Connect with us

Technology

Looking for more ways to lock down your Android? Here's how to do it

Published

on

Looking for more ways to lock down your Android? Here's how to do it

In the digital age, securing your personal data is more important than ever, especially on devices that travel with us everywhere, like our smartphones. 

If you’re an Android user, you’re in luck because there are several built-in features to help you lock down your device. 

Let’s dive into some of these options and ensure your information stays safe and secure.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

A man holding an Android. (Kurt “CyberGuy” Knutsson)

Advertisement

Understanding your Android’s settings

Firstly, it’s crucial to understand that the settings we’ll discuss may vary depending on your Android phone’s manufacturer. So, if you don’t find the exact option, don’t worry — just look for similar terms or consult your phone’s help guide.

A woman holding an Android. (Kurt “CyberGuy” Knutsson)

BEST ANTIVIRUS FOR ANDROIDS — CYBERGUY PICKS 2024

How to lock your Android

To start, let’s explore the standard lock options available on most Android devices:

Advertisement
  • Go to Settings. You’ll want to look for the gear icon on your home screen or app drawer and tap it
  • Scroll down until you find the ‘Security and Privacy’ option and tap it
  • Within the security settings, find and tap on Lock Screen
  • Next, select ‘Screen Lock’ to view your current security method

Steps to lock your Android.

  • Enter your current password, PIN, pattern, etc., to proceed
  • You’ll see a list of all the options you can use, such as a PIN, pattern or password. Select the one you prefer and set it up

Steps to lock your Android. (Kurt “CyberGuy” Knutsson)

BEST ACCESSORIES FOR YOUR ANDROID 

How to enable biometric security options

Now, let’s move on to the more advanced biometric options:

  • If your phone has a fingerprint scanner, consider using fingerprints for security
  • Input your current password to access these settings
  • Here, you can rename any set Fingerprints, add new ones and check what fingerprints are named
  • Ensure the ‘Fingerprint Unlock’ option is enabled so you can use it on your lock screen

Steps to enable biometric security options. (Kurt “CyberGuy” Knutsson)

  • Go back by clicking the back arrow
  • Tap Face Recognition
  • Input your current password
  • If you haven’t set up face recognition yet, it’ll prompt you to do so by clicking Continue

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Steps to enable biometric security options. (Kurt “CyberGuy” Knutsson)

  • Hold your phone in front of your face to capture your likeness
  • Once set up, you’ll have options to remove your face data or Add alternative appearance to enhance recognition

Steps to enable biometric security options. (Kurt “CyberGuy” Knutsson)

By taking advantage of built-in security features like screen locks, fingerprint scanners and face recognition, you can safeguard your personal data and enjoy peace of mind while using your smartphone.

TOP ANDROID PHONES OF 2024

Advertisement

Kurt’s key takeaways

Securing your Android device is a simple yet vital step in protecting your digital life. Whether you choose a traditional method like a PIN or pattern or opt for biometric security, the key is to select a method that you’ll consistently use. Remember, the strongest lock is the one you’ll always engage. So, take a moment to review your security settings and give yourself the peace of mind that comes with a well-protected device.

If you could add or improve one security feature on your Android device, what would it be and why?  Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Technology

Can autonomous trucks really make highways safer?

Published

on

Can autonomous trucks really make highways safer?

NEWYou can now listen to Fox News articles!

Kodiak AI, a leading provider of AI-powered autonomous driving technology, has spent years quietly proving that self-driving trucks can work in the real world. The company’s core system, the Kodiak Driver, brings software and hardware together in a practical way. As the company explains, “The Kodiak Driver combines advanced AI-driven software with modular, vehicle-agnostic hardware into a single, unified platform.” 

That approach matters because trucking is not a closed lab environment. It is highways, weather, fatigue and long hours. Kodiak’s strategy focuses on solving those realities first.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

How public views on autonomous trucks are changing

During a recent episode of CyberGuy’s “Beyond Connected” podcast, Kurt spoke with Daniel Goff, vice president of external affairs at Kodiak AI, about how attitudes toward autonomous trucks have shifted over time.

