Technology
Flying drones take aim at retail theft

NEWYou can now listen to Fox News articles!
Shoplifting has long been a challenge for retailers, but a U.S. company now believes that flying drones could help combat the issue. Flock Safety, best known for its law enforcement camera systems, is promoting its new Flock Aerodome Drone as an Automated Security system to the private sector. The idea is simple: if a theft occurs, a drone launches, follows the suspect, and streams live video back to security teams or even police. With theft rates reportedly climbing 93% in 2024, the push for high-tech security has never been stronger.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/Newsletter
An example of a Flock Safety drone, ready to follow theft suspects within seconds (Flock Safety)
How the drones would work
Instead of dispatching a guard, Flock’s drones could launch within seconds after motion is detected. Equipped with HD and thermal cameras, the drones can zoom in, track suspects, and relay real-time visuals.
The company says the system:
- Covers up to 38 square miles with a single dock
- Integrates with existing security alarms and camera systems
- Operates with FAA safety approvals and built-in geofencing
- Reduces costs by replacing the need for multiple guards
In theory, the drones act as a “guard in the sky,” providing retailers with rapid coverage across large areas, such as malls, warehouses, or ports.

The drone is equipped with HD and thermal cameras; they track movement across wide areas in order to follow suspects. (Flock Safety)
TEXAS COMPANY CREATES DRONES TO CONFRONT SCHOOL SHOOTERS IN SECONDS
Why retailers may be interested
Organized retail crime is a growing problem. Retailers have been reporting higher losses, tighter budgets, and fewer staff members available. Flock Safety argues its drone system can act as a deterrent simply by being visible, making criminals think twice before targeting a store. Beyond retail, the company is also pitching its drones to operators of hospitals, warehouse sites, and energy facilities that require large-scale surveillance.

Due to the drones’ helpful technologies, retailers may soon rely on them as a visible deterrent against organized theft. (Flock Safety)
HEGSETH TEARS UP RED TAPE, ORDERS PENTAGON TO BEGIN DRONE SURGE AT TRUMP’S COMMAND
What this means for you
For shoppers, this could mean visiting stores where drones are part of the security landscape. You might notice them overhead at malls or parking lots, watching for unusual activity. While some may view this as an added safety measure, others may worry about increased surveillance and loss of privacy. For retailers, drones could help protect profits, staff, and customers without the rising costs of hiring additional guards. But whether customers welcome drones buzzing around remains to be seen.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com/Quiz
Kurt’s key takeaways
Technology is quickly reshaping how companies approach security, and drones may soon play a bigger role in everyday shopping environments. With faster response times, broader coverage, and lower staffing costs, the idea has clear appeal for retailers. At the same time, questions about privacy and public acceptance will influence the extent to which this technology is adopted.
Would you feel safer shopping under drone surveillance, or would it make you uncomfortable? Let us know by writing to us at CyberGuy.com/Contact
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/Newsletter
Copyright 2025 CyberGuy.com. All rights reserved.

Technology
How Verge readers, and writers, are managing our kids’ screen time

This week the Pew Research Center published a study about how parents managed screen time for their kids 12 and under. The results were not particularly surprising (or enlightening, if we’re being honest). A full 90 percent of parents said their children watched TV, and 61 percent said their kids interact with smartphones at least on occasion. Somewhat surprisingly, only 50 percent said they let them play a game console of some kind. While 42 percent of respondents said they could do better managing their kids’ screen time, 86 percent did say they had rules around screens, even if they didn’t always stick to them.
What you won’t find in the Pew study, however, are what those rules are. That a certain percentage of parents “ever” let their kids watch TV doesn’t tell us useful information like, how long they watch, what they watch, or how parents are making sure they’re not watching anything inappropriate.
With my eight-year-old we’ve implemented a sort of barter system that I borrowed from Greg McKeown, author of Essentialism. They start each week with 10 tokens, worth a total of $5 or five-hours of screen time. They can earn additional time or money by reading. How they use that time is largely up to them, they can play Minecraft or watch shows on their children’s accounts on Disney+, Netflix, or Paramount+. They also have access to a few music making apps and games on their iPad. But we don’t allow them unfettered access to the iPad.
Lest you think that I rule my kids’ screen time with an iron first, my youngest gets an hour of (mostly educational) TV a day, just so we can help the oldest with their homework in peace. And every Saturday we have family movie night, and we take turns picking what we watch that week.
It also turns out that how much time kids spend in front of a screen isn’t the biggest concern. Time limits were common, but not universal.
That seemed to be parents’ biggest concern, what kids did with their screen time. Social media was a major concern, with 80 percent of respondents to the Pew survey saying it did more harm than good. Somewhat shockingly, 15 percent said their kids used TikTok, though usage of other platforms like Instagram and Facebook were much less common, only 5 percent. 74 percent did say they watched YouTube with their children, while only 15 percent said their kids didn’t watch YouTube at all.
In terms of tools for managing time, good old taking the device away or pressing the power button, was the most popular. Though some use Apple’s Screen Time tool to limit iPad usage specifically.
Phones weren’t common with younger kids. The Pew survey found that only 29 percent of parents allowed their 8 to 10 year-old to have their own smartphone. But, once kids hit their teens, they become more common.
Remember, there’s no right answer for how to raise your kids. What works for one parent, might not for another. We’re all just doing the best we can. Or at least 58 percent of us think we are, according to Pew.
Technology
Apple ends support for Clips video-editing app

