Connect with us

Technology

Huge healthcare data breach exposes over 1 million Americans' sensitive information

Published

on

Huge healthcare data breach exposes over 1 million Americans' sensitive information

The healthcare industry has recently been a major target for hackers. You might remember the 2024 Ascension attack, which led to significant disruptions. 

The Change Healthcare breach was also on a massive scale. UnitedHealth initially claimed that 100 million Americans were affected, but later raised that number to 190 million. 

There have been countless other incidents, and now you can add another to the list. Community Health Center, Inc. (CHC), a Connecticut-based federally qualified health center, has disclosed a data breach following a criminal cyberattack on its systems. 

The attack has affected over a million people in the U.S.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Advertisement

A healthcare professional working on her laptop. (Kurt “CyberGuy” Knutsson)

What You Need to Know

Community Health Center, Inc. (CHC) detected a data breach on Jan. 2 after identifying unusual activity within its computer systems. An investigation confirmed that a skilled hacker had accessed and extracted data but did not delete or lock any information. If CHC’s claims are accurate, this is a positive outcome, as hackers often deploy ransomware, a type of attack in which they lock systems and demand payment before restoring access.

In a regulatory filing with the Maine Attorney General’s Office, CHC said that 1,060,936 people were affected by the data breach. The type of information compromised varies depending on an individual’s relationship with CHC. Patient data that may have been accessed includes names, dates of birth, addresses, phone numbers, email addresses, diagnoses, treatment details, test results, Social Security numbers and health insurance information.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

For individuals who are not regular CHC patients but received COVID-19 services at a CHC clinic, the breached data may include names, dates of birth, phone numbers, email addresses, addresses, gender, race, ethnicity and insurance details if provided. Additional information, such as test dates, results and vaccine details, including type, dose and administration date, may also have been affected. In rare cases, Social Security numbers were also included in the breach.

Advertisement

The organization did not disclose how the hackers gained access to the data or whether proper cybersecurity measures were in place at the time of the breach. While CHC has assured that its systems are no longer at risk, the same cannot be said for its patients, who may now be targets of various cyberattacks.

A healthcare worker looking at information on his phone. (Kurt “CyberGuy” Knutsson)

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

CHC’s response

CHC said the hacker’s access was terminated within hours, and daily operations were not disrupted. To strengthen cybersecurity, CHC claims it has implemented advanced monitoring software and reinforced system protections. The organization said there is no evidence at this time that the compromised data has been misused.

The health center is offering free identity theft protection services for all patients and COVID-19 service recipients whose Social Security numbers were involved in the breach. The organization is also encouraging individuals whose Social Security numbers were not affected to take additional steps to protect their information.

Advertisement

Illustration of a hacker at work. (Kurt “CyberGuy” Knutsson)

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

6 ways to protect yourself from Change Healthcare data breach

1. Remove your personal information from the internet: The breach has exposed sensitive personal data, making it essential to reduce your online footprint. While no service can guarantee complete data removal, a reputable data removal service can significantly limit your exposure. These services systematically monitor and erase your personal information from numerous websites and data brokers. Check out my top picks for data removal services here.

2. Be wary of mailbox communications: With addresses among the compromised data, scammers may exploit this breach to send fraudulent letters. Be aware of mail claiming missed deliveries, account suspensions or security alerts. Always verify the authenticity of such communications before responding or taking action.

Advertisement

3. Be cautious of phishing attempts and use strong antivirus software: Scammers may use your compromised email or phone number to target you with phishing attacks. Be wary of messages asking for personal information or containing suspicious links. To protect yourself, ensure strong antivirus software is installed on all your devices. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Monitor your accounts: Given the scope of this breach, regular monitoring of your bank accounts, credit card statements and other financial accounts is critical. Look for unauthorized transactions or suspicious activity, and report any issues immediately to your bank or credit card provider.

5. Recognize and report a Social Security scam: If your Social Security number is exposed, you could become a target for related scams. Official communication regarding Social Security issues usually comes via mail, not phone calls or emails. Learn more about spotting and reporting scams by visiting the Social Security Administration’s scam information page.

6. Invest in identity theft protection: Data breaches happen every day, and most never make the headlines, but with an identity theft protection service, you’ll be notified if and when you are affected. An identity theft protection service can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. It can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

One of the best parts of using an identity theft protection service is that it might include identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft. 

Advertisement

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Kurt’s key takeaway

The CHC breach may not be as large as the UnitedHealth attack, but with over a million individuals affected, it’s still a serious incident. Cybercriminals can exploit stolen data in various ways, from identity theft to targeted phishing scams. While CHC has taken steps to secure its systems, those impacted should remain vigilant. Be wary of unexpected emails, calls or messages requesting personal information, and consider monitoring financial and medical accounts for any suspicious activity.

