can type exactly what you want. DoorDash says users can ask prompts like:

The app blends AI search with social discovery, showing photos, comments, and saved spots shared by other diners.    (Kurt “CyberGuy” Knutsson)

HOW RESTAURANT RESERVATION PLATFORM OPENTABLE TRACKS CUSTOMER DINING HABITS

  • A low-key dinner in Williamsburg that’s good for introverts
  • Brunch spots good for groups
  • Romantic dinner with a vintage feel

The AI then curates recommendations by pulling information from DoorDash data, Google Maps, TikTok, Reddit and other sources. According to DoorDash co-founder Andy Fang, the goal is to surface the best suggestions from across the web in one place. Each recommendation includes context such as ratings, social buzz and where the suggestion came from. DoorDash says the results do not imply sponsorships or paid placements.

A social network built around food

Zesty also adds a social layer. Users can post photos, leave comments, follow other diners and share saved spots with friends. If you find a restaurant that looks promising, you can bookmark it for later or send it to someone planning dinner with you. This makes Zesty feel less like a search engine and more like a food-focused social network. It is designed for people who enjoy discovering places through other people’s experiences, not just star ratings. For DoorDash, this is a clear shift toward community-driven discovery.

Why DoorDash built Zesty

DoorDash wants to remove friction from the decision process. Instead of bouncing between Google, TikTok, Yelp and delivery apps, Zesty aims to bring everything together in a single guided experience. That approach also aligns with a broader trend. More people already use AI tools like ChatGPT and Gemini to plan meals and trips. Zesty aims to offer that same convenience with a strong local and social focus.

Advertisement

Zesty lets users ask for restaurant recommendations in natural language instead of scrolling through endless reviews and menus. (Smith Collection/Gado/Getty Images)

“At DoorDash, we’re always looking for new ways to help people connect with the best of their communities,” a company spokesperson told CyberGuy. “We’re piloting an app called Zesty to make it easier to discover great nearby restaurants, coffee shops, bars, and more through personalized search and social sharing. Zesty is now in public beta in San Francisco and New York, and we’re excited to learn from early testers as we keep shaping what local discovery can look like.”

Of course, Zesty faces an uphill climb. Many users already rely on Google Maps or existing social apps to find restaurants. Some may not want to download another standalone app, even if it promises better recommendations. Still, Zesty could appeal to users who enjoy food discovery as a social activity. For them, a dedicated network built around local dining may feel more useful than generic search results. DoorDash appears willing to test that idea and see how users respond. For now, the company is focused on getting people to use the app, learning what works, and fine-tuning its matching engine. Once that experience feels right, Zesty will expand to more cities.

WOULD YOU EAT AT A RESTAURANT RUN BY AI?

Part of DoorDash’s bigger expansion plan

Zesty is not an isolated experiment. It fits into DoorDash’s broader push beyond food delivery. Earlier this year, DoorDash rolled out features for in-person dining reservations and in-store rewards. The company also continues to invest heavily in automation and AI-driven logistics. 

Advertisement

We reported a few months ago on another major innovation from DoorDash: Dot, its fast new autonomous delivery robot. Dot is designed for short local trips and runs on an AI-powered delivery platform that decides whether an order should be handled by a Dasher, a robot or another method. Together, Zesty and Dot show how DoorDash is trying to own more of the local commerce experience, from discovery to delivery.

What this means to you

If you enjoy trying new restaurants, Zesty could save you time and decision fatigue. Instead of reading dozens of reviews, you can ask for exactly what you want and get curated suggestions instantly. For casual diners, the app may feel unnecessary if Google already works fine. For food lovers who like sharing finds and following others with similar tastes, Zesty could become a useful daily tool. It also signals where local discovery may be heading. AI-driven recommendations paired with social proof could soon replace traditional review hunting.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Zesty is now in beta in San Francisco and New York as DoorDash tests and refines its personalized matching experience. (iStock)

Kurt’s key takeaways

Zesty shows DoorDash experimenting with how people choose where to eat, not just how food gets delivered. By combining AI search with social sharing, the company is testing a more conversational and community-driven approach to local discovery. Whether Zesty becomes essential or stays niche will depend on how well it delivers meaningful recommendations. Still, it highlights DoorDash’s growing ambition to shape more parts of our everyday local life.

