Apple has confirmed a product launch on February 19th, and we think it’ll be the new iPhone SE. That could mark a major shake-up to the company’s affordable iPhone line, adding in Face ID and killing off the classic home button.
Technology
Energy-saving scam uses Elon Musk’s name – Here’s the truth

Elon Musk, known for leading companies like Tesla, SpaceX, Neuralink and xAI and buying and rebranding Twitter as X, often finds his name linked to innovation and futuristic ideas. But his reputation also makes him a prime target for scammers.
In the past, fraudsters have used Musk’s name in cryptocurrency schemes. Now, a new scam is making the rounds. This time, scammers are promoting bogus “energy-saving” devices, falsely associating Musk with these products to gain credibility. These devices, which don’t work as advertised, are being marketed as revolutionary solutions, duping people into spending money on what is essentially a scam.
We received this email from Rick in Wilkesboro, North Carolina: “I’ve been receiving emails offering an energy-saving device developed by Elon Musk. It claims the device can reduce energy bills by 50%. I never attempted to contact anyone associated with Elon Musk, nor have I done any internet searches for such a device. Are these emails legit or another attempt by scammers hoping I click on their links?”
GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE
Rick, it sounds like those emails are likely scams. There have been numerous reports of scammers using Elon Musk’s name to promote fake energy-saving devices. These scams often claim that the device can drastically reduce energy bills, but there is no evidence that Elon Musk or any of his companies are involved in such products.
Let’s dive into how this scam works and share some ways you can stay safe.
Illustration of a scammer at work (Kurt “CyberGuy” Knutsson)
How does Elon Musk’s energy-saving scam work?
The Elon Musk energy-saving scam works by using flashy online ads, unsolicited emails and other deceptive tactics to lure victims. Scammers promote so-called “revolutionary” devices through social media, pop-ups, emails and even search engine ads, claiming the products are backed by Musk.
These ads often include fake customer reviews, exaggerated claims of slashing electricity bills by 50% or more and time-limited discounts to create urgency. Names of devices advertised in these scams include the Power Pro Save, Heunwa Power Save, Stop Watt, Miracle Watt, True Watt, Real Watt, Watt Rescue, Esaver Watt, Pro Power Save, Voltmod and more.
Clicking on these ads leads you to sales websites designed to look legitimate. They feature fake logos, doctored before-and-after photos and bogus celebrity endorsements to build trust. The sites throw around pseudo-scientific jargon like “stabilizing electrical currents” or “rebalancing loads” to sound convincing. They also use tactics like showing inflated “regular” prices crossed out to make the current offer seem like a huge bargain.
If you look closely, though, the red flags are clear. These sites lack basic details like a company address, contact number or business registration information. Instead, they push you to place an order through an online form, demanding full payment upfront via credit card or PayPal.
After paying, customers might receive a cheap, non-functional plastic device, or sometimes nothing at all. These devices don’t reduce electricity usage. They might even waste more power. But by the time you realize it, the scammers have already pocketed your money.

Elon Musk scam email ads (Kurt “CyberGuy” Knutsson)
DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX
The truth about energy-saving devices
Over the years, plenty of power-saving scams have promised to cut down or even eliminate your electricity bill by simply plugging in their devices. The reality is that there’s no device you can plug in that will actually reduce your electricity usage or lower your household bill.
These products often claim to “stabilize voltage” or “reduce power waste.” While voltage stabilization can be useful in industrial settings, it doesn’t make much difference for typical home appliances. Most household appliances are already designed to run efficiently without the issues these devices claim to fix.
If you’re serious about saving on electricity, focus on practical solutions like upgrading to energy-efficient appliances, using smart home devices or adjusting your energy usage schedule.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