Do you think these companies are doing enough to protect your data, and is the government doing enough to catch those behind cyberattacks? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Advertisement

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels for the latest tech tips and tricks:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement

Technology

Samsung’s Digital Home Key lets you use your phone as your key

Published

on

Samsung’s Digital Home Key lets you use your phone as your key

Just days after showing off the Galaxy S26, Samsung is finally rolling out the ability for users to unlock their home with a tap of their phone or by simply approaching their door. The new feature, called Digital Home Key, will live inside Samsung Wallet and is powered by the Aliro smart home standard.

Samsung first teased its Digital Home Key feature in 2024 and said the feature would be available in 2025. That didn’t pan out, as the CSA’s Aliro standard — which will let users unlock smart locks with any phone — only arrived in February of this year. The new standard uses near-field communication (NFC) for its tap-to-unlock technology. It also supports ultra-wideband (UWB), giving users the ability to unlock their door as they approach and without pulling out their phone.

To add a Digital Home Key to your wallet, you’ll need to set up a compatible smart lock through SmartThings using Matter. Only some Galaxy smartphones support both NFC and UWB, including the Galaxy Z Fold 4 and up, as well as the Galaxy S22 Ultra and up. You can view the full list of compatible devices on Samsung’s website.

Continue Reading

Technology

China’s ultrasound brain tech race heats up

Published

on

China’s ultrasound brain tech race heats up

NEWYou can now listen to Fox News articles!

When you hear “brain-computer interface,” you probably picture surgery, wires and a chip in your head. Now picture something quieter. No implant. No incision. Just sound waves directed at the brain.

That is the approach behind a new wave of ultrasound brain-computer interface companies in China. One of the newest is Gestala, founded in Chengdu with offices in Shanghai and Hong Kong. The company says it is developing technology that can stimulate and eventually study brain activity using focused ultrasound.

Yes, the same basic technology is used in medical imaging. But this time, it targets neural circuits.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

Brain imaging highlights the regions researchers study as companies explore noninvasive ultrasound brain-computer interface technology. (Kurt “CyberGuy” Knutsson)

What is an ultrasound brain computer interface?

Most brain-computer interface systems rely on electrodes that detect electrical signals from neurons. Neuralink is the most visible example. It places tiny threads inside the brain to record activity. Ultrasound works differently.

Instead of measuring electrical signals directly, it uses high-frequency sound waves. Depending on intensity and focus, those waves can:

  • Create images of internal tissue
  • Destroy abnormal tissue such as tumors
  • Modulate neural activity without open surgery.

Focused ultrasound treatments are already approved for Parkinson’s disease, uterine fibroids and certain tumors. That clinical history gives companies like Gestala a foundation to build on. However, studying or interpreting brain signals with ultrasound is far more complex than delivering targeted stimulation.

WHAT TRUMP’S ‘RATEPAYER PROTECTION PLEDGE’ MEANS FOR YOU

Unlike implant-based systems such as Neuralink, ultrasound brain computer interface research focuses on stimulating the brain without surgery. (Neuralink)

Advertisement

 

How Gestala plans to treat chronic pain with focused ultrasound

Gestala’s first product is focused on chronic pain. The company plans to target the anterior cingulate cortex, a brain region linked to the emotional experience of pain. Early pilot studies suggest that stimulating this area can reduce pain intensity for up to a week in some patients. The first-generation device will be a stationary system used in clinics. Patients would visit a hospital for treatment sessions. Later, the company plans to develop a wearable helmet designed for supervised use at home. Over time, Gestala says it wants to expand into depression, other mental health conditions, stroke rehabilitation, Alzheimer’s disease and sleep disorders. That is an ambitious roadmap. Each condition involves different brain networks and clinical hurdles.

Can ultrasound read brain activity without implants?

Like other brain tech startups, Gestala is also exploring whether ultrasound could help interpret brain activity. The long-term concept is straightforward in theory. A device could detect patterns linked to chronic pain or depression, then deliver stimulation to specific regions in response.

Unlike traditional brain implants, which capture electrical signals from limited areas, an ultrasound-based system may have the potential to access broader regions of the brain. That possibility is one reason researchers are paying attention. Still, translating that concept into reliable data is a major engineering challenge.

The global race to build noninvasive brain interfaces

China is not alone in exploring ultrasound brain-computer interface systems. Earlier this month, OpenAI announced a significant investment in Merge Labs, a startup cofounded by Sam Altman along with researchers linked to Forest Neurotech.

Advertisement

Public materials from Merge Labs mention restoring lost abilities, supporting healthier brain states and deepening human connection with advanced AI. That language signals long-term ambitions. Yet experts caution that real-world applications are still years away.

GOOGLE DISMANTLES 9M-DEVICE ANDROID HIJACK NETWORK

Researchers use MRI guidance to precisely target the anterior cingulate cortex with focused ultrasound during chronic pain studies. (Gestala)

The technical limits of ultrasound brain interfaces

Ultrasound faces technical limits. First, the skull weakens and distorts sound waves. That makes it harder to obtain precise signals. In research settings, detailed readouts of neural activity have required special implants that allow ultrasound to pass more clearly than bone.

