Technology
Fox News AI Newsletter: ChatGPT ‘code red’
NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.
IN TODAY’S NEWSLETTER:
– OpenAI’s Sam Altman issues ‘code red’ to bolster ChatGPT’s quality, delays other products: report
– Chinese hackers turned AI tools into an automated attack machine
– AI Melania: First lady rolls out audiobook of first memoir in Spanish
‘MORE INTUITIVE’: OpenAI CEO Sam Altman declared a “code red” effort within his company to improve the quality of ChatGPT The Wall Street Journal reported, citing an internal memo.
Sam Altman, chief executive officer of OpenAI Inc., during a media tour of the Stargate AI data center in Abilene, Texas, on Tuesday, Sept. 23, 2025. (Kyle Grillot/Bloomberg via Getty Images)
BOTS GONE ROGUE: Cybersecurity has been reshaped by the rapid rise of advanced artificial intelligence tools, and recent incidents show just how quickly the threat landscape is shifting.
‘AMAZING JOURNEY’: First lady Melania Trump is launching a Spanish-language edition of the audiobook of her memoir using artificial intelligence (AI) audio technology to bring her story to millions of Spanish-speaking listeners, Fox News Digital has learned.
First lady Melania Trump visits the Children’s Inn at National Institutes of Health on Valentine’s Day, Feb. 14, 2020, in Bethesda, Maryland. (Tasos Katopodis/Getty Images)
‘RESPONSIBLE ACTION’: FoloToy paused sales of its AI teddy bear Kumma after a safety group found the toy gave risky and inappropriate responses during testing. Now the company says it has restored sales after a week of intense review. It also claims that it improved safeguards to keep kids safe.
TECH SOLUTION: Elon Musk said in a new interview that he thinks robotics powered by artificial intelligence (AI) driving productivity gains and output are the only way to address the more than $38 trillion national debt.
NEW DIRECTION: Meta is dialing back its metaverse ambitions and redirecting resources toward AI-powered glasses and wearable technology, the company told FOX Business on Thursday.
Mark Zuckerberg, chief executive officer of Meta Platforms Inc., wears a pair of Meta Ray-Ban Display AI glasses during the Meta Connect event in Menlo Park, California, US, on Wednesday, Sept. 17, 2025. Meta Platforms, seeking to turn its burgeoning smart glasses into a must-have product unveiled its first version with a built-in screen. (Photographer: David Paul Morris/Bloomberg via Getty Images)
LIFELIKE TECH: When Xpeng unveiled its Next Gen Iron humanoid recently, the robot glided across the stage with movement so fluid that the crowd froze. Many viewers thought they saw an actor in a suit. Clips spread online within hours, and people everywhere claimed the same thing: it looked too human to be a machine.
OPINION: TECH OLIGARCHY: After a resounding 99–1 defeat in the Senate earlier this year, the Big Tech oligarchs are hard at work doing what they do best: trying to sneak a massive corporate giveaway into must-pass legislation in the dead of night. This time, they’re targeting the National Defense Authorization Act, a bill essential to our military and national security, as the vehicle for decade-long AI amnesty. Or another must-pass bill, if the NDAA doesn’t work for them. Or even a legally questionable executive order, as their Hail Mary.
SPACE RACE: OpenAI CEO Sam Altman is looking to build, fund or buy a rocket company to possibly compete in the space race against longtime rival Elon Musk, according to reports.
FOLLOW FOX NEWS ON SOCIAL MEDIA
Facebook
Instagram
YouTube
X
LinkedIn
SIGN UP FOR OUR OTHER NEWSLETTERS
Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health
DOWNLOAD OUR APPS
Fox News
Fox Business
Fox Weather
Fox Sports
Tubi
WATCH FOX NEWS ONLINE
Fox News Go
STREAM FOX NATION
Fox Nation
Stay up to date on the latest AI technology advancements, and learn about the challenges and opportunities AI presents now and for the future with Fox News here.
Technology
The Verge’s 2025 holiday gift guide
The holidays have a way of sneaking up on us. One minute you’re trick-or-treating with your kids, and the next you’re panic shopping in a Buc-ee’s gift aisle. But it doesn’t have to be that way. With the right cheat sheet, you can keep the holiday spirit high and stress levels low.
Fortunately, we did some planning on your behalf. As much as we love playing with the latest gadgets and gizmos here at The Verge, we also love recommending them. That’s why, after consulting with our expert team of writers and editors, we’ve compiled a medley of gift ideas that won’t be regifted come this time next year — from noise-canceling earbuds and e-readers to retro-inspired Polaroid cameras. Not every gift needs to be a grand gesture, though. Sure, a new gaming handheld makes for a great gift, but so does an affordable power bank.
The list below is just a fraction of what we’re recommending this holiday season. We’ve also curated guides for specific budgets and hobbies, whether you’re shopping for mom, dad, or even the avid tinkerer or budding gamer in your life. ’Tis the season, after all.
