Connect with us

Technology

Legendary composer Laurie Spiegel on the difference between algorithmic music and ‘AI’

Published

on

Legendary composer Laurie Spiegel on the difference between algorithmic music and ‘AI’

In 1986, electronic music pioneer Laurie Spiegel created Music Mouse, a way for those with a Mac, Atari, or Amiga computer to dabble in algorithmic music creation. Music Mouse is deceptively simple: Notes are arranged on an XY grid, and you play it by moving a mouse around. Back in 1986, the computer mouse was still a relatively novel device. While it can trace its origins back to the late ’60s, it wasn’t until the Macintosh 128K in 1984 that it started seeing widespread adoption.

By then Spiegel, was already an accomplished composer. Her 1980 album The Expanding Universe is generally considered among the greatest ambient records of all time. And her composition “Harmony of the Worlds” is currently tearing through interstellar space as part of the Voyager Golden Record, launched in 1977. But she is also a technical wizard who joined Bell Labs in 1973 and was instrumental in early digital synthesis experiments and worked on an early computer graphics system called Vampire.

Spiegel was deeply drawn to algorithmic music composition and this new tool, the home computer. So, she created what she calls an “intelligent instrument” that enables the creation of complex melodies and harmonies with minimal music-theory knowledge. Music Mouse restricts you to particular scales, and then you explore them simply by pushing a mouse around.

Spiegel gives the user some control, of course. You can choose if notes move in parallel or contrary to each other, there are options to play notes back as chords or arpeggios, and there is even a simple pattern generator.

Despite being available for purchase until 2021, Spiegel never updated it to work on anything more current than Mac OS 9. Now, 40 years after its debut, it’s getting reborn for modern machines with help from Eventide.

Advertisement

Music Mouse is finally running on modern hardware.
Image: Eventide

While it would have been easy for Eventide and Spiegel to overload the 2026 version of Music Mouse with countless modern amenities and new features, they kept things restrained for version 1.0. The core feature set is the same, though the sound engine is more robust and includes patches based on Spiegel’s own Yamaha DX7. There are also some enhanced MIDI features, including the ability to feed data from Music Mouse into your DAW or an external synthesizer.

Laurie Spiegel answered some questions for us about the history of Music Mouse, algorithmic composition, AI, and why she thinks the computer is a “folk instrument.”

What were the origins of Music Mouse? Was there something specific that inspired its creation?

When the first Macs came out, the use of a mouse as an input device, as an XY controller, was altogether new. Previous computers had just alphanumeric keyboard input or maybe custom controllers. The most obvious thing I immediately wanted to do was to be able to push sound around with that mouse. So, as soon as the first C compilers came out, I coded up a way to do that. Pretty soon, though, I wanted the sound quantized into scales, then to add more voices to fill out the harmony. Then I wanted to have controls for timbre, tempo, and everything else I eventually added.

Advertisement

How did you connect with Eventide for this new version?

I first met Tony and Richard of Eventide all the way back in the early 1970s. They are longtime good friends. I’d been involved in various music tech projects at Eventide over the years. Tony knew that I really missed Music Mouse and that I still get a fair number of requests for the 1980s versions from people who keep vintage computers from that era just to be able to run Music Mouse or other obsolete software. He decided it was a musical instrument worth reviving. I had been wanting to revive it, but hadn’t been able to find the time to even just keep up with the way development tech keeps changing. My main thing is really composing music, and I have an active enough career doing that to not have enough time to do coding as well. I am extremely grateful to Eventide for resuscitating Music Mouse. I hope a lot of people will get a lot of music out of this new version.

Did you feel compelled to make any big changes to it after 40 years?

We decided to keep 1.0 of this new version of Music Mouse functionally the same as the 1980s original. The exceptions are adding a higher-quality internal synthesizer and providing ways to sync it with other software, to record or notate its MIDI output. We have a growing list of features to add in 2.0.

