Technology
Jury finds Elon Musk’s ‘stupid tweets’ caused Twitter investors’ losses
A California jury determined that Elon Musk misled Twitter investors before making a $44 billion deal to buy the company in 2022, reports CNBC. The New York Times reports that Musk had testified this month that he didn’t believe his posts would spook markets, but he did say that “If this was a trial about whether I made stupid tweets, I would say I’m guilty.”
CNBC reports Musk’s attorneys are expected to file an appeal, as damages could reach as high as $2.6 billion, according to attorneys representing the plaintiffs.
While finding that Musk did not engage in a specific scheme to defraud shareholders, the jury cited two of Musk’s tweets, from May 13th and May 27th, 2022, as materially false or misleading, causing some investors to sell shares in Twitter at values below the $54.20 per share bid.
Twitter deal temporarily on hold pending details supporting calculation that spam/fake accounts do indeed represent less than 5% of users
20% fake/spam accounts, while 4 times what Twitter claims, could be *much* higher.
My offer was based on Twitter’s SEC filings being accurate.
Yesterday, Twitter’s CEO publicly refused to show proof of
This deal cannot move forward until he does.
Technology
AI smart glasses could generate fake photos instantly
NEWYou can now listen to Fox News articles!
Smart glasses are gaining new momentum thanks to artificial intelligence (AI). Companies like Google, Meta, Samsung and possibly Apple are exploring AI-powered glasses that combine cameras, speakers, voice assistants and computer vision in a wearable device.
At first glance, the features sound familiar. Smart glasses can take photos, give directions, answer questions and help you navigate the world hands-free. However, a recent demo hints at something much bigger.
These glasses may soon generate or alter photos instantly. In other words, the image you capture may no longer reflect what was actually there.
That raises an important question: If AI can change a photo the moment it is taken, how do we know what is real anymore?
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
SMART GLASSES DETECTOR APP WARNS IF YOU’RE BEING RECORDED
Google product lead Dieter Bohn demonstrates prototype AI smart glasses during a demo showing how the device can capture and modify photos using generative AI. (X/ @backlon)
A new AI trick inside smart glasses
During a demo of upcoming smart glasses, Google’s Dieter Bohn showed how the device could capture a photo and modify it using AI. The prototype, shown as Android XR glasses with a display, connects to Google’s generative AI tools, including Google Gemini and an experimental image generator called Nano Banana.
In the demonstration, Bohn asked the glasses to take a photo of people in the room. Then he gave another command. He asked the system to place those people in front of the famous church in Barcelona that he could not remember by name.
Within moments, the AI produced a new image showing the group standing in front of the Sagrada Família. The people in the photo never traveled to Spain. The background came from AI. To someone viewing the image later, it could look like a real travel photo.
Smart glasses are following the same playbook
The hardware approach behind these devices looks similar across the industry.
Most smart glasses include:
- A built-in camera
- Speakers for audio feedback
- A microphone and a voice assistant
- Computer vision powered by AI
- Navigation and contextual information
- Optional displays inside the lenses
This design mirrors products like the Ray-Ban Meta Smart Glasses, which combine sunglasses with an AI assistant and camera. Those glasses already allow users to capture photos, livestream video and ask questions using voice commands. However, the editing tools currently available inside Meta’s glasses focus more on artistic effects. For example, the system can transform photos into a cartoon or painting style. The goal is creative expression rather than photorealistic manipulation. Google’s demo hints at something different. It shows how AI can place people into entirely new scenes that never happened.
INSIDE MICROSOFT’S AI CONTENT VERIFICATION PLAN
A close-up of prototype Android XR glasses with a built-in display, part of Google’s concept for AI-powered smart glasses. (X/ @backlon)
Why this matters for photography
AI-generated images already exist across social media. Smartphones have also introduced powerful editing tools. Google’s Pixel phones, for example, have leaned heavily into AI photography with tools that remove objects, adjust lighting and generate backgrounds.
The difference with smart glasses is speed. The technology removes the delay between taking a photo and editing it. Instead of capturing an image and opening editing software later, the AI can change the photo immediately. That could make altered images far more common. Photos that once served as proof of where someone was or what happened may become harder to trust.