A person checking email on a phone (Kurt “CyberGuy” Knutsson)
SNEAKY SCAMMERS DRAIN BANK ACCOUNT IN SINISTER PHONE PHISHING SCHEME
Red flags to watch out for
Too good to be true: Claims of reducing energy bills by 50% or more are often exaggerated and unrealistic.
Unsolicited emails: Receiving emails out of the blue, especially when you haven’t shown interest in such products, is a common tactic used by scammers.
Use of celebrity names: Scammers frequently use well-known names like Elon Musk to lend credibility to their schemes.
Suspicious links: Be cautious of clicking on links in unsolicited emails. They can lead to phishing sites designed to steal your personal information. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
10 ways to stay safe from such scams
1. Verify the email: Phishing emails are a common tool scammers use to trick people into buying fake products or giving away personal information. These emails often look like they’re from legitimate sources, but they contain links that lead to fraudulent websites or prompt you to download malicious attachments. Always check the sender’s email address and look for signs of a fake message, like poor grammar or urgent calls to action.
2. Verify claims: If you’re curious about a product, do some research from reputable sources before taking any action.
3. Do not click links: Avoid clicking on any links or downloading attachments from these emails. Instead, hover over the link to see its true destination. This can help you identify if it leads to a legitimate site or a malicious one.
4. Have strong antivirus software actively running on your devices: Ensure you have reliable antivirus software installed on your devices. Antivirus software helps protect your devices from malware, viruses and other security threats. Regularly update the software to ensure it can detect and remove the latest threats. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
5. Examine the website carefully: Scammers often create websites that look professional, but they’re easy to spot with a few simple checks. Look for missing or suspicious information, like the absence of a business address, phone number or business registration details. If there are fake testimonials or celebrity endorsements, that’s a red flag.
6. Don’t fall for “too good to be true” deals: Scammers rely on offering deals that seem too good to pass up, like massive discounts or a “limited time offer.” If an ad claims you can save 50% or more on a product, be skeptical. Real, quality products usually don’t come with such extreme savings, and high-tech devices like those promoted by scammers rarely live up to the hype. If it feels like too good a deal, it probably is.
7. Watch out for unusual payment methods: One of the easiest ways to spot a scam is by how the scammers ask you to pay. If a website asks for payment upfront via credit card or PayPal with no option to verify or ship the product first, it’s a major red flag. Scammers take your money upfront and have no intention of sending you anything of value. Stick to reputable payment methods that offer buyer protection and avoid sites that ask for payment without proper verification.
8. Mark spam email as junk or spam: Most email providers have a feature that allows you to flag spam emails and move them to a separate folder. This can help you filter out spam emails from your inbox and also improve the spam detection of your email provider.
9. Do not share your email address publicly or with unknown sources: This can reduce the chances of your email address being collected by spammers. You can also use a disposable email or email alias for signing up for online services that you do not trust or need.
10. Use a personal data removal service: Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams.
While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
YOUR EMAIL DIDN’T EXPIRE, IT’S JUST ANOTHER SNEAKY SCAM
Kurt’s key takeaway
Impersonation scams are a common way scammers steal your money. They often use well-known names like Elon Musk or big companies like Microsoft and Walmart to make you trust them, then trick you into giving away your financial details. To stay safe, avoid unsolicited emails or texts that promote products or offers. If you need to buy something, stick to trusted sellers like Amazon, Best Buy or other reputable platforms. Always double-check the legitimacy of any offer before making a purchase, especially if it comes from an unfamiliar source.
Have you ever encountered a scam using a well-known name or brand? What happened? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.

Technology
China launches center to train 100-plus humanoid robots simultaneously

Shanghai has officially unveiled its first heterogeneous humanoid robot training center, marking a significant accomplishment in China’s robotics development.
The Humanoid Robot Kylin Training Ground represents an important step in the country’s technological advancement, showcasing China’s commitment to becoming a global leader in robotics and artificial intelligence.
Humanoid robots being trained (Humanoid Robot Kylin Training Ground)
State-of-the-art center pushes boundaries of robotic training
The National and Local Co-Built Humanoid Robotics Innovation Center has launched a groundbreaking training facility that is revolutionizing the field of robotics. This cutting-edge complex, spanning over 53,800 square feet, is currently capable of training more than 100 humanoid robots at once. The facility features an impressive array of over a dozen specialized training scenarios, including welding, manufacturing and automotive testing.
STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW
These advanced robots have showcased exceptional proficiency, with an average success rate exceeding 90% in various tasks. Their capabilities range from organizing desks and sorting items to operating complex equipment, demonstrating the potential for widespread application across multiple industries. This remarkable achievement underscores the rapid progress being made in the field of humanoid robotics and highlights China’s growing prominence in artificial intelligence and automation technologies.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Humanoid robots being trained (Humanoid Robot Kylin Training Ground)
WAREHOUSE ROBOT USES AI TO PLAY REAL-LIFE TETRIS TO HANDLE MORE THAN EVER BEFORE
How the facility is helping China tackle tech challenges and aging population
The training facility aligns with China’s broader strategy to address multiple challenges, including global tech competition and the complexities of an aging society. By 2027, the center aims to train 1,000 general-purpose robots simultaneously, with plans to collect 10 million high-quality physical data entries through collaborations with local robot manufacturers.
SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Humanoid robots being trained (ShanghaiEye)
WILLING TO PAY $175,000 FOR A LIFE-SIZE ROBOT FRIEND THAT REMEMBERS EVERYTHING ABOUT YOU?
China’s next-gen robot ready to slither into the future
The center is preparing to introduce the 2.0 version of its humanoid robot, “Deep Snake,” which will showcase advanced technologies like linear joint actuators. This means the robot will have smoother, more precise movements. Linear joint actuators are like advanced motors that allow the robot’s joints to move in a straight line, giving it more fluid and controlled motions. It’s a big step forward in making robots that can perform a wider range of tasks with greater accuracy and efficiency. These innovations are expected to enhance the versatility and performance of humanoid robots, further solidifying China’s leadership in the robotics industry.