Advertisement

Would you trust an AI-powered social app to pick your next favorite restaurant, or do you still prefer finding places the old-fashioned way? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement

Technology

Microsoft is ending the Windows Update nightmare — and letting you pause them indefinitely

Published

on

Microsoft is ending the Windows Update nightmare — and letting you pause them indefinitely

While Microsoft isn’t doing away with automatic updates entirely, Windows boss Pavan Davuluri is promising that in future, you’ll be able to pause them “for as long as you need.” You’ll be able to reboot or shut down your computer “without being forced to install them.” To be fair to Microsoft, I’ve seen an option to reboot or shutdown without updating for a while now.

Even if you fail to pause them, you’ll only have to reboot your computer once a month, Microsoft promises — though its says you’ll be able to get updates faster if you wish. If you’re the kind of user who wants new features so quickly that you’re part of the Windows Insider Program, Microsoft says it’ll make that easier and make it clearer what you’ll get.

And as part of those updates, Microsoft says that this year, it will improve performance, responsiveness and stability, reduce memory consumption, make File Explorer and other apps launch and run faster, reduce crashes, improve drivers, make devices wake up more reliably, and much, much more.

It feels like Microsoft has also taken our feedback about the recent ridiculous hour-plus setup process for some Windows handhelds and laptops to heart. Davuluri writes that we’ll have “the ability to skip updates during device setup to get to the desktop faster.” And even if you sit through, there should be “fewer pages and reboots to getting started is simpler.” Plus, Microsoft will finally let you use gamepad controls to create your PIN during setup, instead of making you smudge the touchscreen.

Bravo, Microsoft, if this is all true, and if you can implement it in a reasonable length of time.

Advertisement

Davuluri writes that his team has spent months analyzing the feedback of Windows users, and “What came through was the voice of people who care deeply about Windows and want it to be better.”

Continue Reading

Technology

Hospital cyberattacks threaten patient safety

Published

on

Hospital cyberattacks threaten patient safety

NEWYou can now listen to Fox News articles!

If you watched a recent episode of “The Pitt” on Max, a streaming medical drama about life inside a high-pressure emergency department, you saw how quickly a hospital can spiral during a cyberattack. It made for gripping television. But in Mississippi, it was not a script. It was real life.

After a ransomware attack hit the University of Mississippi Medical Center, clinics across the state closed. Elective procedures were canceled. Phone systems and emails went down. Emergency care continued, but access to electronic medical records was disrupted.

When a hospital’s systems fail, the impact goes far beyond IT. It affects real people waiting for care. That is why hospital cyberattacks are no longer just a tech problem. They are a public safety issue.

Sign up for my FREE CyberGuy Report

Advertisement

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

FIGURE DATA BREACH EXPOSES NEARLY 1M ACCOUNTS

A ransomware attack can lock hospital systems in seconds, disrupting access to critical medical records and patient care. (iStock)

Why hospitals have become prime targets

Hospitals cannot afford downtime. When systems fail, patient care is immediately affected, and the pressure to restore operations is intense. Ricardo Amper, founder and CEO of Incode Technologies, a digital identity verification and biometric authentication company, explains the reality.

“Hospitals are in a uniquely difficult position. If systems go down, patient care is immediately affected. That creates real pressure to restore operations fast, which is why ransomware groups often target healthcare.” He points to another major factor driving hospital cyberattacks. “Hospitals hold some of the most sensitive data that exists, including medical records, identity information and insurance details. That combination of urgency and high-value data makes them very attractive targets.”

Advertisement

Healthcare systems also rely on vendors and service providers. One weak link can open the door. “In healthcare, you’re only as secure as the entire ecosystem around you,” Amper said.

How AI-powered impersonation is changing the game

Many people imagine hackers breaking through firewalls. That still happens. But today, attackers often target people instead of systems. “What we’re seeing more and more is that attacks aren’t always about breaking into systems, they’re about tricking people,” Amper said.