The demo still leaves open questions
It is important to note that the Google demo was short and carefully staged. The company acknowledged that parts of the video were edited. That suggests the AI process may take longer in real-world conditions.
There is also the question of reliability. Generative AI tools sometimes produce mistakes, strange artifacts or unrealistic details. Still, even an imperfect system could change how people interact with cameras and images. As the technology improves, the gap between real and AI-generated photos may shrink.
What this means for you
Smart glasses could soon become another everyday device. That means the way we capture and share images may shift again. If these tools become common, you may start seeing photos that were generated or heavily modified by AI. A picture posted online may look like a real moment from someone’s life. In reality, it could be a mix of real people and AI-generated scenery. That does not mean every image is fake. It does mean digital images may carry less proof than they once did. Understanding how AI editing works can help you approach viral photos, travel shots or dramatic images with a healthy level of skepticism.
Ray-Ban Meta smart glasses combine cameras, speakers and an AI assistant, showing how wearable devices are bringing artificial intelligence into everyday eyewear. (Meta)
How to spot AI-generated or altered photos
AI editing tools are becoming easier to use. That means altered images may appear more often online. A few habits can help you avoid being misled.
1) Question images that look too perfect
If a photo looks unusually polished or dramatic, pause before assuming it is real. AI images often create scenes that feel cinematic or unusually clean.
2) Look closely at small details
AI systems sometimes struggle with small elements. Check hands, reflections, shadows and background objects for strange shapes or mismatched lighting.
3) Check where the image came from
If a photo spreads quickly online, try to trace the original source. Reverse image search can reveal if the picture appeared somewhere else first.
4) Be cautious with viral travel or event photos
AI tools can place people into locations they have never visited. A convincing background does not guarantee that the moment actually happened.
5) Watch for photos used in scams or misinformation
AI-generated images can appear in fake travel posts, romance scams or misleading news claims. If a photo appears alongside urgent requests for money or emotional stories, take time to verify it before reacting. Avoid clicking suspicious links and consider using strong antivirus software that can block malicious websites and scam pages before they load. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
6) Treat photos online as information, not proof
Photos once served as strong evidence of where someone was or what occurred. With generative AI, an image may be a mix of real people and computer-generated scenes.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com
Kurt’s key takeaways
Smart glasses promise convenience, hands-free computing and powerful AI tools. At the same time, they blur the line between photography and digital creation. Technology keeps pushing toward a world where capturing a moment and generating one can happen in the same instant. The devices themselves may become smaller and smarter. The challenge may be deciding how much we trust the images they produce.
So here is the question worth asking. If AI glasses can create realistic photos of places you’ve never visited, will pictures still count as proof of reality? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Microsoft is ending the Windows Update nightmare — and letting you pause them indefinitely
While Microsoft isn’t doing away with automatic updates entirely, Windows boss Pavan Davuluri is promising that in future, you’ll be able to pause them “for as long as you need.” You’ll be able to reboot or shut down your computer “without being forced to install them.” To be fair to Microsoft, I’ve seen an option to reboot or shutdown without updating for a while now.
Even if you fail to pause them, you’ll only have to reboot your computer once a month, Microsoft promises — though its says you’ll be able to get updates faster if you wish. If you’re the kind of user who wants new features so quickly that you’re part of the Windows Insider Program, Microsoft says it’ll make that easier and make it clearer what you’ll get.
And as part of those updates, Microsoft says that this year, it will improve performance, responsiveness and stability, reduce memory consumption, make File Explorer and other apps launch and run faster, reduce crashes, improve drivers, make devices wake up more reliably, and much, much more.
It feels like Microsoft has also taken our feedback about the recent ridiculous hour-plus setup process for some Windows handhelds and laptops to heart. Davuluri writes that we’ll have “the ability to skip updates during device setup to get to the desktop faster.” And even if you sit through, there should be “fewer pages and reboots to getting started is simpler.” Plus, Microsoft will finally let you use gamepad controls to create your PIN during setup, instead of making you smudge the touchscreen.
Bravo, Microsoft, if this is all true, and if you can implement it in a reasonable length of time.