“It’s pretty easy by now to use computers to generate music-like material that is not actually the expression of an individual human being.”

Advertisement

Are there any current innovations in music tech that excite you?

That’s a hard question, because I am not all that excited about music tech right now. It’s music itself that holds my interest — composition, form, structure. I love counterpoint and the various contrapuntal forms. I studied them extensively when I was younger. Of course, harmonic progression is something I’m also very interested in, and in algorithmic assistance for composing it.

That various kinds of structures within music can now be more easily dealt with in computer software by now has both pros and cons. The pros include how much more deeply we have to understand how music works, how it is structured, and how it affects us, in order to represent it as a process description in software. That means learning, research, and self-discovery. The cons include that it’s pretty easy by now to use computers to generate music-like material that is not actually the expression of an individual human being. Music is a fundamental human experience. There is no human society that doesn’t have it. But it is something that comes from within human beings, as personal expression, as communication, as a sort of form of documentation of what we are feeling, and as a means of sharing it.

You’ve been credited as saying that the computer is a new kind of folk instrument. Can you explain what you mean by that? How does something like Music Mouse fit into that model?

Now that everyone with a computer or even just a phone has the ability to record and edit and play back and digitally process and transform sound, and particularly ever since sampling became a common musical technique, people have been doing remixes, collages, sonic montages… doing all kinds of stuff to audio they get from others or find online. This is very like what we used to call “the folk process,” in which music is repurposed, re-orchestrated, given new lyrics or otherwise modified as it goes from person to person and is adapted to fit what is meaningful in successive groups of people.

Advertisement

Music Mouse will help people create musical materials that can be used in a potentially infinite number of ways. It is a personal, often home-based instrument played by an individual, like a guitar.

Laurie Spiegel in 1990 in front of her Mac and a large collection of synths and other audio gear.

Laurie Spiegel in 1990 working at her Macintosh.
Image: Marilyn McLaren

You refer to Music Mouse as an “intelligent instrument”; it automates a certain amount of creation. What is the appeal of letting a computer take the wheel to a degree, as an artist?

Music Mouse is not a generative algorithm or an “AI.” It’s a musical instrument that a person can play. It is, to some degree, what we used to call an “expert system,” as it has some musical expertise built in. But that is meant to be supportive for the real live human being who is playing it, not to replace them. It makes the playing of notes easier in order to let the player’s focus be on the level of phrasing or form. I have coded up generative algorithms for music. Music Mouse is not one of them. It’s an instrument that an individual can play, and it’s under their control. It enables a different perspective that’s from above the level of the individual note.

Do you see a connection between modern generative AI and algorithmic composition tools?

Of course. Algorithms can be used to generate music. I have written and used some. Music Mouse is not generative, though. It does nothing on its own. It’s a musical instrument played by a person.

Advertisement

What is currently called “AI” is different from previous generations of artificial intelligence. I expect there will doubtless be further evolution. In the early years of my use of computer logic in composing, AI was more of a rule-based practice. We would try to figure out how the mind was making a specific kind of decision, code up a simulation to test our hypothesis, and then refine our understanding in light of the result. After that, there was a period of AI taking more of a brute-force approach. Computer chess, for example, would involve generating all possible moves possible in a given situation, then eliminating those that would be less beneficial. Then neural nets were brought in for a next generation of AI. I look forward to getting beyond the imitative homogenizing LLM approach and seeing whatever comes next.

There are many ways of designing an algorithm that either generates music or else helps a human being to do that, making some of the decisions during the person’s creative process to leave them free to focus on other aspects. By taking over some of the decision-making, they can free a creative mind to focus on different perspectives. People just starting to learn music too often bog down and give up at the level of simply playing the notes, just figuring out where to put their fingers. We can make musical instruments now that let people use a bit of automation on those low levels to let them express themselves on a larger level, for example, to make gestures in texture-space rather than thinking ahead just one note at a time.