Photographer, photo editor: Amelia Holowaty Krales
Art director and designer: Cath Virginia
Creative director: Kristen Radtke
Technology
EU fines X $140 million over ‘deceptive’ blue checkmarks
The European Union has served Elon Musk’s X with a €120 million (about $140 million) penalty for violating the bloc’s digital service rulebook, in part for the “deceptive design” of its blue checkmark. Today’s announcement marks the first time that a company has been fined under the landmark Digital Services Act (DSA) law for curbing “illegal and harmful activities” on online platforms, and follows the EU launching a multifaceted investigation into X in December 2023.
In July 2024, the EU ruled that X was failing to comply with obligations around advertising transparency, data access for researchers, and “dark patterns” — deceptive interface features designed to trick users. X’s blue checkmark system was specifically called out for deceiving users by allowing anyone to pay to be “verified,” making it harder to determine the authenticity of X accounts. In today’s announcement, the European Commission noted that while the DSA doesn’t require user verification, “it clearly prohibits online platforms from falsely claiming that users have been verified.”
“Deceiving users with blue checkmarks, obscuring information on ads and shutting out researchers have no place online in the EU,” the bloc’s tech chief Henna Virkkunen said in a statement. “The DSA protects users. The DSA gives researchers the way to uncover potential threats. The DSA restores trust in the online environment. With the DSA’s first non-compliance decision, we are holding X responsible for undermining users’ rights and evading accountability.”
The EU can charge companies up to 6 percent of their global revenue for DSA violations. As X is a private company — purchased by Musk for $44 billion in October 2022 and again by his artificial intelligence company, X AI, in March 2025 for $33 billion — it’s unclear what its potential maximum penalty could have been. X can appeal the fine, but now has 60 working days to inform the EU of the measures it will take to change the “deceptive” use of blue checkmarks, and 90 days for its planned fixes for the other violations. Failure to meet those deadlines could result in more penalty payments.
The 2023 investigation was also launched to scrutinize X’s moderation practices and the dissemination of illegal or harmful content on the platform, which is currently still ongoing and could incur further penalties.
Technology
How 3.5B WhatsApp numbers were scraped and exposed
NEWYou can now listen to Fox News articles!
Most major platforms have dealt with large-scale data leaks tied to weak or unprotected APIs. You’ve seen this play out with Facebook, X and even Dell.
The pattern is always the same. A feature meant to make life easier becomes a gateway for bulk data collection.
WhatsApp is now part of that list after researchers managed to scrape 3.5 billion phone numbers by exploiting a simple gap in the app’s contact-discovery system.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
How the researchers scraped 3.5B WhatsApp numbers
WHATSAPP BANS 6.8M SCAM ACCOUNTS, LAUNCHES SAFETY TOOL
Researchers discovered that weak API limits made it possible to scrape billions of WhatsApp numbers. (Getty Images)
As reported by Bleeping Computer, the entire incident started with WhatsApp’s GetDeviceList API. This is the endpoint the app uses when you add a number to your contacts. It tells WhatsApp to check if that number has an account and what devices are linked to it. The problem was that the API had no meaningful rate limiting. In simple terms, the system didn’t slow down or block repeated requests, which opened the door for mass enumeration.
Researchers from the University of Vienna and SBA Research decided to test how far they could push this. Using only five authenticated sessions and a single university server, they started hammering WhatsApp’s servers with queries. They expected to get blocked fast, but WhatsApp didn’t react at all.
That’s how they were able to check more than 100 million phone numbers per hour. After generating a global pool of 63 billion possible mobile numbers, they ran the list through the API and confirmed 3.5 billion active WhatsApp accounts.
Researchers managed to scrape more than just phone numbers
The researchers didn’t stop at confirming account existence. They used other WhatsApp endpoints like GetUserInfo, GetPrekeys and FetchPicture to pull more details. This included profile photos, “about” text, device information and public keys. A test run in the United States alone downloaded 77 million profile photos without hitting any limits, many with clear images of people’s faces. Public “about” sections often revealed personal info or links to other profiles. When compared to Facebook’s 2021 scrape, they found that 58% of leaked Facebook numbers were still active on WhatsApp years later. That’s what makes phone-number leaks so damaging. They stay useful to attackers long after the initial breach.
RUSSIAN LAWMAKERS CLAIM WHATSAPP IS A NATIONAL SECURITY THREAT, SHOULD PREPARE TO LEAVE THE COUNTRY
It’s important to note that this study was done by researchers who haven’t released the data. They also reported the issue to WhatsApp. The company has since added rate-limiting protections to prevent similar abuse from happening again. Still, the findings show how easily threat actors could have done the same thing if they had found the loophole first.
