Connect with us

Technology

EcoFlow’s Power Hat is a floppy, phone-charging solar panel for your noggin

Published

on

EcoFlow’s Power Hat is a floppy, phone-charging solar panel for your noggin

EcoFlow’s new Power Hat must be the dorkiest piece of headgear I’ve ever heard of — and I think I love it? It’s a wide-brimmed floppy-ish sun hat full of solar cells that you can charge your phone with. EcoFlow says it can charge a 4,000mAh smartphone to capacity “in as fast as 3–4 hours.” Sounds ideal for casually scrolling feeds at a campsite or surviving in a sun-blasted, Mad Maxian desert wasteland.

According to EcoFlow’s specs, the $129 Power Hat’s solar cells are made from a thin, flexible material called passivated emitter and rear contact (PERC) monocrystalline silicon. It offers roughly 12-watt charging via the USB-A and USB-C connectors on the underside of the brim. The whole thing weighs 370 grams.

Get a load of these hat-mounted USB ports.
Image: EcoFlow

Oh, and the Power Hat is IP65 rated, meaning it’s dust-proof and can withstand water jets from any direction (although I question whether that holds true if you’re pointing a super soaker at the USB ports). Here’s a promotional video, complete with an inoffensive, vaguely Kings of Leon-sounding soundtrack, which is perfect floppy hat music if my past music festival experience is any indication:

The hat comes in two size ranges. The smaller one is adjustable between 56–58cm (22–22.8 inches) while the larger size is 59–61cm (23.2–24 inches). The Power Hat will be available in preorder until August 31st and EcoFlow says it expects to start shipping them out in mid-September.

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Fox News AI Newsletter: Taco Bell to use Voice AI for drive-thrus

Published

on

Fox News AI Newsletter: Taco Bell to use Voice AI for drive-thrus

Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.

IN TODAY’S NEWSLETTER:

– Taco Bell to expand AI tech at drive-thrus

– Intel shares sink with 15% of workforce getting axed, suspends dividend

– ‘Independence Day,’ ‘Training Day’ directors embrace AI, shut down claims it can replace humans

– AI giant Nvidia faces calls from progressive groups for an antitrust probe

Advertisement

Yum! Brands says it is expanding its AI-powered voice technology at Taco Bell drive-thrus in the U.S. (Mike Kemp/In Pictures via Getty Images)

ORDER UP: Yum! Brands on Wednesday announced it will be expanding its artificial intelligence-powered voice technology at hundreds of Taco Bell drive-thrus across the U.S.

TECH WRECK: Intel CEO says he misjudged the boom that has created a windfall for chipmakers, such as Nvidia, that are leading the AI race for next generation technology.

Demand for AI chips from the likes of Nvidia has shifted away from non-AI products, cutting Intel’s sales by 1% to $12.8 billion.

Demand for AI chips from the likes of Nvidia has shifted away from non-AI products, cutting Intel’s sales by 1% to $12.8 billion. (REUTERS/Fabian Bimmer)

HUMAN ACTION: Roland Emmerich and Antoine Fuqua, the directors behind hits like “Independence Day” and “Training Day,” respectively, shared their feelings on AI at Comic Con last weekend.

‘AGGRESSIVELY PROPRIETARY’: Sen. Elizabeth Warren and 10 progressive groups sent a letter to the Justice Department to launch an antitrust investigation against AI chip giant Nvidia over its business practices.

Advertisement
Nvidia sign

Sen. Elizabeth Warren and progressives are taking issue with what they see as Nvidia’s outsized influence in the AI chip market. (Justin Sullivan/Getty Images)

Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

Advertisement

Fox News
Fox Business
Fox Weather
Fox Sports
Tubi

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Advertisement

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Advertisement
Continue Reading

Technology

Trap backs itself into every corner

Published

on

Trap backs itself into every corner

Trap’s premise sounded tailor-made to play into M. Night Shyamalan’s twisty strengths and maybe even say something about the modern era of superstars turning their concerts into cinematic events. But for all of its promise, the thriller almost immediately runs out of steam. Shyamalan’s latest is a convoluted misfire whose handful of interesting ideas isn’t nearly enough to keep it from feeling like a notable low point in the director’s filmography.

In its first act, Trap introduces mild-mannered father Cooper Adams (Josh Hartnett) and his daughter Riley (​​Ariel Donoghue) as the pair make their way downtown to see superstar Lady Raven (Saleka Shyamalan) perform in concert. Though Cooper himself doesn’t quite get the singer’s appeal, she’s everything to his daughter. And with Riley dealing with some friend drama at school, Cooper’s all too happy to take her mind off things with a few hours of live music.

