Connect with us

Technology

LG just made the fastest OLED gaming display yet

Published

on

LG just made the fastest OLED gaming display yet

LG Display, a manufacturer that makes and sells displays to other companies, is showing off a new OLED display that could soon appear in high-end gaming monitors. At 27 inches, this 1440p panel pairs a speedy 0.03ms response time with a 480Hz refresh rate — making it the fastest in OLED displays so far.

LG’s new screen is even better than the one in the 32-inch OLED “Dual-Hz” gaming monitor (32GS95UE) it announced in December. While this monitor similarly offers a refresh rate of up to 480Hz, you have to toggle the display down to 1080p to take advantage of that speed.

It also puts LG Display on track to compete with the panel recently announced by Samsung’s display arm, which offers a slightly lower 360Hz refresh rate and a 1440p resolution. Samsung has already adopted the panel for its new 27-inch Odyssey OLED G6 gaming monitor, and it looks like MSI and Dell may be using it in forthcoming monitors as well.

LG Display says the panel comes with the company’s “META Technology,” a feature that’s supposed to offer better brightness and wider viewing angles. The company also claims it emits the “lowest level of blue light in the industry.” It’s still too early to know whether any gaming companies will adopt LG Display’s new panel. LG Display plans on releasing its 27-inch OLED 480Hz panel during the first half of this year and will show off “its full lineup” of OLED gaming displays during CES 2024, which range from 27 to 45 inches.

With two of the biggest display makers developing OLED panels that prioritize high refresh rates, it’s a sign we’re going to see a lot more gaming monitors using the technology soon.

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

FBI email hack shows why you must lock down your tech

Published

on

FBI email hack shows why you must lock down your tech

NEWYou can now listen to Fox News articles!

Here’s the uncomfortable truth. If someone can break into the personal email of the head of the Federal Bureau of Investigation, your inbox is not off limits.

Malicious actors targeted the personal email account of FBI Director Kash Patel, according to the FBI, and a group known as the Handala Hack Team in Iran has claimed responsibility for posting photos and documents online.

No classified systems were breached. But that is not the point. The real story is this: the front lines of cyber warfare now run straight through personal accounts like yours.

FBI SAYS ‘MALICIOUS ACTORS’ TARGETED PATEL’S PERSONAL EMAIL, IRAN-BASED HACKING GROUP CLAIMS RESPONSIBILITY

Advertisement

Hackers didn’t breach FBI systems; they accessed a personal email account, showing how everyday accounts can become targets. (Donato Fasano/Getty Images)

Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

What happened in the FBI director’s email hack

Hackers gained access to Patel’s personal email account, not any official FBI systems. The stolen material included photos, travel details and older messages that spanned more than a decade, with emails dating from around 2011 through 2022.

The FBI said “malicious actors” targeted Patel’s personal email account but did not attribute the attack to a specific country. A group known as the Handala Hack Team, which operates out of Iran, has claimed responsibility for the breach.

The Federal Bureau of Investigation says no government or classified data was compromised. The U.S. State Department is offering up to a $10 million reward for information leading to the identification of members of the Handala Hack Team. CyberGuy reached out to the FBI for comment, but did not receive a response before our deadline.

Advertisement

A cybersecurity expert described the exposed material as a “personal junk drawer.” That detail is what makes this incident hit close to home. Most people have one too.

The threat is real and it is getting more sophisticated

This does not appear to be random. U.S. officials have warned for years that foreign government-linked hackers, including groups associated with Iran, have targeted Americans, especially those connected to government or politics. These campaigns often ramp up during periods of geopolitical tension. Similar actors have previously targeted individuals tied to the Trump administration, including:

  • Donald Trump Jr.
  • Todd Blanche
  • Lindsey Halligan

These groups also hit private companies. In one recent case, hackers claimed responsibility for disrupting operations at a U.S. medical device company and spreading propaganda tied to geopolitical events. This is coordinated. It is persistent. And it is not slowing down.

Why your everyday tech is now part of the battlefield

Cyber warfare used to target government systems. Now it targets you. Why? Because personal accounts are easier to break into. They are often protected by reused passwords, old emails and weak security habits.