Apple finally decided to pull the plug though, removing Clips from the App Store. The company also updated its support page to state clearly that “the Clips app is no longer being updated, and will no longer be available for download for new users as of October 10, 2025.” If you’ve already downloaded the app you can continue to use it on iOS and iPadOS. But it might also be a good idea to save any videos directly to your Photos library. The support page lays out exactly how to do this, both with and without effects, so that if Clips ever stops working because of an OS update you wont lose your videos.
Technology
How malicious party invites target your inbox

NEWYou can now listen to Fox News articles!
Cybercriminals are getting sneakier, and one of their latest tricks is using fake invitation emails that look like they’re coming from legitimate services. They promise you an “exclusive invite” or ask you to download and install something before you can see the details. If you’re not careful, that simple click could install malware on your computer.
Recently, I received one of these deceptive emails. It used a Gmail address, which made it look more authentic at first glance. But the red flag was in the language: “Save the invite and install to join the list.” No legitimate service should ever ask you to install software just to see an invite.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS
Cybercriminals use fake “invitation” emails to trick users into downloading malware. (Felix Zahn/Photothek via Getty Images)
How the fake invitation scam works
The email looks polished and even mimics well-known event platforms. When you click the link, it sends you to a site that pretends to host the invitation. Instead of showing event details, it pushes you to download an “invitation” file.
That file is likely malware. Once installed, it can:
- Steal your personal information
- Access your email contacts and spread the scam further
- Hijack your system for criminal use
The link in my case pointed to a suspicious domain ending in “.ru.com.” At first glance, it mimicked a legitimate brand name, but the extra suffix is a clue it’s not official. Hackers often use look-alike domains to trick you into thinking the site is real.
Red flags that reveal fake invitation email scams
Here are some warning signs that should make you pause before clicking:
- Unusual instructions like “install” or “save” just to view an invite
- Urgent or exclusive language pushing you to act fast
- Look-alike URLs that swap in extra characters or use different endings
- Download prompts when all you expected was an online invite
If you see any of these, close the email and delete it.
SCAMMERS ARE ABUSING ICLOUD CALENDAR TO SEND PHISHING EMAILS

Scammers mimic legitimate services, urging victims to “install” files that steal data. (Jens Büttner/picture alliance via Getty Images)
How to protect yourself from fake invitation email malware
These fake party invite emails are designed to trick you into downloading malware before you even realize what’s happening. Follow these steps to stay safe and keep your inbox secure.
1) Hover over links before clicking
Before you click on any “Download Invitation” button, hover your mouse over the link. Real invites use the company’s official domain. Scams like this often use odd endings such as “.ru.com” instead of “.ru” or “.com.” That small clue can help you avoid a big problem.
2) Use strong antivirus software
If you click by mistake, strong antivirus protection can detect and block malware before it spreads. Think of it as your last line of defense against a fake invite that sneaks into your inbox.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com/LockUpYourTech
3) Use a personal data removal service
Scammers often spread these emails by stealing contact lists from infected accounts. A personal data removal service reduces the amount of your personal information floating around online, making it harder for cybercriminals to target you in the first place.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan
4) Keep your system updated
Hackers love outdated systems because they’re easier to exploit. Keeping your operating system and apps updated patches those holes and makes it much harder for malware to take hold.
5) Report suspicious emails
Don’t just delete a suspicious invite, report it to your email provider. This helps improve their filters, protecting you and others from future fake emails.
6) Enable multi-factor authentication (MFA)
Even if hackers get your password from a phishing attack, MFA adds an extra lock to your accounts. It makes breaking in nearly impossible without your phone or secondary code.
7) Back up your files regularly
If the worst happens and malware damages your computer, backups ensure you don’t lose everything. Use an external hard drive or a trusted cloud service for peace of mind.
NEW EVITE PHISHING SCAM USES EMOTIONAL EVENT INVITATIONS TO TARGET VICTIMS

Hackers send polished emails with malicious links disguised as exclusive invites. (Thomas Trutschel/Photothek via Getty Images)
Kurt’s key takeaways
Fake invitation emails are designed to catch you off guard. Hackers count on you being in a hurry and clicking without thinking. Taking a moment to question an unexpected email could save you from installing dangerous malware.
Have you ever received a fake invitation email that looked convincing? How did you handle it? Let us know by writing to us at Cyberguy.com/Contact
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER
Copyright 2025 CyberGuy.com. All rights reserved.
-
Wisconsin3 days ago
Appleton Public Library wins 2025 Wisconsin Library of the Year award for distinguished service
-
Vermont3 days ago
Feds: Springfield dealer ran his drug business from Vermont jail
-
Virginia3 days ago
Match 13 Preview: #8 Virginia
-
Business3 days ago
Los Angeles Times Media Group takes step to go public
-
West Virginia4 days ago
West Virginia eatery among Yelp’s “outrageous outdoor dining spots”
-
Politics3 days ago
Spanberger refuses to urge Jay Jones to exit race, dodges questions after ‘two bullets’ texts
-
Utah3 days ago
Bookmark this link for The Southern Utah Tribune e-edition
-
Midwest3 days ago
Wisconsin ski park faces lawsuit after allegedly firing employee for sharing Bible verses on social media