“Music Mouse is not a generative algorithm or an ‘AI.’ It’s a musical instrument that a person can play.”

What do you think separates algorithmically generated music from something created by generative AI?

Artificial intelligence refers to a specific subset of ways to use algorithms. An algorithm is just a description of a process, a sequence of steps to be taken. A generative algorithm can make decisions involved in the production of information, and, of course, music is a kind of information. You can think of AI as trying to simulate human intelligence. It might have a purpose, such as taking over some of our cognitive workload. In contrast, the purpose of generative algorithms is to create stuff. In music, that purpose is to create an experience.

Advertisement

Music Mouse is not a generative algorithmic program. It’s more of a small expert system in that it has built into it information and methods that can help its player get beyond the level of just finding notes, to the level of finding personal expression.

Suno’s CEO Mikey Shulman has said that, “Increasingly taste is the only thing that matters in art and skill is going to matter a lot less.” In an age where music can be easily created using algorithms, plug-ins, and text prompts on cheap laptops and smartphones, do you see the role of composer being one primarily of curation?

I can see where he’s coming from, but, no, I don’t think so. The range and kinds of skills used in the creative arts will continue to evolve and expand. But the history of creative techniques shows them to be largely cumulative versus sequential. The keyboard synthesizer has not replaced the piano, which has not replaced the harpsichord or the organ. We have them all, that whole lineage, all still in use. Each musical instrument or artistic technique implies its own unique artistic realm. Each is defined by its specific limitations, which guide us as we use them. It is true that skills and traditional techniques will be an option rather than a prerequisite to creating music and art, but people will still do them. Just as LPs and chemical film have made comebacks recently, I expect to see traditional musical skills do the same. We have had computers and synthesizers for decades, yet there are still little children captivated by instruments made out of wood or painting or drawing, and I have yet to use any music editing software that gives me the fluidity and freedom of a pencil on staff paper. There will just be more kinds of complementary ways of making music.

More importantly, we humans have imaginations and emotions. There are internal experiences going on inside of us that we feel driven to express, to communicate, to share. It doesn’t matter what machines can generate on their own. We will always have those internal subjective experiences, emotion, and imagination, and people will experience them intensely enough to feel driven to create them external to their own selves in order to communicate and share them. You can’t replace human self-expression or the need for it by simulating their results. Artistic creation comes from a fundamental human drive, the need for self-expression. Artistic creativity is an essential method of processing the intensity of being alive.

Laurie Spiegel in the studio in 1985.

Laurie Spiegel in the studio in 1985.
Image: Enrico Ferorelli

You told New Music USA in 2014 that, in regard to electronic music, “There is no single creator… the concept of a finite fixed-form piece with an identifiable creator that is property and a medium of exchange or the embodiment of economic value really disappears.” Does this idea shape your views on ownership of art?

Advertisement

Those assumptions, which we inherited from the European classical model of music, are already much less prominent in our musical landscape. Improvisation, “process pieces,” the ease with which we can do transformations of audio files are all over the place. Folk music, and a lot of what we heard online here and there, might be audio that no longer has any known originator. We don’t know, and people don’t really care, who first created a swatch of sound. We are experiencing whatever has been done with it — different orchestrations, durations, signal processing. The huge proliferation of plug-ins and guitar effects pedals let anyone transform a sound beyond recognition. This is composition on a different level than on the level of the individual note, similarly to Music Mouse.

Another very important aspect of “folk music” is that it is typically played at home, with or for friends or family, or alone. This is very different from formal concert settings and programming we in the US inherited from Europe. For me, the most important musical experience is just about always at home, where we live. To quote what Pete Seeger said in his write-up of Music Mouse in Sing Out, that “she [meaning me] foresees a day when computer pieces will be like folksongs, anonymous common property to be altered by each new user. She would like to get music out of the concert hall and back into the living room.”

Music Mouse is available for macOS and Windows 11 for $29.