Why this keeps happening across major platforms
Weak or nonexistent API rate limits have caused several major data leaks in recent years, and WhatsApp isn’t the only example. In 2021, attackers abused Facebook’s “Add Friend” feature by uploading contact lists and checking which numbers matched active accounts. The API lacked proper safeguards, so they scraped 533 million profiles. Meta later confirmed the incident as automated scraping, and the Irish DPC fined the company €265 million.
Twitter had a similar problem when attackers used an API bug to match phone numbers and email addresses to 54 million accounts. Dell also reported that 49 million customer records were scraped after attackers took advantage of an unprotected API endpoint.
All of these cases share the same root cause. APIs that allow account lookups or data queries end up being easy to attack when they don’t limit how often someone can access them. One unchecked feature can turn into a pipeline for mass data collection.
7 steps you can take to keep your WhatsApp data safe
If your phone number ends up in one of these massive scrapes, you can’t pull it back, but you can make sure it’s far less useful to anyone trying to target you. Here are a few steps that help you stay safer.
1) Use two-factor authentication
Turn on 2FA for WhatsApp and every other important account. Even if someone has your number, they can’t break in without that second verification step. It also protects you from SIM-swap attempts since thieves can’t access your accounts with just a password.
A simple automated script pulled phone data at a massive scale without triggering alerts. (eyecrave productions/Getty Images)
2) Use a password manager
A password manager keeps every login unique. If attackers try to pair your scraped number with credential-stuffing attacks, reused passwords won’t give them an easy win. Strong, random passwords shut down a whole category of automated attacks.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.
3) Remove your data from public databases
Opt out of data brokers and people-search sites when you can. The less public information attackers can tie to your number, the harder it is for them to craft convincing phishing messages or identity-based scams.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
IS YOUR FRIEND’S PHONE NUMBER COMPROMISED? HERE’S WHAT TO LOOK FOR
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
4) Limit what you share in profile bios
Keep your WhatsApp “about” text minimal. Avoid details like job titles, hometowns, or links to other accounts. Scraped phone numbers often get paired with publicly visible bios to build fuller profiles for scams.
5) Tighten your privacy settings
Adjust who can see your profile photo, last-seen and status. Setting these to “Contacts only” or “Nobody” prevents strangers from pulling more personal info once they have your number. To tighten your privacy settings on WhatsApp on iPhone or Android, follow these steps:
- Open WhatsApp on your phone on your phone.
- Go to Settings: On iPhone, tap the “Settings” gear icon at the bottom right. On Android, tap the three vertical dots in the top-right corner, then select “Settings.”
- Tap “Account.”
- Tap “Privacy.”
- Adjust the privacy options below to control who can see your personal info:
- Last Seen & Online: Tap “Last Seen & Online” and choose “My Contacts” or “Nobody” to restrict who sees your last active status.
- Profile Photo: Tap “Profile Photo” and select “My Contacts” or “Nobody” to prevent strangers from viewing your profile picture.
- About: Tap “About” and pick “My Contacts” or “Nobody” to limit who can see your About info.
- Status: Tap “Status,” then select “My Contacts,” “My Contacts Except…,” or “Only Share With…” to control who can view your status updates.
These changes prevent people not in your contacts or strangers from pulling personal details from your WhatsApp profile, enhancing your privacy effectively on either iPhone or Android devices.
Because the system lacked proper rate-limiting, the scraping continued undetected for months. (Kurt Knutsson)
6) Install strong antivirus software
A lot of phishing and malware campaigns start with scraped numbers. Strong antivirus software can block malicious links, detect harmful downloads and warn you when something looks suspicious.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
7) Be cautious with unknown calls and messages
Treat unexpected messages with more suspicion. Don’t click links, don’t share OTPs, and don’t respond to anyone asking for verification codes. Once numbers are scraped, scammers ramp up spam and impersonation attempts.
Kurt’s key takeaway
WhatsApp might have fixed the issue, but the bigger problem is still out there. Any platform that exposes an API without proper rate limits is leaving a window open for someone with the right tools and enough time. This scrape shows you how quickly that window can turn into a firehose of personal data. Until API security becomes a priority across the board, you’ll keep seeing leaks like this repeat on bigger and bigger scales.
Do you think apps should be legally required to enforce strict API limits? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
-
Politics3 days agoTrump rips Somali community as federal agents reportedly eye Minnesota enforcement sweep
-
News3 days agoTrump threatens strikes on any country he claims makes drugs for US
-
Technology1 week agoNew scam sends fake Microsoft 365 login pages
-
World3 days agoHonduras election council member accuses colleague of ‘intimidation’
-
Ohio1 day ago
Who do the Ohio State Buckeyes hire as the next offensive coordinator?
-
Politics1 week agoRep. Swalwell’s suit alleges abuse of power, adds to scrutiny of Trump official’s mortgage probes
-
News1 week ago2 National Guard members wounded in ‘targeted’ attack in D.C., authorities say
-
Ohio1 week agoSnow set to surge across Northeast Ohio, threatening Thanksgiving travel