Connect with us

Technology

Intel finally notches a GPU win, confirms Arc B580 is selling out after stellar reviews

Published

on

Intel finally notches a GPU win, confirms Arc B580 is selling out after stellar reviews

Intel is having an incredibly rough year — but at long last, the company’s discrete graphics card initiative has produced a card worth celebrating. While we haven’t managed to review it ourselves due to a fluke issue, the $250 Arc B580 “Battlemage” GPU launched to nigh-universal praise, has already sold out most everywhere, and Intel tells The Verge it’s working to ship new units every week.

“Demand for Arc B580 graphics cards is high and many retailers have sold through their initial inventory. We expect weekly inventory replenishments of the Intel Arc B580 Limited Edition graphics card and are working with partners to ensure a steady availability of choices in the market,” Intel spokesperson Mark Anthony Ramirez tells The Verge. 

To give you an idea, here are some of the headlines we’ve seen on reviews of this card:

While reviewers have showed the B580 doesn’t beat the 4060 and 7600 in every game, especially for gamers who still play at 1080p resolution, it does seem to pull ahead on average, the drivers seem more mature than Intel’s earlier attempts, and the lower price and generous 12GB of video RAM make it relatively easy to recommend.

If you can find one at $250, that is — which you probably can’t, because they’ve sold out so quickly. For what it’s worth, Hardware Unboxed’s Steve Walton doesn’t think this is a so-called “paper launch” where a manufacturer ships a token number of components for bragging rights instead of mass-producing a product; he said that manufacturers, retailers and distributors told him that supply of the card was “quite substantial.”

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

16 billion passwords leaked in massive data breach

Published

on

16 billion passwords leaked in massive data breach

NEWYou can now listen to Fox News articles!

Your personal data is collected by almost every site or app you visit. The world is more data hungry than ever because it’s now the most important asset, even more valuable than oil. Your shopping history is logged, your search history is captured and your phone number, email address and IDs are all stored. 

But that doesn’t mean all this data is safe. If you’ve ever received a spam call, phishing email or a fake support call, your personal data is out there.

And if you want proof of how poorly your data is treated, a newly uncovered database offers a stark reminder. More than 16 billion login credentials, collected from years of past data breaches, have been compiled into one of the largest aggregated archives of cybersecurity incidents ever seen, according to a report.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join.

Advertisement

10 SIGNS YOUR PERSONAL DATA IS BEING SOLD ONLINE

A woman working on her laptop  (Kurt “CyberGuy” Knutsson)

What you need to know about the 16 billion password data breach affecting Google, Apple and Facebook

Cybernews describes the exposed database as a “blueprint for mass exploitation.” The records include login credentials from popular platforms like Google, Facebook and Apple.

Security researchers emphasize that this isn’t the result of a new, single breach. Instead, it’s a massive collection of previously stolen credentials from various past leaks, phishing scams and third-party data exposures, some of which were forgotten, underreported or reshared.

BleepingComputer, a cybersecurity site that reviewed the archive, confirmed the data appears to be aggregated from older breaches rather than a fresh incident. This makes the scope of the exposure particularly dangerous because attackers can use this central trove for targeted attacks, including credential stuffing.

Advertisement

Credential stuffing becomes much easier when attackers have access to such a vast pool of usernames and passwords. This technique involves using stolen login details across multiple sites, exploiting the fact that many users reuse the same credentials. So, even if your account wasn’t part of a recent breach, you could still be at risk if your old credentials are part of this newly indexed compilation.

hacker

An illustration of a hacker at work  (Kurt “CyberGuy” Knutsson)

DOUBLECLICKJACKING HACK TURNS DOUBLE-CLICKS INTO ACCOUNT TAKEOVERS

How Google and Meta are responding to the massive password leak

We reached out to Apple, Google and Meta for comment.

A Google spokesperson stated that this issue did not stem from a Google data breach and that Google continues to strongly encourage users to adopt more secure, passwordless authentication methods, such as passkey. They also suggest using tools like Google Password Manager, which securely stores your passwords and notifies you when they’ve been involved in a breach, allowing you to take immediate action.

A rep from Meta said, “We don’t have a statement to share at this time as we’re still looking into this,” but did offer some tips to secure your account, a security check-up tool, and the introduction of passkeys on Facebook.

