Technology
Iran-linked hackers target US medical tech company
NEWYou can now listen to Fox News articles!
When most people hear about cyberattacks tied to geopolitical conflict, it can seem far away. It sounds like something that happens to governments or giant corporations. Yet the latest cyber incident involving a U.S. medical technology company shows how fragile digital systems can be. Even more important, it raises a question you should all ask yourself: Are you protected against trouble, too?
A hacker group linked to Iran has claimed responsibility for a cyberattack on Stryker, a Michigan-based company that produces medical equipment and healthcare technology used worldwide. Stryker employs about 56,000 people and operates in more than 60 countries, making it one of the largest medical technology companies in the world.
Stryker disclosed the incident in a filing with the U.S. Securities and Exchange Commission, saying the disruption affected parts of its Microsoft environment and that investigators are working to determine the full scope.
The incident appears to be one of the most significant cyber incidents linked to the current conflict so far.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Laboratory assistants from the company BioNTech wear Stryker medical gear in a clean room at a production site in Marburg, Germany, in March 2021. (Boris Roessler/picture alliance via Getty Images)
What happened in the Stryker cyberattack
According to reports, the attack disrupted parts of Stryker’s global network environment. Reports indicate the outages began shortly after midnight on Wednesday on the East Coast. Employees suddenly discovered that their work-issued phones stopped functioning. Communication across teams stalled as devices became unusable.
ANDROID FIXES 129 SECURITY FLAWS IN MAJOR PHONE UPDATE
The hacker group Handala claimed responsibility on social media platforms, including Telegram and X. However, the claim has not been independently verified. Some employees also reported seeing the hacker group’s logo appear on company login pages during the disruption. In posts online, the group said the attack was retaliation for a bombing at a school in Minab, Iran, though those claims have not been independently verified.
Security experts believe the attackers may have gained access to the company’s Microsoft Intune management console. This platform allows companies to manage corporate devices such as smartphones and laptops remotely. Once inside that system, attackers appear to have triggered a powerful administrative feature. Reports suggest many company-connected phones and laptops were wiped back to factory settings.
Signage at the Stryker Corp. headquarters in Portage, Michigan, on Thursday, March 12, 2026. A cyberattack on Stryker Corp. has kept the medical technology company’s ordering and shipping systems offline as the firm continues to struggle to address a crippling hack claimed by a group linked to Iran. (Kristen Norman/Bloomberg via Getty Images)
How hackers may have used legitimate tools against the company
The attack did not rely on traditional ransomware or malware. Instead, the hackers appear to have used a legitimate system feature in a destructive way. Remote wipe tools exist for good reasons. Companies use them when a device is lost, stolen or retired. However, if attackers gain control of the management console, those same tools can become weapons. Some cybersecurity researchers believe attackers may have accessed the company’s Microsoft Intune device management system, though the exact method of the attack has not been publicly confirmed.
Once the attackers accessed the device management system, they likely triggered remote wipe commands across multiple employee devices. The result looked like a mass reset event that effectively shut down normal operations. Stryker later confirmed it experienced a cybersecurity incident affecting its Microsoft environment. The company said it saw no evidence of ransomware or malware and believes the incident is contained. Stryker said it has activated business continuity measures so it can continue supporting customers and partners while systems are restored.
Iran’s long history of destructive cyberattacks
This type of attack fits into a broader pattern. Iran-linked groups have previously launched some of the most damaging “wiper” cyberattacks on record. These attacks aim to destroy data rather than steal it.
Two notable examples include:
Since the start of the current conflict, cybersecurity companies such as Google and Proofpoint have mostly observed Iranian groups conducting espionage operations. However, the Stryker disruption may signal a shift toward more aggressive actions targeting corporate infrastructure. We contacted both Stryker and Microsoft for comment but did not hear back before our deadline.
Why this matters beyond one company
Large cyber incidents rarely stay isolated. When attackers demonstrate a new method, other groups often study and reuse it. That means techniques used against a corporation today can show up in smaller attacks tomorrow. Small businesses, hospitals and even individuals sometimes become targets when criminals adapt the same tactics. In other words, this story about a medical technology company also carries a warning for everyday digital life.
The logo of Stryker medical technology is seen on their plant in the IDA (Industrial Development Agency) estate, in Carrigtwohill, County Cork, Ireland on March 28, 2025. (Reuters/Clodagh Kilcoyne)
How to protect yourself from cyberattacks and device wipe threats
Cyberattacks against corporations reveal weaknesses that can affect anyone who uses connected devices. A few proactive steps can reduce your risk.
1) Use strong and unique passwords
Never reuse passwords across accounts. If attackers obtain one password, they often test it across many services. Consider using a password manager to generate and securely store complex passwords, so you do not need to remember them. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com
2) Enable two-factor authentication
Adding a second verification step, such as two-factor authentication (2FA), can stop attackers even if they obtain your password.