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Will Trump’s DOJ actually take on Ticketmaster?

Published

on

Will Trump’s DOJ actually take on Ticketmaster?

In mid-February, the Department of Justice lost its head antitrust enforcer — just weeks before it was scheduled to argue one of the year’s biggest anti-monopoly cases in court.

Antitrust Division chief Gail Slater announced her departure suddenly, via a post on her personal X account. But to those who follow the agency closely, it was far from surprising. For months, leaks about the division described tensions between Slater and her team with DOJ leadership, and President Donald Trump’s penchant for personal dealmaking raised questions about who would really call the antitrust shots.

Over the summer, two of Slater’s top deputies were fired for what the DOJ said was “insubordination.” One of them later described pushing back against a wireless networking deal between Hewlett Packard Enterprise (HPE) and Juniper Networks, peddled by “MAGA-In-Name-Only” lobbyists and DOJ officials. The week before Slater announced her departure, a third deputy also left the agency.

The timing drew extra scrutiny because Mike Davis, one of the lobbyists close to Trump who worked on the HPE-Juniper deal, is also reportedly working for Live Nation. Live Nation did not provide a comment on the reported connection. “What was happening implicitly before is now explicit,” one former DOJ official, speaking on background to discuss personnel matters, says of Slater’s sudden departure. “A lot of very powerful corporations have figured out that they can just push through fantasy deals and fantasy outcomes in ways that were impossible before, and all they have to do is pay.” After Slater posted about her departure, Attorney General Pam Bondi thanked her in a statement “for her service to the Antitrust Division which works to protect consumers, promote affordability, and expand economic opportunity.”

”A lot of very powerful corporations have figured out that they can just push through fantasy deals”

Advertisement

The DOJ and a group of what’s grown to 40 state attorneys general sued Live Nation-Ticketmaster in May 2024, seeking to break up the company they allege used anticompetitive practices to lock artists and venues into its orbit. By allegedly tying together different parts of its business, using exclusionary contracts, and threatening “financial retaliation” to keep new players out of the market, the company succeeded in driving up ticket prices for consumers, they argue. Live Nation said in a blog post at the time that the lawsuit “ignores everything that is actually responsible for higher ticket prices.”

With jury selection in the case slated to begin on March 2nd, many are left wondering if the DOJ will remain on the case. Should the agency settle and choose to no longer be involved in the trial, at least some of the 40 states who joined the DOJ in the initial lawsuit could — and likely would — continue to push ahead with the litigation. “We look forward to going to trial on March 2 against Live Nation,” California’s top antitrust enforcer, Paula Blizzard, said at an event the day of Slater’s announcement. Tennessee Attorney General Jonathan Skrmetti also plans to move forward with the states’ lawsuit, Capitol Forum reported.

The DOJ very well may remain a lead plaintiff. Omeed Assefi, who is taking over Slater’s role in the interim, pledged to continue her agenda, MLex reported. As of February 17th, he has said the case is strong and favors trial, according to Capitol Forum. Global Competition Review also reported last week that Assefi encouraged staff to look to his work on criminal antitrust enforcement as a guide to how he’ll lead the division. “Ask them how I feel about settling cases in lieu of trial,” he reportedly said. “Ask them how I feel about accepting half measures and mere monetary penalties in lieu of seeking justice.”

But Slater, too, was known as a serious enforcer of antitrust law — and reports suggest her agenda was overruled.

“The states are no stranger to real politik

Advertisement

In general, states are always prepared for changes in their trial partners, says Gwendolyn Lindsay Cooley, former Wisconsin antitrust chief and chair of the National Association of Attorneys General Multistate Antitrust Task Force. (Cooley agreed to speak generally about the role of state enforcement and not about the Live Nation case in particular, which Wisconsin was part of during her time there.) “The states are no stranger to real politik,” Cooley says. State enforcers understand that priorities and personnel can change with administrations, either in state offices or at the DOJ. This can require changes, like reassigning the most seasoned lawyers to fill gaps left by federal attorneys. But Cooley says there are plenty of experienced litigators in the states. “My understanding from talking with states generally is that this is something they were prepared for, and so should be able to take this in stride,” Cooley says.