Once hackers get in, they can:

  • Map out your life through old messages
  • Steal personal photos or financial details
  • Impersonate you in scams
  • Use your contacts to spread attacks

FBI Director Kash Patel speaks during a press briefing at the White House in Washington, D.C., on Nov. 12, 2025. (AP Photo/Evan Vucci)

In simple terms, your digital life can be used against you or someone you know. 

Advertisement

IF SOMEONE GETS INTO YOUR EMAIL, THEY OWN EVERY ACCOUNT YOU HAVE. THESE 3 MOVES LOCK THEM OUT FOR GOOD

What you need to do right now to lock down your tech

I know it can sound intimidating, but it really comes down to this. You don’t need special skills, just a few smarter habits starting today.

1) Turn on two-factor authentication everywhere

Two-factor authentication (2FA) is one of the strongest defenses you have. Even if someone steals your password, they cannot get in without the second code. Focus on your email first. That is the master key to everything else.

2) Stop reusing passwords

If you reuse one password across accounts, one breach can unlock your entire digital life. Use a password manager and create unique passwords for each account. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

3) Clean out your “digital junk drawer”

Remember that phrase from the FBI case? Old emails, documents and attachments can expose years of your life. Go back and delete anything you no longer need, especially files that contain personal, financial or travel details. For anything important, move it to a secure location instead of leaving it sitting in your inbox. You can also check out CyberGuy’s 5 digital clean-up tips you didn’t know you needed to reduce long-term clutter and limit what attackers could access if your account is ever compromised.

Advertisement

4) Watch for highly targeted phishing

These attacks are getting more convincing. Hackers can use stolen data to craft emails that look personal and real. Always double-check links and sender addresses before clicking. Use strong antivirus software that can detect suspicious links, block malicious downloads and warn you before you interact with a dangerous site. Think of it as an extra layer of defense you do not have to think about. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

5) Consider using a data removal service

Even if you clean up your inbox, your personal information may already be circulating online through data broker sites. These companies collect and sell details like your address, phone number and even past activity. A data removal service can help automatically request the removal of your information from hundreds of these sites, reducing what hackers can find and use against you.

 6) Keep your devices updated Updates fix known security flaws. Delaying them gives attackers a window to exploit your device.

7) Separate your digital life

Use different email accounts for banking, shopping and personal communication. This limits the damage if one account is compromised. Consider using email aliases, which are alternate addresses that forward to your main inbox. For example, you can use one alias for online shopping and another for signups. If one alias gets exposed or starts receiving spam, you can disable it without affecting your primary email account. For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com

Cyberattacks today often focus on personal data like emails and photos, which can be used to expose or manipulate victims. (Philip Dulian/picture alliance via Getty Images)

Advertisement

8) Use passkeys where available

Passkeys replace passwords with a secure login tied to your device or biometrics. They cannot be reused or phished, which makes them one of the safest ways to protect your accounts today.

Kurt’s key takeaways

The U.S. is facing capable cyber adversaries. Hacker groups have shown they can keep pushing, adapt quickly and target both institutions and individuals. At the same time, the most common entry point is still simple. A weak password. An old email account. A moment of inattention. That means the first line of defense is not just government agencies. It is you.

What’s one thing you’ve done or haven’t done to protect your accounts that still worries you? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

Advertisement

Copyright 2026 CyberGuy.com.  All rights reserved.  

Continue Reading

Technology

The best deals we’ve found from Amazon’s Big Spring Sale (so far)

Published

on

The best deals we’ve found from Amazon’s Big Spring Sale (so far)

Amazon loves to manufacture an event. March is historically a dry spell for deals; however, with Amazon’s third annual Big Spring Sale, which runs through March 31st, the retail behemoth is hoping to lure in would-be shoppers with the promise of steep(ish) savings and discounts on more seasonal, spring-centric items to hold folks over until Prime Day surfaces at the onset of summer.