Humanoid robot being trained (ShanghaiEye)
ROBOTIC DOG HELPS THOSE FACING MENTAL HEALTH AND COGNITIVE CHALLENGES
The potential and economic impact of the humanoid robot market
The Chinese humanoid robot market is experiencing explosive growth, showcasing the country’s rapid advancement in this cutting-edge technology sector. In 2024, the market was valued at $379 million, demonstrating significant initial traction. Looking ahead, projections indicate a remarkable expansion to approximately $2.3 billion by 2025, based on current exchange rates. Even more impressive is the anticipated growth to about $11.8 billion by 2030, highlighting the immense potential of this industry. The development extends beyond industrial applications, with plans for the first World Humanoid Robot Sports Games and even a marathon-running robot named “Tiangong” set to compete in April.
BEST PRESIDENT’S DAY DEALS

Humanoid robots being trained (ShanghaiEye)
Kurt’s key takeaways
China’s investment in the Humanoid Robot Kylin Training Ground is a strategic move to reshape industrial capabilities, address societal challenges and position the country at the forefront of global innovation. As the technology continues to evolve, the world will be watching closely to see how these advanced robots will transform various sectors and potentially redefine human-machine interaction.
Do you think humanoid robots are the solution to tomorrow’s workforce challenges or the beginning of a technological transformation where humans are replaced? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Everything we think we know about the next iPhone SE

We don’t expect Apple to hold a full launch event for the new SE, instead simply announcing the phone on its website. When the company has done this in the past, it’s tended to favor announcements at 9AM ET, so set your alarm clock now if you don’t want to miss the news.
We have a pretty good idea of what’s coming after months of leaks and rumors, so here’s everything we expect to see next week.
There won’t be a home button…
The biggest change is that Apple is upending the iPhone SE’s design, after leaving it broadly unchanged since the series’ inception in 2016. The 2022 SE is the last iPhone still using a home button, with a thick bezel around the top and bottom of the screen. But rumors say Apple will now ditch the button, slim the bezel, and add Face ID.
The result will be a phone that looks like the iPhone 14 from the front. Like that phone, it’s expected to place its Face ID sensors in a notch, rather than using the less obtrusive Dynamic Island design that was introduced in the 14 Pro and has been used in every iPhone since then. Apple can’t resist keeping its SE series just a little behind the times.
We’ve seen the notched design in a video shared by the leaker Majin Bu, which shows them handling what is likely a nonfunctional dummy unit, used by case manufacturers to design and test their accessories.
Case manufacturer Spigen also showed off renders of the phone when it accidentally published a listing early for one of its cases for the phone. The product page has been taken down, but not before GSMArena grabbed images that closely match the device shown in the video above.
…but there will be an Action button
Bu’s video and Spigen’s images both suggest that the SE 4 will include a customizable Action button, but not the Camera Control introduced on the iPhone 16.
Like other SE models, it also appears to stick to a single rear camera. One leaked spec list suggests that the SE will use a 48-megapixel sensor on the rear, with a 12-megapixel selfie camera on the front, but this is an area where there have been few reports so far.
It’s not going to be a small phone
The redesign will allow the 2025 SE to have a larger screen than the 4.7-inch panel used by the 2022 model. It’s expected to instead use a 6.1-inch display, the same size as the standard iPhone 16, and will also upgrade to OLED.
The bigger screen means the phone as a whole will be larger than any previous iPhone SE, and there will no longer be any iPhone smaller than the standard model. If we assume the new phone will have similar dimensions to the iPhone 16, then it could be 9mm taller than the 2022 SE and weigh about 25g more.
Lightning is out, USB-C is in
It’s pretty much certain that the phone will have a USB-C port rather than Lightning, allowing it to once again be sold in the EU. The previous SE model was discontinued in EU markets, along with every other iPhone using a Lightning port.
It’ll be one of the most powerful iPhones around
On the inside, Bloomberg reports that the phone will use the same A18 chip as the iPhone 16 and 16 Pro models. That’s the same approach Apple has used for its last two SE phones, which have paired the latest silicon with more dated designs. The A18 is expected to be combined with an increase to 8GB of RAM, the minimum required to run Apple Intelligence, the company’s AI tools that provide notification summaries and other functionality and are now enabled by default. That would all make it more powerful than 2023’s iPhone 15.
It will even beat this year’s iPhone 17 series to feature Apple’s first in-house 5G modem, replacing the Qualcomm components that iPhones have used in the past. Apple has been developing its own modems for over half a decade, but Bloomberg warns that the first iteration is a “downgrade” from the modem in the latest flagship iPhones and won’t support mmWave 5G, only sub-6 — though that was true of the last iPhone SE, too.
Tim Cook has teased a new “member of the family,” arriving on February 19th, and we’re pretty sure that’s the new SE.
Bloomberg predicts a price of “roughly $500,” higher than the 2022 model’s starting price of $429. That may be offset by a default storage spec of 128GB, meaning there would no longer be any 64GB iPhone on the market.
There’s also a possibility that it won’t be called the iPhone SE after all. Two leakers have predicted that it will instead be called the iPhone 16E, though, since the SE name has popped up more often, we think that’s still more likely.
We won’t have long to wait to find out for sure. The SE would be the first of several big iPhone launches this year, with Apple tipped to reveal a slimmer iPhone 17 Air as well as “major updates” to the iPhone 17 and iPhone 17 Pro.
Update, February 13th: Added mention of Apple’s teaser for an announcement on February 19th.
Technology
Screenshot-scanning malware discovered on Apple App Store in first-of-its-kind attack