Almost everyone who meets the Adamses sees them as just another father-daughter duo hyped up to see the show. Cooper has a secret, though — he’s a serial killer who has his next victim trapped in a dungeon. You can feel the influence of series killer dramas like You and Dexter in the way Trap juxtaposes moments of familial banality with shots of Cooper sneaking furtive, twitchy glances at his phone to watch a livestream of the man he plans to murder next. But the Shyamalan twist of it all comes early on as Trap establishes how the Lady Raven concert is actually an elaborate ploy to smoke Cooper out.

Trap takes inspiration from Operation Flagship, the 1985 sting operation in which US marshals and DC police lured wanted criminals to the Washington Convention Center with the promise of free football tickets. Shyamalan riffs on that real history to imagine how a Taylor Swift-like concert filled with thousands of screaming teens could be weaponized against a monster. But as Trap works through that thought exercise, the movie is quickly boxed in by its core conceit.

Part of the problem is how Trap stretches credulity even for a Shyamalan movie as Cooper uses his constant “trips to the merch table” to learn more about how the police plan to catch him. The cops are pulling men out of the audience, and they aren’t letting people leave without being interviewed. But none of those dangers ever feel especially pressing for Cooper because of how effortlessly he’s able to skirt by them thanks to the plot armor Shyamalan piles onto him out of necessity.

Advertisement

You’re meant to read the strangeness of Cooper’s behavior as a part of his sociopathy, repeatedly slipping away from his daughter on the concert floor. Cooper has to slip away in order for the movie to really move. Otherwise, things would come to an end rather abruptly. But Trap becomes harder and harder to take seriously as Cooper’s situation pushes him to take a series of increasingly absurd — but not exactly exciting — chances on ploys to evade capture.

There’s an absurdity to the way Cooper is able to navigate Trap’s game of cat and mouse that almost feels like Shyamalan is trying to say something about what kind of people are seen as threats to society. As Cooper, Hartnett’s utterly devoid of charisma, and there’s an awkwardness to his interactions with Riley that doesn’t entirely feel intentional. But he’s a handsome white guy, and that seems to be enough to keep people from clocking his overt weirdness.

If fewer of Cooper’s tricks to escape — which serve as the film’s set pieces — came by way of convenient happenstance, Trap might work a bit better as a straight thriller about a predator becoming prey. But the movie goes to such absurd lengths to keep its story going that it definitely feels like Shyamalan ran out of solid ideas early on.

Everything about Trap, from its story to the way it also works as a vehicle for his daughter’s career as a musician, makes it feel like exactly the kind of project you might expect from Shyamalan, who has often self-financed his films since 2015. The director himself cameos as Lady Raven’s uncle and becomes part of the story in a way that connects him to Cooper’s search for an exit. But Shyamalan’s presence in the film is somewhat distracting and has a way of drawing attention to how many of Trap’s characters speak to the camera with a cloyingness the director tends to be very fond of.

Conceptually, this is one of Shyamalan’s most intriguing films, but its foundation is so limiting that it winds up feeling like the director set a trap for himself. It’s a testament to his ability to come up with novel ideas — but that alone isn’t always enough to make for a good time at the movies.

Advertisement
Continue Reading

Technology

4.3 million Americans exposed in massive health savings account data breach

Published

on

4.3 million Americans exposed in massive health savings account data breach

Health savings account (HSA) provider HealthEquity experienced a massive data breach that has put over 4.3 million Americans’ information at risk. 

The company, which specializes in providing HSAs, flexible spending accounts (FSAs), health reimbursement arrangements (HRAs) and 401(k) retirement plans, confirmed threat actors stole sensitive health data using a partner’s compromised credentials. 

This includes full names, home addresses, telephone numbers, employer and employee IDs, Social Security numbers and more.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Illustration of a hacker at work. (Kurt “CyberGuy” Knutsson)

Advertisement

What you need to know about the HealthEquity data breach

HealthEquity has confirmed that it suffered a data breach in which the personal information of millions of Americans was compromised. In a Form 8-K filing submitted on July 2, the company disclosed that hackers gained access to this sensitive health data after using a partner’s compromised credentials.

HealthEquity became aware of the systems anomaly on March 25, and the investigation continued until June 10.  The company’s data breach notice reads in part:

“We discovered some unauthorized access to and potential disclosure of protected health information and/or personally identifiable information stored in an unstructured data repository outside our core systems. On June 26, 2024, after validating the data, we unfortunately determined that some of your personal information was involved.”