The bulk of the deals we’re seeing right now aren’t quite on par with Black Friday or Prime Day, and, as with most shopping events, not everything on sale is worth picking up. That said, Amazon’s latest sale is one of the first big opportunities we’ve seen this year to save — and bypass some tariff-induced pain — especially since some of our favorite gadgets are currently matching their lowest prices to date, including headphones, robot vacuums, and a slew of charging accessories.

To help you sift through it all, we’re focusing squarely on the gadgets that are actually worth picking up, many of which we’ve tested and recommend even at full price. You’re not limited to Amazon, either. Retailers like Best Buy and Walmart are offering the same deals in a lot of cases, meaning you don’t necessarily need to succumb to shopping at the so-called “Everything Store” just to save a buck (or 50).

Headphone and earbud deals

Streaming and soundbar deals

Advertisement

Fitness tracker and smartwatch deals

Other Verge-approved deals

Update, March 28th: Adjusted to reflect current pricing / availability and several new deals, including those for Apple’s latest entry-level iPad, the Breville Barista Express, and JBL’s Flip 7 speaker.

Continue Reading

Technology

Why that $4 charge on your statement could be fraud

Published

on

Why that  charge on your statement could be fraud

NEWYou can now listen to Fox News articles!

A $4 charge is easy to ignore. It might appear as a parking fee, a small purchase or a vague merchant name that doesn’t raise any red flags. Consumer protection groups and law enforcement say scammers are counting on that.

Recent warnings describe a pattern sometimes called “ghost tapping,” where small, unfamiliar charges show up on contactless payment cards without a clear point of purchase. The amounts are easy to miss, but they can signal unauthorized access to your payment method rather than a simple billing error.

Sign up for my FREE CyberGuy Report. Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

GHOST-TAPPING SCAM TARGETS TAP-TO-PAY USERS

Advertisement

A small, unfamiliar charge can be the first sign your payment details are being tested without your knowledge. (Leonie Asendorpf/picture alliance via Getty Images)

How does ghost tapping work?

Better Business Bureau (BBB) warnings use the term “ghost tapping” to describe these incidents in consumer alerts. In simple terms, it means a payment can be triggered without you actively making a purchase.  

One reported method involves compromised payment terminals that quietly process low-value contactless charges. Another involves unauthorized NFC readers operating at close range, sometimes in crowded places. In these cases, a card or mobile wallet can be charged within inches.

Because these transactions run through standard contactless payment networks, they appear as normal card-present purchases. There is usually no clear sign on your statement that anything was wrong.

The small charges aren’t arbitrary

Low-dollar transactions are used to confirm that a card can be charged without being declined. When a small charge goes through, it signals that the payment details are active and usable. Once that charge goes through, it establishes a working payment path. Scammers can then run additional transactions using the same card details, sometimes across different merchants or terminals. Many people only notice these charges after they post to an account. At that point, the transaction appears as a completed purchase, not a pending authorization.

Advertisement

Why acting quickly matters

This means a charge that looks harmless could actually be the first step in a larger fraud attempt. Over time, these fraudulent charges may extend beyond a single card. If your payment details have been exposed or are stored in a compromised system, they can be reused until you cancel the card. That can result in multiple charges over several days or even billing cycles.

Delays in reporting also affect how quickly you can stop fraud. The Federal Trade Commission (FTC) advises you to report unauthorized charges as soon as they are identified. In practice, that means contacting your card issuer as soon as you see a charge you don’t recognize, either through the issuer’s app or customer service line.

Credit cards typically offer stronger fraud protections than debit cards, where money may be withdrawn directly from your bank account. Under federal law, liability for unauthorized credit card charges is limited, but those protections depend on when you report it.

Scammed? What federal agencies say to do next

If you spot a charge you don’t recognize, acting quickly can limit damage and protect your rights under federal law.

Review transactions as they post

The FTC recommends checking account activity regularly and flagging any unfamiliar charges as soon as they appear.

Advertisement

Contact your card issuer immediately

The Consumer Financial Protection Bureau (CFPB) advises reporting the charge right away and opening a dispute through your issuer’s app or customer service line.

Submit a formal dispute within 60 days

To preserve protections under the Fair Credit Billing Act, you must send a billing error notice within 60 days of the statement that includes the charge.