Second, ultrasound measures changes in blood flow. Blood flow shifts more slowly than electrical firing in neurons. That delay may limit applications that require fast, detailed signal decoding, such as real-time speech translation. In short, stimulation is one challenge. Accurate readout is another level entirely.

Advertisement

What this means to you

Right now, this technology is experimental. You are not about to buy a brain helmet at your local electronics store. Still, the direction matters. If noninvasive ultrasound devices can reduce chronic pain or support mental health treatment, more patients may consider therapy without facing brain surgery.

At the same time, devices that analyze brain states introduce new privacy questions. Brain-related data is deeply personal. Regulators, hospitals and companies will need clear rules about how that data is stored, shared and protected. Finally, the link between AI companies and brain interface startups shows how closely digital intelligence and neuroscience are becoming intertwined. That connection could reshape medicine, wellness, and even how we interact with technology.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Kurt’s key takeaways

Brain-computer interfaces used to feel far off and experimental. Now they are a serious focus of global research and investment. China’s push to develop an ultrasound-based brain-computer interface adds momentum to a field already shaped by companies like Neuralink and new ventures backed by OpenAI. Progress is steady but measured. The potential is significant. The technical hurdles are real. What happens next will depend on whether researchers can turn promising lab results into safe, reliable treatments people can actually use.

If sound waves could one day interpret your mental state, who should decide how that information is used? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com.  All rights reserved.  

Advertisement

Related Article

New York halts robotaxi expansion plan
Continue Reading

Technology

This Windows gaming handheld has a screen that folds in half

Published

on

This Windows gaming handheld has a screen that folds in half

Lenovo put a foldable display on a gaming handheld. The Legion Go Fold Concept is a Windows-based handheld with a flexible POLED display, detachable Joy-Con-like controllers, and a folio case to turn the whole thing into a mini laptop.

You can use it as a standard Steam Deck-esque handheld with the display folded down to 7.7 inches and controllers attached at its sides, or you can unfold it for a bigger experience. When unfolded, the controllers can be repositioned to all four sides, allowing you to play with the screen in vertical or horizontal orientations.

In vertical splitscreen mode, you can put your game on one half of the screen and a second window (like your chat or game guide) on the other half. Horizontal fullscreen mode gives your game the full 11.6 inches of real estate in a 16:10 aspect ratio. To go into laptop mode, you remove the controllers and mount the handheld into a folio case with a stand, built-in keyboard, and trackpad. The controllers can be put into a separate grip mount to unify them as one gamepad.

There are a lot of ways you can use this folding handheld, including turning one of its controllers into a vertical mouse like on other Legion Go handhelds, but there’s one thing it doesn’t do: fold down to close and protect its screen. The Go Fold only folds outwards, so don’t expect a Nintendo DS or GameBoy Advance-like clamshell that closes for portability. Instead, it’s all about getting bigger than your average gaming handheld and offering more. (Though we’ve tried bigger before.)

The Legion Go Fold has some formidable specs: an Intel Core Ultra 7 258V Lunar Lake processor, 32GB of RAM, 1TB of storage, and a 48Whr battery. The plastic-covered OLED has a resolution of 2435 x 1712 and 165Hz refresh rate. And there’s even a second, circular toushscreen on the right controller, under the face buttons. It doubles as a touchpad and can be a support display, allowing you to swipe between extracted UI elements from a game (which I wouldn’t expect to be widely supported), a clock, system monitoring, or an animated GIF (just for fun).

Advertisement

During my brief in-person demo I didn’t get to play any graphically-intense games — just Balatro, which can practically play on a potato. The screen looked plenty sharp, but like any foldable there’s a crease down the middle; it’s very visible, but you learn to look past it and ignore it after just a bit. The build and feel of the whole thing felt a little fragile, and detaching and reattaching the controllers was definitely janky. Build quality will hopefully be improved if this device ever actually makes it to market.

The laptop mode was a pleasant surprise for me though. I did not expect a gaming handheld to double as a conventional computer you could get work done on. The Legion Go Fold’s case took quite a bit of fumbling before I set it up correctly, but it shouldn’t take too long to get used to if you actually lived with it.

Then again, I don’t know if anyone is going to be able to live with this thing — ever. I’d love for the Legion Go Fold to go from concept to real product like other out-there Lenovo ideas, but I shudder to think what it might cost. The Legion Go 2 is already priced well over $1,000. And with the ongoing RAMageddon crisis we’re living through, there’s no telling how much more expensive an actual Legion Go Fold would be if it came out in a year or more.

But even if it’s not the kind of foldable I expected, and even though it may never come out, it’s certainly cool. Now somebody please make a folding PC handheld that goes from kinda-big to really small. I think that’d be the one for me.

Photography by Antonio G. Di Benedetto / The Verge

Advertisement
Continue Reading

Trending