Artificial intelligence (AI) has made impersonation easier and scalable. Criminals can clone voices, generate convincing emails or create deepfake videos that appear to come from a trusted doctor, vendor or IT administrator. “AI doesn’t replace social engineering, it supercharges it.”

In practical terms, that might mean an employee receives what looks like a legitimate request to reset a password or approve a login. One click can open the door. “An employee is tricked into giving up credentials or approving a fraudulent authentication request. The attacker logs in as a legitimate user, and from there, they move quietly through internal systems,” Amper explained. Because the activity appears to come from a real employee, it may go undetected until significant damage is done.

5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK

Advertisement

Healthcare workers operate in high pressure environments, which makes social engineering and impersonation attacks more effective. (Paul Bersebach/MediaNews Group/Orange County Register/Getty Images)

Why hospitals are especially vulnerable to cyberattacks

Inside a hospital, speed matters. Decisions happen quickly, and staff move from one urgent task to the next. That constant pressure creates opportunities for attackers who rely on deception. “Healthcare professionals are focused on patients, not cybersecurity. They work in high-pressure environments where speed matters. That urgency can make it easier for attackers to exploit trust or distraction,” Amper said.

Many hospitals also operate with legacy systems layered over time. Security was often added after the fact rather than built in from the start. That complexity increases risk. He also challenges how leaders think about the problem. “One misconception is thinking of cybersecurity as just an IT problem,” Amper said.

Today’s hospitals depend on digital systems for intake, diagnostics and billing. When those systems fail, care delivery suffers. “Cybersecurity today is fundamentally about operational resilience. It’s about keeping the hospital running safely and continuously.”

What happens to your data after a breach

When a hospital is breached, the exposed data often goes beyond a credit card number. “Breaches can expose medical histories, Social Security numbers, insurance information, billing details and contact data,” Amper said.

Advertisement

That combination is powerful. Criminals can use it for identity fraud, insurance fraud and highly targeted scams. Unlike a credit card, a medical identity cannot simply be replaced. “Stolen medical data can’t simply be canceled and replaced. That makes it especially valuable and long-lasting in criminal markets.”

The impact may not show up right away. “The impact isn’t always immediate; it can surface months or even years later.”

When hospital networks are breached, sensitive medical histories, identity details and insurance data can be exposed for years. (iStock)

How hospitals can strengthen defenses

Identity now sits at the center of cybersecurity. “Identity has become the front line of cybersecurity. If an attacker can successfully impersonate a trusted user, many traditional defenses can be bypassed,” Amper said. Stronger identity verification, layered authentication and systems that can detect impersonation or deepfakes are becoming essential. The more certain a hospital is about who is accessing its systems, the harder it becomes for attackers to move quietly.

How to check if your information is on the dark web

After a hospital breach, many patients worry about whether their data has been sold or shared. One simple step is checking whether your email address appears in known data breaches. You can visit haveibeenpwned.com and enter your email address into the search bar. The site will show whether your information has appeared in past breaches tied to that email. If your email appears in a breach, take action immediately. Change passwords for affected accounts and make sure each account uses a unique password.

Advertisement

What patients should do after a hospital breach

If you receive a breach notification letter, do not panic. But do act. Amper offers clear guidance. “First, stay calm but take it seriously. Read the notice carefully and enroll in any credit or identity monitoring services offered.”

Then take practical steps right away:

  • Review insurance statements for unfamiliar claims
  • Check medical records for incorrect diagnoses or procedures
  • Monitor your credit reports
  • Consider placing a free credit freeze with the major credit bureaus if your Social Security number was exposed
  • Enable two-factor authentication (2FA) on email, financial and healthcare accounts wherever it is available
  • Be cautious of emails or calls referencing the breach
  • Reducing the amount of personal information available on data broker sites with a data removal service can also limit how easily scammers craft convincing follow-up attacks using your real details. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

“If something feels off, contact the hospital directly using official contact information. Don’t rely on links or numbers provided in unexpected messages.” He adds one final reminder. “Take your medical identity as seriously as your financial identity. Monitor your records, question anything unfamiliar and stay alert.”