3) Consider a data removal service
Data broker sites collect and sell personal details that criminals may exploit. Removing that information can reduce your exposure. Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
4) Install strong antivirus software
Reliable antivirus protection helps detect suspicious activity, phishing attempts and malware before it can spread. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
5) Back up important files regularly
If a device is wiped or compromised, backups allow you to restore critical data quickly.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
Kurt’s key takeaways
Cyberattacks once focused mainly on stealing information. Today, many attackers try to disrupt systems, erase data or create chaos. The reported incident involving Stryker shows how hackers can turn everyday administrative tools into powerful weapons. If someone gains access to the right controls, they may not need traditional malware at all. For many people, cyber conflict between countries can seem far away. Yet the same technology involved in those attacks powers the devices and services we rely on every day. Your phone, laptop and cloud accounts all connect to systems that depend on trust and access permissions. That is why digital safety now requires layers of protection. Strong passwords help. Secure devices help. Staying aware of threats helps, too. Preparation can make the difference between a quick recovery and a major disruption. If something unexpected happens, the people who bounce back fastest are usually those who took a few steps to protect themselves in advance.
And that leads to an important question: If your phone, laptop or cloud account were suddenly wiped tomorrow, would you be ready to recover? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Anthropic essentially bans OpenClaw from Claude by making subscribers pay extra
Starting tomorrow at 12pm PT, Claude subscriptions will no longer cover usage on third-party tools like OpenClaw.
You can still use these tools with your Claude login via extra usage bundles (now available at a discount), or with a Claude API key.
We’ve been working hard to meet the increase in demand for Claude, and our subscriptions weren’t built for the usage patterns of these third-party tools. Capacity is a resource we manage thoughtfully and we are prioritizing our customers using our products and API.
Subscribers get a one-time credit equal to your monthly plan cost. If you need more, you can now buy discounted usage bundles. To request a full refund, look for a link in your email tomorrow.
We want to be intentional in managing our growth to continue to serve our customers sustainably long-term. This change is a step toward that.
Technology
NYC schools track bathroom time with digital hall passes
NEWYou can now listen to Fox News articles!
Leaving class for a quick bathroom break now comes with a timer for many students in New York City.
A digital hall pass system called SmartPass is rolling out across public schools. It replaces the old paper pass with a digital one. Students sign out on a classroom iPad. Then the system tracks how long they are gone.
On paper, it sounds efficient. In practice, it is stirring strong reactions.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
95% OF FACULTY SAY AI MAKING STUDENTS DANGEROUSLY DEPENDENT ON TECHNOLOGY FOR LEARNING: SURVEY
New York City students now use SmartPass, a digital hall pass system that tracks when they leave class, where they go and how long they are gone. (Alejandra Villa Loarca/Newsday RM via Getty Images)
How the SmartPass digital hall pass works
SmartPass logs when a student leaves class and tracks how long they are out and where they go. Teachers can view that information in real time, which gives them a live snapshot of student movement during the school day. SmartPass says the system is designed to improve safety, reduce disruptions and give staff better visibility into student movement.
The system keeps a running total of time spent outside the classroom. It can also limit how many students are allowed in the hallway at once. In some cases, it can flag or block overlapping passes between students. Schools can also restrict when passes are allowed, depending on the schedule or specific rules set by staff.
Supporters say this helps reduce disruptions and keeps students accountable. They also argue it improves safety during emergencies because staff can quickly see who is out of class. However, that is only one side of the story.
Students say SmartPass feels like surveillance
Many students are not buying the “efficiency” argument. Some say the system makes them feel rushed during basic needs. Others worry about being constantly monitored.
One student described it as uncomfortable, like someone is always watching. Another said it turns something simple into a stressful countdown.
There are also reports of strict time limits. In some cases, students say teachers set very short timers for bathroom use. That can create awkward situations fast.
And then there are loopholes. Students have figured out ways to sign out under someone else’s name. That can block another student from leaving class at all.
NEW AI COALITION TARGETS WASHINGTON, BIG TECH AS GROUP WARNS CHILD SAFETY RISKS OUTPACING SAFEGUARDS
A digital hall pass system in New York City schools is raising questions about privacy, student trust and whether tracking tools belong in everyday school life. (Melina Mara/The Washington Post via Getty Images)
SmartPass raises growing privacy concerns
Privacy advocates are raising bigger concerns. Critics say tools like SmartPass go too far.