Davuluri writes that his team has spent months analyzing the feedback of Windows users, and “What came through was the voice of people who care deeply about Windows and want it to be better.”
Technology
Hospital cyberattacks threaten patient safety
NEWYou can now listen to Fox News articles!
If you watched a recent episode of “The Pitt” on Max, a streaming medical drama about life inside a high-pressure emergency department, you saw how quickly a hospital can spiral during a cyberattack. It made for gripping television. But in Mississippi, it was not a script. It was real life.
After a ransomware attack hit the University of Mississippi Medical Center, clinics across the state closed. Elective procedures were canceled. Phone systems and emails went down. Emergency care continued, but access to electronic medical records was disrupted.
When a hospital’s systems fail, the impact goes far beyond IT. It affects real people waiting for care. That is why hospital cyberattacks are no longer just a tech problem. They are a public safety issue.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
FIGURE DATA BREACH EXPOSES NEARLY 1M ACCOUNTS
A ransomware attack can lock hospital systems in seconds, disrupting access to critical medical records and patient care. (iStock)
Why hospitals have become prime targets
Hospitals cannot afford downtime. When systems fail, patient care is immediately affected, and the pressure to restore operations is intense. Ricardo Amper, founder and CEO of Incode Technologies, a digital identity verification and biometric authentication company, explains the reality.
“Hospitals are in a uniquely difficult position. If systems go down, patient care is immediately affected. That creates real pressure to restore operations fast, which is why ransomware groups often target healthcare.” He points to another major factor driving hospital cyberattacks. “Hospitals hold some of the most sensitive data that exists, including medical records, identity information and insurance details. That combination of urgency and high-value data makes them very attractive targets.”
Healthcare systems also rely on vendors and service providers. One weak link can open the door. “In healthcare, you’re only as secure as the entire ecosystem around you,” Amper said.
How AI-powered impersonation is changing the game
Many people imagine hackers breaking through firewalls. That still happens. But today, attackers often target people instead of systems. “What we’re seeing more and more is that attacks aren’t always about breaking into systems, they’re about tricking people,” Amper said.
Artificial intelligence (AI) has made impersonation easier and scalable. Criminals can clone voices, generate convincing emails or create deepfake videos that appear to come from a trusted doctor, vendor or IT administrator. “AI doesn’t replace social engineering, it supercharges it.”
In practical terms, that might mean an employee receives what looks like a legitimate request to reset a password or approve a login. One click can open the door. “An employee is tricked into giving up credentials or approving a fraudulent authentication request. The attacker logs in as a legitimate user, and from there, they move quietly through internal systems,” Amper explained. Because the activity appears to come from a real employee, it may go undetected until significant damage is done.
5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK
Healthcare workers operate in high pressure environments, which makes social engineering and impersonation attacks more effective. (Paul Bersebach/MediaNews Group/Orange County Register/Getty Images)
Why hospitals are especially vulnerable to cyberattacks
Inside a hospital, speed matters. Decisions happen quickly, and staff move from one urgent task to the next. That constant pressure creates opportunities for attackers who rely on deception. “Healthcare professionals are focused on patients, not cybersecurity. They work in high-pressure environments where speed matters. That urgency can make it easier for attackers to exploit trust or distraction,” Amper said.
Many hospitals also operate with legacy systems layered over time. Security was often added after the fact rather than built in from the start. That complexity increases risk. He also challenges how leaders think about the problem. “One misconception is thinking of cybersecurity as just an IT problem,” Amper said.
Today’s hospitals depend on digital systems for intake, diagnostics and billing. When those systems fail, care delivery suffers. “Cybersecurity today is fundamentally about operational resilience. It’s about keeping the hospital running safely and continuously.”
What happens to your data after a breach
When a hospital is breached, the exposed data often goes beyond a credit card number. “Breaches can expose medical histories, Social Security numbers, insurance information, billing details and contact data,” Amper said.
That combination is powerful. Criminals can use it for identity fraud, insurance fraud and highly targeted scams. Unlike a credit card, a medical identity cannot simply be replaced. “Stolen medical data can’t simply be canceled and replaced. That makes it especially valuable and long-lasting in criminal markets.”