Advertisement

We did not hear back from Apple before our deadline.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

google phone

A Google smartphone     (Kurt “CyberGuy” Knutsson)

MALWARE EXPOSES 3.9 BILLION PASSWORDS IN HUGE CYBERSECURITY THREAT

5 essential ways you can protect yourself after the Apple, Google Data breach

With credential leaks becoming a growing threat, protecting your data requires a mix of smart security habits and reliable tools. Here are five effective ways to keep your information safe.

1. Use a password manager: Infostealer malware often targets passwords saved directly in web browsers, making them easy targets. Instead of relying on your browser to store credentials, use a dedicated password manager that offers zero-knowledge architecture and military-grade encryption to keep your data safe. The best options work across all your devices and browsers, offer secure sharing, monitor for data breaches, and even generate health reports on your passwords. Get more details about my best expert-reviewed Password Managers of 2025 here.

Advertisement

2. Enable two-factor authentication (2FA): Even if your credentials are stolen, 2FA adds an extra layer of security by requiring a second form of verification, such as a code from an authentication app or biometric confirmation. Cybercriminals rely on stolen usernames and passwords to break into accounts, but with 2FA enabled, they cannot gain access without the additional security step. Make sure to enable 2FA on important accounts like email, banking, and work-related logins.

3. Use strong antivirus software and be cautious with downloads and links: Infostealer malware often spreads through malicious downloads, phishing emails, and fake websites. Avoid downloading software or files from untrusted sources, and always double-check links before clicking them. Attackers disguise malware as legitimate software, game cheats, or cracked applications, so it is best to stick to official websites and app stores for downloads.

The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Keep software updated:  Cybercriminals exploit outdated software to deliver malware. Keeping your operating system, browsers, and security software up to date ensures that known vulnerabilities are patched. Enable automatic updates whenever possible, and install reputable antivirus or endpoint protection software that can detect and block infostealer threats before they compromise your system.

5. Consider a personal data removal service: The massive leak of 16 billion credentials shows just how far your personal information can spread and how easily it can resurface years later in aggregated hacker databases. Even if your passwords were part of an old breach, data like your name, email, phone number, or address may still be available through data broker sites. Personal data removal services can help reduce your exposure by scrubbing this information from hundreds of these sites. While no service can guarantee total removal, they drastically reduce your digital footprint, making it harder for scammers to cross-reference leaked credentials with public data to impersonate or target you. These services monitor and automatically remove your personal info over time, which gives me peace of mind in today’s threat landscape. Check out my top picks for data removal services here. 

Advertisement

Get a free scan to find out if your personal information is already out on the web

CHAOS RANSOMWARE HITS OPTIMA TAX RELIEF, LEAKS 69GB OF DATA

Kurt’s key takeaway

Passwords are no longer enough. That is why I have always believed tech companies should phase them out entirely and require two-factor authentication across the board. Passwords, once the foundation of online identity, are now one of its weakest links. Companies like Google and Meta are already building systems that move beyond them. The tools are available. The message is clear. You do not need to wait for a breach to start taking security seriously.

Do you think tech companies are investing enough in their cybersecurity infrastructure? Let us know by writing to us at Cyberguy.com/Contact

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Advertisement

Copyright 2025 CyberGuy.com.  All rights reserved. 

Continue Reading

Technology

The smaller Fairphone 6 introduces swappable accessories

Published

on

The smaller Fairphone 6 introduces swappable accessories

Fairphone has announced its latest repairable smartphone, nearly two years after introducing the last upgrade. The new Fairphone 6 is smaller and 9 percent lighter than its predecessor, but it includes a larger 4,415mAh battery — easily replaceable by removing just seven screws — that will power the phone for up to 53 hours on a full charge. It’s also more modular than previous versions, with new accessories like a card holder and finger loop that can be attached to the back of the phone.

The Fairphone 6 is available now through the company’s online store and other European retailers for €599 (around $696). There are black, green, and white color options. But as with previous versions dating back to the Fairphone 3, the new model will only be available in the US through Murena, and delivery is expected sometime in August. Instead of running standard Android, the Murena version of the Fairphone 6 will feature a privacy-focused and de-Googled version of Android that the company calls /e/OS. It’s available for preorder now for $899.

The Fairphone 6 is available in black, green, and white.
Image: Fairphone

The Fairphone 6 has a Snapdragon 7s Gen 3 mobile processor, 8GB of RAM, and 512GB of storage that’s expandable up to 2TB using an SDXC card. It also features a 6.31-inch LTPO OLED display that’s slightly smaller than the Fairphone 5’s 6.46-inch screen, but with a refresh rate boosted from 90Hz to 120Hz.