“Hyper invasive, error-prone AI surveillance technologies have no place in school bathrooms,” said Charlotte Pope, Equal Justice Works Fellow at the NYCLU. “Third-party surveillance products, like the electronic hall passes, put students’ sensitive, personal data at the whims of for-profit corporations, unnecessarily put even more punitive discipline into students’ lives, and add more fuel to the school-to-prison pipeline. For generations, students went to the bathroom without big brother watching just fine – the difference is that now, companies are making money off it.”
The fear is not only about today. It is about what happens to that data later. School officials say the system meets strict privacy rules. They also say schools are not required to use it. Still, critics argue that once data is collected, the risk never fully disappears.
How much NYC is spending on SmartPass
There is also a financial angle. New York City reportedly spent hundreds of thousands of dollars on SmartPass contracts in recent years. That breaks down to a few thousand dollars per school.
At the same time, the city faces major budget gaps. That raises a fair question. Should schools invest in tracking tools or focus on staffing and facilities? Students are asking that question too.
Why this conversation is not going away
Technology in schools is not new. But the level of tracking is changing. What used to be a simple hall pass is now a data point. Multiply that across a school day, and you start to see a pattern forming.
Some people see that as progress. Others see it as overreach. Either way, tools like SmartPass are likely just the beginning.
TIM TEBOW URGES SUPREME COURT TO MAKE BIG TECH ‘PROTECT KIDS OVER PROFIT’ IN CSAM CASE
SmartPass is rolling out in New York City public schools, replacing paper hall passes with a digital system that logs student movement in real time. (Deb Cohn-Orbach/UCG/Universal Images Group via Getty Images)
What this means to you
Even if you are not a student in New York, this trend still matters. Digital monitoring tools are becoming part of everyday life. You can now find them in schools, workplaces and public spaces.
As a result, data collection is starting to feel normal in places where it never used to exist. Even simple systems can build detailed profiles over time. That information can reveal patterns about behavior without people realizing it.
At the same time, convenience often comes with tradeoffs. Tools that make things easier can also reduce privacy. Once these systems are in place, they rarely stay limited. They tend to expand and track more over time.
If you have kids, it is worth asking how their school collects and stores data. If you are a student, you have a right to understand what is being tracked and why it matters.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
Kurt’s key takeaways
There is a real balance to strike here. Schools want safety and structure. Students want trust and privacy. Those goals do not always line up. SmartPass sits right in the middle of that tension. It promises control and visibility. It also raises questions about how much monitoring is too much. The bigger issue may not be this one system. It is the direction things are heading.
If tracking tools become standard in schools, where should the line be drawn between safety and personal space? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
NASA did eventually solve Artemis II’s Outlook glitch
On Thursday, during Artemis II’s journey to the Moon, commander Reid Wiseman ran into a tech issue some of us back on Earth can relate to: Microsoft Outlook wasn’t working. In a conversation captured in NASA’s Artemis livestream and shared on Bluesky, Wiseman reported to Mission Control: “I also see that I have two Microsoft Outlooks and neither one of those are working.”
To take care of the issue, Mission Control had to remotely access Wiseman’s personal computing device (PCD), a Microsoft Surface Pro. During a press conference on Thursday, Artemis flight director Judd Frieling said NASA had fixed the issue, stating, “This is not uncommon. We have this on-station all the time. You know, sometimes Outlook has issues getting configured, especially when you don’t have a network that’s directly connected. And so essentially we just had to reload his files on Outlook to get it working.”
NASA uses a combination of its Near Space Network and Deep Space Network to stay in touch with Artemis II, relying on a mix of antennas around the world and satellites in orbit. Mission Control at the Johnson Space Center in Houston, Texas has to shift communications between these networks as Artemis II gets further away from Earth.
Aside from the Microsoft Surface Pro, the Artemis II crew’s gear list also includes Nikon D5 DSLR cameras, a ZCube video encoder, and handheld GoPro cameras for filming content for a Disney/National Geographic documentary. The crew was also allowed to bring their phones with them — you can even see their phones being stowed away in their spacesuit pockets in NASA’s livestream.
-
Culture1 week agoWhat Happens When We Die? This Wallace Stevens Poem Has Thoughts.
-
South-Carolina6 days agoSouth Carolina vs TCU predictions for Elite Eight game in March Madness
-
Miami, FL1 week agoJannik Sinner’s Girlfriend Laila Hasanovic Stuns in Ab-Revealing Post Amid Miami Open
-
Education1 week agoVideo: Transgender Athletes Barred From Women’s Olympic Events
-
Minneapolis, MN1 week agoBoy who shielded classmate during school shooting receives Medal of Honor
-
Vermont6 days ago
Skier dies after fall at Sugarbush Resort
-
Politics6 days agoTrump’s Ballroom Design Has Barely Been Scrutinized
-
Atlanta, GA6 days agoFetishist ‘No Kings’ protester in mask drags ‘Trump’ and ‘JD Vance’ behind her wheelchair