The T-Mobile-Sprint merger litigation may serve as a guide. After Trump’s DOJ approved the merger, some states settled their cases, but others continued a fight to block the merger. In the end, however, they failed — a court let the merger close anyway.

States could be more aggressive in pursuing the Live Nation-Ticketmaster trial. The company has been widely criticized by musicians and concertgoers alike, including after infamously bungling a Taylor Swift ticket presale in 2022. In an interview with Bloomberg, attorneys general for California and Connecticut said they’d maintain a high bar for settling. “Any resolution that is politically motivated or impacted, or any settlement that comes from trying to placate the president or meet his demands is not likely to fly with Connecticut or California either,” Connecticut AG William Tong said.

In fact, citizen complaints about Ticketmaster are among the top 10 things state AGs commonly hear about, according to Cooley. “That’s something that the state AGs are going to be really paying attention to.”

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.
Advertisement

Advertisement
Continue Reading

Technology

Spyware can hijack your phone in seconds

Published

on

Spyware can hijack your phone in seconds

NEWYou can now listen to Fox News articles!

You already know malware is out there. You hear about phishing emails, fake apps and data breaches almost every week. But every so often, something comes along that feels more personal. ZeroDayRAT spyware is one of those threats.

If your device gets infected, attackers can see almost everything happening on your phone. That includes your messages, notifications, location and even live camera feeds. Let that sink in for a second.

This is not some clunky virus from years ago. Security researchers at iVerify, a mobile security and digital forensics company, describe it as a complete mobile compromise toolkit. And it works on both iPhone and Android devices.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

ZeroDayRAT spyware can secretly access messages, camera feeds and banking apps on infected iPhone and Android devices. (Stefan Sauer/picture alliance via Getty Images)

What makes ZeroDayRAT spyware so dangerous?

Many types of malware focus on one goal. Some steal passwords. Others spy on text messages. ZeroDayRAT spyware goes much further.

Once installed, the infected device starts transmitting data back to a central dashboard controlled by the attacker. From there, they get:

  • A full stream of incoming notifications
  • A searchable inbox of text messages
  • Device model and operating system details
  • Battery level and lock status
  • Network activity and app usage

In other words, they can build a detailed profile of your daily life. Reports say the dashboard even shows a live activity timeline. That timeline reveals who you talk to most, which apps you use and when you are most active online. For anyone who values privacy, that is chilling.

It can watch and listen in real time

Here is where things get even more disturbing.

ZeroDayRAT spyware includes keylogging and live surveillance tools. That means attackers can:

Advertisement
  • Capture every keystroke with context
  • See which app you opened
  • Track how long you spent inside it
  • Record gestures and inputs
  • Access your microphone
  • Activate your front or rear camera
  • View your screen in real time

Imagine someone watching your screen as you log into your bank account. Or listening while you have a private conversation. This is not a hypothetical capability. According to reporting, those features are built directly into the platform.

Your banking and crypto apps are targets too

Many people assume mobile malware only steals passwords. ZeroDayRAT spyware goes after money directly. It reportedly includes tools designed to target digital payment and banking apps such as Apple Pay and PayPal. It can also intercept banking notifications and use clipboard injection to redirect cryptocurrency transfers to the attacker’s wallet.

Even without full remote control of your phone, that level of access is enough to drain accounts and steal digital assets. And here is another troubling detail. Reports indicate the platform is openly sold on Telegram, which lowers the barrier for would-be cybercriminals. You do not need advanced hacking skills to use it. That combination of power and accessibility makes this threat especially concerning.