On the back, you’ll find a 50MP main camera and a 13MP ultrawide camera, while the front has a 32MP hole-punch camera for selfies and video calls. That’s a significant step down from the Fairphone 5, which used 50MP sensors on all three of its cameras.

Advertisement
Two versions of the Fairphone 6 with a lanyard and card holder attached.

The lower part of the Fairphone 6’s back panel can be removed using two screws to attach optional accessories.
Image: Fairphone

The Fairphone 6’s physical design is similar to the previous model, although the lenses on the back are no longer located on a small camera bump and instead sit directly on the back panel. That panel is more modular now, allowing the lower section to be removed using just two screws and replaced with alternatives that add more functionality, like a wallet for holding cards or a finger loop for more securely holding the phone with one hand. The idea is similar to the swappable accessories Nothing offers for its CMF Phone 1 and Phone Pro 2, but how useful it will actually be depends on how many accessories Fairphone makes available.

Repairability is still a priority for Fairphone, and its new phone carries forward the same modular design of past versions. The modular aspect lets you access and swap 12 different parts — including the screen, battery, and USB port — using just a single standard screwdriver instead of specialized tools.

To further extend the Fairphone 6’s lifespan, the company includes a five-year warranty and promises eight years of software support through 2033. But the downside to not having everything inside the phone being glued in place and sealed tight is that the Fairphone 6 still has a limited IP55 rating for dust and water resistance. It can get splashed or even blasted with a jet of water, but it won’t survive an accidental submersion.

Aside from performance improvements and the new modular accessories, Fairphone seems to be staying the course with its latest smartphone, but it is introducing one additional new feature on the software side: Fairphone Moments. Activated through a physical switch on the phone’s side, it will let you “toggle between a full-featured smartphone and a minimalist experience.”

We don’t know exactly what Fairphone Moments will be minimizing, but since the company describes it as being “a mindful way to engage with technology, putting owners in control, not their notifications,“ it sounds like an alternate mode that reduces distractions so you can focus on specific tasks.

Advertisement

Continue Reading

Technology

Humanoid robots handle quality checks and assembly at auto plant

Published

on

Humanoid robots handle quality checks and assembly at auto plant

NEWYou can now listen to Fox News articles!

Kepler Robotics has officially introduced its Forerunner K2 “Bumblebee” humanoid robot at the SAIC-GM automotive plant in Shanghai, marking a significant moment in the real-world deployment of advanced robotics. In a recently released video, the K2 is seen moving confidently through the plant, performing detailed quality checks, and handling assembly operations that demand both strength and precision. This debut signals the beginning of scenario-based testing for Kepler’s humanoid robots across a variety of industrial settings, where their capabilities can be evaluated in live production environments.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join.

Humanoid robots at the SAIC-GM automotive plant in Shanghai (Kepler Robotics)

How Kepler’s K2 “Bumblebee” is changing automotive manufacturing

The K2 “Bumblebee” robot is built for the demands of modern factories. At SAIC-GM, it has already demonstrated its ability to perform intricate inspections, navigate complex factory layouts, and manage heavy automotive components with impressive autonomy. The robot can load stamped parts, manipulate mechanical fixtures, and adapt to new tasks using a combination of imitation and reinforcement learning. Its presence in the factory highlights a shift toward smarter, more efficient production lines, where robots and humans work side by side to achieve higher standards of quality and safety.

Advertisement
Forerunner K2 "Bumblebee" humanoid robot at the SAIC-GM automotive plant.

Forerunner K2 “Bumblebee” humanoid robot at the SAIC-GM automotive plant. (Kepler Robotics)

HUMANOID ROBOT MALFUNCTIONS AND SPARKS VIRAL PANIC

Mechanical and AI advancements in the Forerunner K2

Kepler’s Forerunner K2 is a notable step up from its predecessor, the K1, thanks to extensive improvements in both hardware and software. The K2 features a reinforced limb structure for greater durability and easier maintenance, tactile manipulators with an impressive 11 degrees of freedom per hand, and flexible fingertip sensors that boost its dexterity. Its integrated battery allows for up to eight hours of continuous operation, supporting the long shifts required in industrial settings.

On the intelligence side, the K2 leverages a cloud-based cognitive system that enables it to learn new tasks quickly and coordinate its movements with full-body awareness. Enhanced perception, task planning, and improved human-robot interaction algorithms allow the K2 to operate independently while collaborating smoothly with human coworkers.