The impact may not show up right away. “The impact isn’t always immediate; it can surface months or even years later.”
When hospital networks are breached, sensitive medical histories, identity details and insurance data can be exposed for years. (iStock)
How hospitals can strengthen defenses
Identity now sits at the center of cybersecurity. “Identity has become the front line of cybersecurity. If an attacker can successfully impersonate a trusted user, many traditional defenses can be bypassed,” Amper said. Stronger identity verification, layered authentication and systems that can detect impersonation or deepfakes are becoming essential. The more certain a hospital is about who is accessing its systems, the harder it becomes for attackers to move quietly.
How to check if your information is on the dark web
After a hospital breach, many patients worry about whether their data has been sold or shared. One simple step is checking whether your email address appears in known data breaches. You can visit haveibeenpwned.com and enter your email address into the search bar. The site will show whether your information has appeared in past breaches tied to that email. If your email appears in a breach, take action immediately. Change passwords for affected accounts and make sure each account uses a unique password.
What patients should do after a hospital breach
If you receive a breach notification letter, do not panic. But do act. Amper offers clear guidance. “First, stay calm but take it seriously. Read the notice carefully and enroll in any credit or identity monitoring services offered.”
Then take practical steps right away:
- Review insurance statements for unfamiliar claims
- Check medical records for incorrect diagnoses or procedures
- Monitor your credit reports
- Consider placing a free credit freeze with the major credit bureaus if your Social Security number was exposed
- Enable two-factor authentication (2FA) on email, financial and healthcare accounts wherever it is available
- Be cautious of emails or calls referencing the breach
- Reducing the amount of personal information available on data broker sites with a data removal service can also limit how easily scammers craft convincing follow-up attacks using your real details. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
“If something feels off, contact the hospital directly using official contact information. Don’t rely on links or numbers provided in unexpected messages.” He adds one final reminder. “Take your medical identity as seriously as your financial identity. Monitor your records, question anything unfamiliar and stay alert.”
Protect your accounts from long-term damage
Even if everything appears normal right now, take steps to secure your accounts. Credential leaks often surface weeks or months later.
- Consider identity theft protection. Identity monitoring services can alert you if criminals try to open accounts in your name or misuse your personal information. See my tips and best picks on Best Identity Theft Protection at Cyberguy.com
- Stop reusing passwords immediately. If attackers gain access to one working login, they often test it across dozens of websites automatically.
- Change reused passwords first, starting with email, financial and cloud accounts. Each account should have its own unique password.
- Consider using a password manager to generate and store strong passwords securely. You can also use breach scanning tools that alert you if your email address or passwords appear in future leaks. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
- Install strong antivirus software on your devices to help detect malware, phishing links and credential-stealing threats that could target you after a breach. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.
Taking these steps now can prevent a hospital breach from turning into long-term identity damage later.
Kurt’s key takeaways
When hospital cyberattacks disrupt care, the consequences ripple across entire communities. Appointments get canceled. Surgeries are delayed. Families worry. This is not only about stolen records. It is about trust in the healthcare system. Technology has transformed medicine. It has also created new risks. The challenge now is building resilience into every layer of care. Because the next cyberattack will not feel like a TV episode. It will feel personal.
And that raises an uncomfortable question. If your local hospital went offline tomorrow, would you trust that your medical identity and your care are truly protected? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
-
Detroit, MI2 days agoDrummer Brian Pastoria, longtime Detroit music advocate, dies at 68
-
Oklahoma7 days agoFamily rallies around Oklahoma father after head-on crash
-
Nebraska1 week agoWildfire forces immediate evacuation order for Farnam residents
-
Georgia5 days agoHow ICE plans for a detention warehouse pushed a Georgia town to fight back | CNN Politics
-
Massachusetts1 week agoMassachusetts community colleges to launch apprenticeship degree programs – The Boston Globe
-
Alaska6 days agoPolice looking for man considered ‘armed and dangerous’
-
Southwest1 week agoTalarico reportedly knew Colbert interview wouldn’t air on TV before he left to film it
-
Michigan1 week agoMichigan-based Stryker hit with cyberattack