Why Apple and Google are tightening app rules

There is a reason Apple strongly discourages installing apps outside the App Store. Google is also exploring changes to how sideloading works on Android. When apps bypass official stores, security screening becomes weaker. That opens the door for spyware like ZeroDayRAT to sneak in. While no system is perfect, sticking to trusted app marketplaces dramatically lowers your risk.

How to tell if ZeroDayRAT spyware is on your phone

Advanced spyware is designed to stay hidden. You may not see a flashing warning that something is wrong. Still, your phone often gives subtle clues when something is off. Watch for these warning signs.

Unusual battery drain

Spyware that streams data, records audio or tracks location runs constantly in the background. If your battery suddenly drains much faster than normal, especially after no major app changes, that can be a red flag.

Advertisement

Phone overheating without heavy use

If your device feels hot even when you are not gaming or streaming video, background surveillance activity could be consuming resources.

Strange data usage spikes

Check your mobile data usage in settings. A sudden jump may indicate that your phone is transmitting large amounts of information to an external server.

Unknown apps or configuration changes

Look for apps you do not remember installing. On iPhone, check for unknown configuration profiles under Settings. On Android, review installed apps and device administrator permissions.

Unexpected login alerts

If you receive password reset emails or login alerts you did not trigger, assume your credentials may be compromised.

Microphone or camera indicators are activating randomly

Both iPhone and Android show visual indicators when the camera or microphone is in use. If those indicators appear when you are not actively using them, investigate immediately.

Advertisement

If you suspect spyware, do not ignore it. Back up essential data, perform a factory reset and restore only trusted apps. In severe cases, consult a mobile security professional.

149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK

Security researchers warn ZeroDayRAT functions as a full mobile surveillance toolkit sold openly online. (Photographer: Angel Garcia/Bloomberg via Getty Images)

How to remove ZeroDayRAT spyware from your phone

If you believe your phone may be infected, act quickly. Do not keep using it normally while you figure things out. Follow these steps.

1) Disconnect immediately

Turn off Wi-Fi and cellular data. This stops the spyware from sending more data to the attacker while you take action.

Advertisement

2) Change your passwords from a different device

Do not use the potentially infected phone to change passwords. Use a trusted computer or another secure device. Update passwords for email, banking, social media and payment apps first. Enable two-factor authentication (2FA) on every account. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.  Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

3) Run a trusted mobile security scan

Install and run strong antivirus software on your phone. Let it scan your device for malicious apps, suspicious configuration profiles or hidden spyware components. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

4) Remove suspicious apps and profiles

On iPhone, check SettingsGeneralVPN & Device Management for unknown configuration profiles. Delete anything you do not recognize. On Android, review installed apps and remove anything unfamiliar. Also, check device administrator settings and revoke access from unknown apps.

5) Back up essential data carefully

If you plan to reset your phone, back up only photos, contacts and critical files. Avoid restoring full system backups that could reintroduce malicious software.

6) Perform a factory reset

A full factory reset on your iPhone or Android is often the most effective way to remove advanced spyware. This wipes the device and removes hidden malware components. After the reset, reinstall apps manually from the official app store instead of restoring everything automatically. Before performing a factory reset, back up important photos, contacts and files, as this process permanently deletes everything stored on the device.

Advertisement

7) Monitor your financial accounts

Because ZeroDayRAT targets banking and crypto apps, watch your accounts closely for unusual transactions. Contact your bank immediately if you see suspicious activity.

When to replace the device

In rare cases, if the phone was deeply compromised or jailbroken, replacing the device may be the safest option. While that sounds extreme, protecting your identity and finances is worth more than the cost of a new phone.

Ways to stay safe from ZeroDayRAT spyware

The good news is that you still have control over your digital safety. Start with these practical steps to reduce your risk of infection and limit the damage if spyware ever targets your phone.

1) Avoid sideloading apps

Only install apps from the App Store or Google Play Store. Official stores screen apps for malicious code and remove threats when discovered. Do not download apps from links in emails or text messages. If an app asks you to install it from outside the store, treat that as a red flag.