Protect your accounts from long-term damage

Even if everything appears normal right now, take steps to secure your accounts. Credential leaks often surface weeks or months later.

  • Consider identity theft protection. Identity monitoring services can alert you if criminals try to open accounts in your name or misuse your personal information. See my tips and best picks on Best Identity Theft Protection at Cyberguy.com
  • Stop reusing passwords immediately. If attackers gain access to one working login, they often test it across dozens of websites automatically.
  • Change reused passwords first, starting with email, financial and cloud accounts. Each account should have its own unique password.
  • Consider using a password manager to generate and store strong passwords securely. You can also use breach scanning tools that alert you if your email address or passwords appear in future leaks. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
  • Install strong antivirus software on your devices to help detect malware, phishing links and credential-stealing threats that could target you after a breach. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

Taking these steps now can prevent a hospital breach from turning into long-term identity damage later.

Kurt’s key takeaways

When hospital cyberattacks disrupt care, the consequences ripple across entire communities. Appointments get canceled. Surgeries are delayed. Families worry. This is not only about stolen records. It is about trust in the healthcare system. Technology has transformed medicine. It has also created new risks. The challenge now is building resilience into every layer of care. Because the next cyberattack will not feel like a TV episode. It will feel personal.

And that raises an uncomfortable question. If your local hospital went offline tomorrow, would you trust that your medical identity and your care are truly protected? Let us know by writing to us at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Valve’s huge SteamOS 3.8 update adds long-awaited features — and supports Steam Machine

Published

on

Valve’s huge SteamOS 3.8 update adds long-awaited features — and supports Steam Machine

Not only is it the first release to support the upcoming Steam Machine living room gaming PC, it comes with long-awaited features for Valve’s handhelds and more support for other companies’ handhelds than we’ve seen to date — including Microsoft and Asus’ Xbox Ally series, the Lenovo Legion Go 2, the OneXPlayer X1, and additional support for MSI, GPD, Anbernic, OrangePi, and Zotac.

The one that excites me most: Valve is adding genuine hibernation and “memory power down” modes to the Steam Deck — though just the LCD model to start — which should help extend battery life when you hit the power button or leave them idle. Some Windows machines currently last longer than the Steam Deck when asleep, because they self-hibernate to save power, while the Steam Deck has an instant-on sleep mode.

Plus, Valve has finally added a setting in its gaming mode to let you use your Bluetooth headset microphones — something I’ve been asking for since the beginning. (Valve did add it to the Linux desktop mode last year.) And the Steam Deck LCD is finally getting Bluetooth Wake re-enabled, so you can turn on your TV-connected Deck with a wireless controller from your couch.

The update comes with all sorts of improvements for the Linux desktop modes that sound like they’ll come in handy on a Steam Machine plugged into a TV or monitor, too, including desktop HDR, VRR display support, per-display scaling, “improved windowing behavior for games running in Proton,” and an upgrade to KDE Plasma 6.4.3 among other things.

And for a Steam Machine or Steam handheld plugged into a home entertainment system, they can now detect how many audio channels you have over HDMI to enable surround sound. (I believe surround sound was already a thing, so perhaps this is just a different and better automatic implementation.)

Advertisement

There’s also a new Arch system base and an updated graphics driver.

Perhaps most surprisingly, the “Non-Deck” section of the changelog is huge. Valve says long-pressing your power button should work “across a wide variety of devices” to power off, restart, or switch to the desktop mode. You should be able to change your processor’s power modes on the Xbox Ally now, and night mode and screen color settings should work on AMD Z2 Extreme handhelds in general.

There’s also “Greatly improved video memory management with discrete GPU platforms,” you can limit how far the battery charges in any of the Lenovo Legion Go handhelds (in desktop mode), and it should fix “washed out colors for Zotac and OneXPlayer handhelds with OLED.”

There’s a lot in this update, and it’s possible I missed a feature you care about, so check out the whole changelog here and below.

Advertisement
Continue Reading

Trending