Forerunner K2 "Bumblebee" humanoid robot at the SAIC-GM automotive plant.

Forerunner K2 “Bumblebee” humanoid robot at the SAIC-GM automotive plant. (Kepler Robotics)

AI HUMANOID ROBOT IS CHANGING THE WAY YOU BUY CARS AT DEALERSHIPS 

Kepler’s K2 and the future of humanoid robots in industry

Kepler’s ambitions for its humanoid robots extend far beyond automotive manufacturing. The company envisions these robots playing active roles in education, research, security, logistics, and hazardous outdoor operations. In classrooms, the K2 can support interactive learning and real-time coaching, while in research labs, it can help with data gathering and experimental tasks.

Advertisement

For security applications, the robot’s advanced sensors enable it to patrol complex areas, detect emergencies, and assist in rescue operations. In logistics, the K2 is designed to automate goods handling and warehouse management, increasing both accuracy and efficiency.

Its robust design, waterproofing, and resistance to extreme temperatures make it suitable for challenging environments, including areas with radiation or explosive hazards. The K2’s autonomous navigation and real-time monitoring capabilities help reduce risks and boost productivity, especially in high-risk conditions.

Forerunner K2 "Bumblebee" humanoid robot at the SAIC-GM automotive plant.

Forerunner K2 “Bumblebee” humanoid robot at the SAIC-GM automotive plant. (Kepler Robotics)

CHINESE HUMANOID ROBOT WITH EAGLE EYE VISION AND POWERFUL AI

What Sets the K2 Apart

The Forerunner K2 stands out for its precision, endurance, and adaptability. With advanced manipulators and flexible sensors, the robot can handle delicate and complex tasks that require a human-like touch. Its eight-hour battery life supports continuous operation during long industrial shifts, and its learning algorithms enable it to adapt to new tasks and environments with minimal retraining.

Kepler also emphasizes the cost efficiency of the K2, stating that it can match or exceed the workload of multiple human workers in certain scenarios, making it a practical addition to high-demand workplaces. The company has set the base price for the Forerunner K2 at around $30,000, positioning it as an accessible option for manufacturers seeking to boost productivity and efficiency with intelligent robotics.

Advertisement
Forerunner K2 "Bumblebee" humanoid robot at the SAIC-GM automotive plant.

Forerunner K2 “Bumblebee” humanoid robot at the SAIC-GM automotive plant. (Kepler Robotics)

Addressing concerns about job displacement

The introduction of advanced humanoid robots like Kepler’s K2 naturally raises questions about the future of human employment in manufacturing and other industries. It’s true that automation and robotics have the potential to change the way work is organized on the factory floor. Some worry that robots could replace jobs traditionally held by people, especially in roles that involve repetitive or physically demanding tasks.

However, experts and industry leaders point out that the story is more nuanced. While certain jobs may be automated, new opportunities often emerge alongside technological advancements. For example, the rise of robotics is expected to create roles in robot maintenance, programming, AI training, and oversight, jobs that require different skills but are essential to supporting and managing these new systems. Many analysts believe that robots like the K2 are likely to complement human workers by taking over monotonous or hazardous duties, which allows people to focus on more complex, creative, or supervisory tasks.

Collaborative robots, or “cobots,” are specifically designed to work alongside humans, enhancing productivity and safety rather than simply replacing labor. This collaborative approach can lead to new forms of teamwork and innovation on the factory floor, making work environments safer and more efficient. Ultimately, the integration of humanoid robots is expected to shift the workforce rather than eliminate it, opening up new possibilities for both businesses and employees as they adapt to a more automated future.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Forerunner K2 "Bumblebee" humanoid robot at the SAIC-GM automotive plant.

Forerunner K2 “Bumblebee” humanoid robot at the SAIC-GM automotive plant. (Kepler Robotics)

Kurt’s key takeaways

Kepler’s K2 humanoid robot making its debut at SAIC-GM is a big step forward for robotics in real-world workplaces. Watching these robots take on challenging tasks alongside people shows just how much potential there is for collaboration between humans and machines. As more companies explore what humanoid robots can do, it’s going to be fascinating to see how these partnerships shape the future of work and industry.

Advertisement

Despite what experts and industry leaders say, does it concern you that as robots like Kepler’s K2 take on more tasks, human workers will be replaced? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Trending