As for notifications, the company tells us that the process for notifying customers — both businesses and individuals — is ongoing. Affected individuals will receive a notification by mail or email based on their account communications preferences.

The company says that the affected data was sign-up information for accounts and benefits that it administers. The data may include information in one or more of the following categories: first name, last name, address, telephone number, employee ID, employer, Social Security number, health card number, health plan member number, dependent information (for general contact information only), HealthEquity benefit type, diagnoses, prescription details, payment card information (but not payment card number) and/or HealthEquity account type. Not all data categories were affected for every member.

Advertisement

HealthEquity says it is not aware of any actual or attempted misuse of the information due to this incident to date. We reached out to HealthEquity, and a representative from the company provided CyberGuy with this statement: 

“The entire Purple Team is committed to educating, assisting and supporting our partners, clients and members through this incident. We have taken immediate, proactive and prudent action since we first discovered an anomaly with our third-party vendor. This included quickly resolving the issue, bringing together a team of outside and internal experts to investigate, and preparing for response. 

“Additionally, we formally filed notification with the Securities and Exchange Commission, which wasn’t required, but represents our concern and commitment to transparent communication. We regret the inconvenience caused by the incident and are working to minimize disruption while also taking steps to help prevent this from happening in the future. Partner and client notifications are underway, and we are thankful for the professionalism and understanding we’re experiencing thus far.” 

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

data breach 2

Illustration of hackers at work. (Kurt “CyberGuy” Knutsson)

HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS

Advertisement

What is HealthEquity doing about the data breach?

HealthEquity says it has secured the affected data repository. The vendor’s user accounts, which had access to an online data storage location, were compromised, allowing hackers to access data stored in that location. HealthEquity has disabled all potentially compromised vendor accounts, terminated all active sessions and blocked all IP addresses linked to the threat actor’s activity. The company has also implemented a global password reset for the impacted vendor.

The HSA provider has also arranged credit identity monitoring, insurance and restoration services for those impacted. These services will be available for two years, free of charge, through Equifax.

CLICK HERE FOR MORE U.S. NEWS

data breacj 3

Illustration of a hacker. (Kurt “CyberGuy” Knutsson)

WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM

8 measures to take to protect yourself from a data breach

If you suspect you’ve been impacted by this data breach, follow these steps to protect your personal data and privacy.

Advertisement

1. Invest in identity theft protection: If you have been affected by a data breach, scammers may try to impersonate you to gain access to your private information. The best thing you can do to protect yourself from this type of fraud is to subscribe to an identity theft service.

Identity theft companies can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

2. Invest in removal services: Investing in removal services is beneficial, particularly in the wake of data breaches like the recent one experienced by HealthEquity. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

3. Place a fraud alert: Contact one of the three major credit reporting agencies (Equifax, Experian or TransUnion) and request a fraud alert to be placed on your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification.

4. Be cautious of phishing attempts: Be vigilant about emails, phone calls or messages from unknown sources asking for personal information. Avoid clicking on suspicious links or providing sensitive details unless you can verify the legitimacy of the request.

Advertisement

The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.

5. Check Social Security benefits: It is crucial to periodically check your Social Security benefits to ensure they have not been tampered with or altered in any way, safeguarding your financial security and preventing potential fraud.

6. Change your password: You can render a stolen password useless to thieves simply by changing it. Opt for a strong password — one you don’t use elsewhere. Even better, consider letting a password manager generate one for you.

7. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.

Advertisement

8. Contact the U.S. Federal Trade Commission: If you detect any unauthorized transactions in any of your financial accounts, you should immediately notify the appropriate payment card company or financial institution. If you detect any incidents of identity theft or fraud, promptly report it to your local law enforcement authorities, state attorney general and the Federal Trade Commission.

PHARMA GIANT’S DATA BREACH EXPOSES PATIENTS’ SENSITIVE INFORMATION

Kurt’s key takeaway

The HealthEquity data breach highlights the need for strong cybersecurity practices, especially when it comes to protecting personal and health information. If you’re affected by this breach, it’s important to take action. Monitor your accounts and personal information for any unusual activity. Staying vigilant can help protect you from identity theft and financial fraud.

Do you feel confident in the measures HealthEquity is taking to protect your data going forward? Let us know by writing us at Cyberguy.com/Contact

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Continue Reading

Trending