Every tech expert will tell you the App Store is safer than Google Play Store. Some might even claim it is impossible to download a malicious app from the App Store, but they are wrong.
While I admit the App Store is a secure and tightly controlled ecosystem, it cannot completely shield you. Security researchers have found that hackers are targeting several apps on the App Store to spread malware that steals information from screenshots saved on a device.
The issue also affects those downloading apps from the Google Play Store.
STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW
A person holding an iPhone. (Kurt “CyberGuy” Knutsson )
How the malware works and what makes it different
According to researchers at Kaspersky, this malware campaign is more advanced than typical info stealers, both in how it works and how it spreads. Instead of relying on social engineering tricks to get users to grant permissions like most banking trojans or spyware, this malware hides inside seemingly legitimate apps and slips past Apple and Google’s security checks.
One of its standout features is Optical Character Recognition. Instead of stealing stored files, it scans screenshots saved on the device, extracts text and sends the information to remote servers.
Once installed, the malware operates stealthily, often activating only after a period of dormancy to avoid raising suspicion. It employs encrypted communication channels to send stolen data back to its operators, making it difficult to trace. Plus, it spreads through deceptive updates or hidden code within app dependencies, an approach that helps it evade initial security screenings by app store review teams.
The infection vectors vary between Apple and Google’s ecosystems. On iOS, the malware is often embedded within apps that initially pass Apple’s rigorous review process but later introduce harmful functionality through updates. On Android, the malware can exploit sideloading options, but even official Google Play apps have been found to carry these malicious payloads, sometimes hidden within SDKs (software development kits) supplied by third-party developers.

Messaging app in the App Store designed to lure victims.
THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION
What’s being stolen, and who’s responsible?
The scope of stolen information is alarming. This malware primarily targets crypto wallet recovery phrases but is also capable of exfiltrating login credentials, payment details, personal messages, location data and even biometric identifiers. Some versions are designed to harvest authentication tokens, allowing attackers to access accounts even if users change their passwords.
The apps serving as malware carriers include ComeCome, ChatAi, WeTink, AnyGPT and more. These range from productivity tools to entertainment and utility apps. In some cases, malicious developers create these apps with full knowledge of the malware’s purpose. In others, the issue appears to be a supply chain vulnerability, where legitimate developers unknowingly integrate compromised SDKs or third-party services that introduce malicious code into their applications.
We reached out to Apple for a comment but did not hear back before our deadline.