Understand the investigation timeline

Card issuers must acknowledge your dispute within 30 days and resolve it within two billing cycles, typically no more than 90 days.

Confirm the charge details before disputing

Check the merchant name, date and amount, since some transactions may appear under payment processors or parent companies.

Replace or block the card if needed

If the charge is unauthorized, the issuer can cancel the card and issue a replacement to stop further transactions.

Advertisement

Scammers often use small charges to confirm your card works before making larger unauthorized transactions. (Clara Margais/picture alliance via Getty Images)

Simply keeping an eye on your accounts may not be enough

Even if you check your statements regularly, small charges can still slip through and delay detection.

Timing can work against you

A lot hinges on when you check your account. If you review transactions infrequently or rely on monthly statements, unauthorized charges may only surface after they’ve already posted. By then, multiple transactions can appear across different dates or merchant names, making them harder to spot.

Alerts don’t always catch small charges

Notifications are not always consistent across accounts. Some banks alert you only after a transaction is completed, while others set thresholds that don’t flag low-dollar amounts. That can allow small charges to slip through without notice. If the same payment details are used elsewhere, activity may not appear in one place.

Ways to protect yourself from ghost tapping

These simple steps can help reduce your risk and catch suspicious charges before they turn into bigger fraud.

Advertisement

1) Turn on transaction alerts

Set up real-time alerts for all charges, even small ones, so you can spot suspicious activity immediately.

2) Use mobile wallets when possible

Apple Pay and Google Pay use tokenization, which means your real card number is not shared with merchants.

3) Keep your card secure in crowded places

Contactless cards can be read at close range, so avoid leaving them exposed in busy environments.

4) Check your accounts more frequently

Do not rely on monthly statements. Review transactions every few days to catch issues early.

How broader monitoring can help

Even with these steps, some suspicious activity may not show up in one place or right away. That’s where broader monitoring comes in. Identity and credit monitoring services are designed to track changes tied to your financial and personal information as they happen. This can include transaction monitoring along with three-bureau credit monitoring, so activity linked to your identity can be seen across accounts and credit files at the same time. That includes new inquiries, account openings and changes that would not appear in any one banking app.

Advertisement

Some services also scan known data breach records and dark web marketplaces for exposed personal information. If your data appears in those sources, you can receive an alert tied to the specific identifier that was found.

HOW DEBIT CARD FRAUD CAN HAPPEN WITHOUT USING THE CARD

If suspicious activity is detected, many platforms offer tools to take action quickly. This may include locking your credit file and working with a U.S.-based fraud resolution team to contact card issuers, dispute charges and close affected accounts.

Some identity protection services also include insurance coverage, often up to $1 million per adult, to help cover eligible losses and legal fees, along with 24/7 fraud resolution support to help restore your identity.

No service can prevent every kind of identity theft. If it happens, monitoring and guided support can make recovery easier to manage.

Advertisement

How to check if your personal information was exposed

If you are unsure whether your personal information has already been exposed, take action now. Our No. 1 identity theft protection pick includes a free identity breach scan, which allows you to see whether your data appears in known leaks. Early detection gives you more control and helps you respond before fraud spreads.

See my tips and best picks on Best Identity Theft Protection at Cyberguy.com.

Catching a suspicious charge early and reporting it quickly can help stop further fraud before it escalates.  (M. Scott Brauer/Bloomberg via Getty Images)

Kurt’s key takeaways

A small charge is easy to ignore, especially when it blends in with everyday purchases. But as these reports show, that’s exactly what scammers are counting on. A few dollars can be the first sign that your payment details are active and vulnerable, giving attackers a way to test and expand access without raising alarms. 

The sooner you catch it, the easier it is to stop. This is one of those situations where habits matter. Checking your transactions regularly, acting quickly on anything unfamiliar and adding an extra layer of monitoring can make a real difference. Fraud doesn’t always start big, but it often starts small.

Advertisement

Have you ever spotted a small charge you almost ignored that turned out to be fraud, and how did you handle it? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report. Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com.  All rights reserved.  

Advertisement
Continue Reading

Trending