2) Think before you tap and use strong antivirus protection

Do not click links from unknown senders. Even one tap can trigger a malicious download or redirect you to a fake login page. Install strong antivirus software on your mobile device. Good mobile security apps scan for spyware, block malicious websites and warn you about suspicious behavior in real time. Some also alert you if your personal information appears in known data breaches, which adds another layer of protection. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

Advertisement

3) Keep your phone updated

Install operating system updates as soon as they become available. Security updates patch vulnerabilities that spyware platforms like ZeroDayRAT try to exploit. Turning on automatic updates helps ensure you do not miss critical fixes.

4) Review app permissions regularly

Check which apps have access to your camera, microphone and location. Remove permissions that do not make sense. If a simple game wants constant microphone access, that should raise questions. Limiting permissions reduces what spyware can capture.

5) Use strong authentication

Turn on two-factor authentication (2FA) for banking, email and social media accounts. Even if spyware captures a password, that second verification step can stop attackers from logging in. Use a reputable password manager to create strong, unique passwords for every account.

6) Use a data removal service to reduce your exposure

Spyware operators often profile targets using personal data that is already available online. Data broker websites collect your phone number, address, relatives and more. A reputable data removal service can help remove your personal details from many of these sites. The less information criminals can gather about you, the harder it becomes to target you with convincing phishing attacks or social engineering.  Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

7) Do not bypass your phone’s built-in security protections

Some people modify their phones to remove manufacturer restrictions so they can install unofficial apps or customize the system. On an iPhone, this is called jailbreaking. On Android, it is known as rooting. While that may sound harmless, it removes important security safeguards that are designed to block spyware and malicious software. Once those protections are gone, threats like ZeroDayRAT have a much easier time installing and hiding on your device. Keeping your phone in its original security state adds a powerful layer of protection that most people never see but benefit from every day.

Advertisement

YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT

Experts say the spyware can activate a phone’s microphone and camera without a user’s knowledge. (Karl-Josef Hildenbrand/picture alliance via Getty Images)

Kurt’s key takeaways

ZeroDayRAT spyware feels unsettling because it attacks something we rely on every day. Your phone holds your conversations, photos, financial apps and personal routines. When a single piece of malware can see your screen, hear your voice and track your location, the stakes get higher. The silver lining is this. Most infections still depend on user action. A bad link was clicked. A suspicious app was installed. A warning ignored. Staying cautious may not sound exciting, but it remains one of the strongest defenses you have.

Now here is the question worth asking. If spyware can already access your camera, messages and money in one package, are tech companies and app stores doing enough to protect you? Let us know your thoughts by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.

Related Article

Android malware hidden in fake antivirus app
Advertisement
Continue Reading

Technology

Nothing couldn’t wait to show off the Phone 4A

Published

on

Nothing couldn’t wait to show off the Phone 4A

After teasing the upcoming launch of its midrange Phone 4A last week, Nothing has now revealed what the rear of the device looks like. An official render of the Phone 4A shared on X shows off the brand’s familiar transparent-industrial stylings, alongside a new “Glyph Bar” lighting feature located to the right of the triple camera island.

This Glyph Bar features nine individually controllable mini-LEDs that appear as a line of seven square lights — six white, and one red — replacing the three LED light strips that surround the camera on Nothing’s 3A devices. Nothing says that the Glyph Bar is 40 percent brighter than the previous A-series’ lights and uses patented tech to provide “a more natural, neutral, bleed-free glow.”

Nothing hasn’t shared much else about the Phone 4A series besides confirming it’ll be running a Snapdragon chip. Full specifications, price, and availability might not be announced until it launches on March 5th. Nothing CEO Carl Pei has confirmed that there won’t be a Phone 4 this year, however, so last year’s Phone 3 will remain the current flagship for now.

Continue Reading

Trending