Messaging app in the App Store designed to lure victims. (Kaspersky)
Apple’s response to screenshot-scanning malware discovered in App Store
Apple has removed the 11 iOS apps mentioned in Kaspersky’s report from the App Store. Furthermore, they discovered that these 11 apps shared code signatures with 89 other iOS apps, all of which had been previously rejected or removed for violating Apple’s policies, resulting in the termination of their developer accounts.
Apps requesting access to user data such as Photos, Camera or Location must provide relevant functionality or face rejection. They must also clearly explain their data usage when prompting users for permission. iOS privacy features ensure users always control whether their location information is shared with an app. Also, starting in iOS 14, the PhotoKit API — which allows apps to request access to a user’s Photos library — added additional controls to let users select only specific photos or videos to share with an app instead of providing access to their entire library.
The App Store Review Guidelines mandate that developers are responsible for ensuring their entire app, including ad networks, analytics services and third-party SDKs, complies with the guidelines. Developers must carefully review and choose these components. Apps must also accurately represent their privacy practices, including those of the SDKs they use, in their privacy labels.
In 2023, the App Store rejected over 1.7 million app submissions for failing to meet its stringent privacy, security and content standards. It also rejected 248,000 app submissions found to be spam, copycats or misleading and prevented 84,000 potentially fraudulent apps from reaching users.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
What Google is doing to stop malware
A Google spokesperson tells CyberGuy:
“All of the identified apps have been removed from Google Play and the developers have been banned. Android users are automatically protected from known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services.”
However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices. Here’s why:
What Google Play Protect can do:
- Scans apps from the Google Play Store for known threats.
- Warns you if an app behaves suspiciously.
- Detects apps from unverified sources (sideloaded APKs).
- Can disable or remove harmful apps.
What Google Play Protect can’t do:
- It does not provide real-time protection against advanced threats like spyware, ransomware or phishing attacks.
- It does not scan files, downloads or links outside of Play Store apps.
- It may miss malware from third-party app stores or sideloaded apps.
- It lacks features like VPN protection, anti-theft tools and privacy monitoring.

Image of a person typing in their password on screen. (Kurt “CyberGuy” Knutsson)
HOW SCAMMERS USE YOUR PERSONAL DATA FOR FINANCIAL SCAMS AND HOW TO STOP THEM
5 ways users can protect themselves from such malware
1. Use strong antivirus software: Installing strong antivirus software can add an extra layer of protection by scanning apps for malware, blocking suspicious activity and alerting you to potential threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
2. Stick to trusted developers and well-known apps: Even though malware has been found in official app stores, users can still minimize their risk by downloading apps from reputable developers with a long track record. Before installing an app, check its developer history, read multiple reviews and look at the permissions it requests. If an app from an unknown developer suddenly gains popularity but lacks a strong review history, approach it with caution.
3. Review app permissions carefully: Many malicious apps disguise themselves as legitimate tools but request excessive permissions that go beyond their stated purpose. For example, a simple calculator app should not need access to your contacts, messages or location. If an app asks for permissions that seem unnecessary, consider it a red flag and either deny those permissions or avoid installing the app altogether. Go to your phone settings and check app permissions on your iPhone and Android.
4. Keep your device and apps updated: Cybercriminals exploit vulnerabilities in outdated software to distribute malware. Always keep your operating system and apps updated to the latest versions, as these updates often contain critical security patches. Enabling automatic updates ensures that you stay protected without having to manually check for new versions.
5. Be wary of apps that promise too much: Many malware-infected apps lure users by offering features that seem too good to be true — such as free premium services, extreme battery optimizations or AI-powered functionality that appears unrealistic. If an app’s claims sound exaggerated or its download numbers skyrocket overnight with questionable reviews, it’s best to avoid it. Stick to apps with a transparent development team and verifiable functionalities.
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
Kurt’s key takeaway
The new malware campaign highlights the need for stricter vetting processes, continuous monitoring of app behavior post-approval and greater transparency from app stores regarding security risks. While Apple and Google have removed the malicious apps upon detection, the fact that they made it onto the platform in the first place exposes a gap in the existing security framework. As cybercriminals refine their methods, app stores must evolve just as quickly or risk losing the trust of the very users they claim to protect.
Do you think app stores should take more responsibility for malware slipping through? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
-
Technology1 week ago
Trump’s first 100 days: all the news affecting the tech industry
-
World1 week ago
Trump says US will ‘own’ Gaza in redevelopment plan
-
News1 week ago
Congressional Democrats to Trump: Changes can't be done in secrecy
-
Politics1 week ago
CIA offering buyouts to its entire workforce: report
-
Education1 week ago
Trump’s Orders Could Drain Millions From Universities, but Few Protest Openly
-
News1 week ago
U.S. cannabis shoppers face a market flush with illegal weed
-
Education1 week ago
Education Officials Placed on Leave in Trump’s Sprawling Effort to Curb D.E.I.
-
Politics1 week ago
'Losing their minds': Dem lawmakers face backlash for invoking 'unhinged' violent rhetoric against Musk