Advertisement

WILL AUTONOMOUS TRUCKS REPLACE DRIVERS BY 2027?

Autonomous trucks are already hauling freight on public highways as companies test how the technology performs in real-world conditions. (Kodiak)

Goff described how different the reaction was when the company first launched. “Kodiak was founded in 2018, and I joined in 2019. When I first started at the company, I said I worked for a company that was working to build trucks that drive themselves, and people kind of looked at me like I was crazy. Over the last few years, we’ve really seen autonomous vehicles capture the public’s imagination. We’ve seen them grow in the real world. I think that people are getting more used to this idea.”

For Goff, that shift has come from seeing the technology operate safely outside of test environments, where performance matters more than hype.

Why autonomous trucks could improve road safety

One of Kodiak AI’s central arguments is simple. Machines avoid many of the risks that come with human driving. “We think there are advantages to this technology that humans, myself included, can’t match. You know this technology doesn’t get distracted. It doesn’t check its phone. It doesn’t have a phone. It doesn’t have a bad day to take it out on the road. It doesn’t speed. It doesn’t know how to speed. You know they’re pretty boring drivers.” In trucking, boring is often a good thing.

Advertisement

Where autonomous trucks are already operating today

Kodiak AI is already doing this on real roads. The company has been running active freight routes for years, not just testing in controlled settings. “Kodiak’s headquarters are in Mountainview, California, but since 2019, we’ve had a command center in Lancaster, Texas, which is just south of Dallas. Since 2019, we’ve actually been delivering freight from that Lancaster hub to Houston, Oklahoma City and Atlanta with what we call a safety driver behind the wheel.”

Those real-world miles have helped Kodiak fine-tune its system in everyday traffic, weather and long-haul conditions.

Tractor trailers at the entrance of the Port of Baltimore in Baltimore, Maryland, on Tuesday, Oct. 8, 2024. (Nathan Howard/Getty Images)

The trucking problem Kodiak is trying to solve

Long-haul trucking is essential to the U.S. economy, but it is also one of the most demanding and risky jobs on the road. Drivers spend long stretches away from home, work extended hours and operate heavy vehicles in all conditions. As Goff put it, “Driving a truck is one of the most difficult and dangerous jobs that people do in the United States every day. You know, being a truck driver means, for at least a long haul truck driver, means you’re away from your family for sometimes days, weeks, even months at a time, sleeping in the back of the truck.”

He also pointed to federal safety rules that limit how long drivers can stay behind the wheel, which are meant to reduce fatigue but also restrict how much freight one person can move in a day. “If you’re driving the 11-hour legal maximum per day and there are people who love being long-haul truckers, but we’re not seeing people stepping up for those roles anymore in this country, and drivers are retiring every year.”

Advertisement

Those realities have contributed to ongoing driver shortages and growing pressure on the freight system. Kodiak believes autonomous technology is best used where the job is hardest and most repetitive. “The goal for this technology is really best suited for those really tough jobs. The long lonely highway miles, the trucking and remote locations where people either don’t wanna live or don’t or can’t easily live.”

Goff also highlighted how much capacity is lost simply because trucks sit idle for most of the day. “The average truck is driven about seven hours a day in the US, and you know there are 24 hours a day, so that’s a lot of time just sitting there.”

Autonomy, he said, could help change that math. “The goal of the technology is that you can basically run 24/7, just kind of stopping to refuel, to inspect the truck for safety, and you know, other than that, the trucks are moving.”

Long-haul trucking is one of the most demanding jobs on the road, which is why autonomous systems focus on long, repetitive highway routes. (Kodiak)

How many miles Kodiak AI has driven to prove safety

Kodiak AI emphasizes data over promises. “We’ve driven over 3 million miles with a safety driver behind the wheel for most of those miles, meaning somebody ready to take over at any time. So, we got a very good track record.” To put that into perspective, Goff added, “The average American drives about 800,000 miles in their lifetime, which seems crazy. That’s a lot of driving, but we’re at almost 4 average lifetimes with our system today, and we also use computer simulation, all sorts of things to assess the safety of the system.”

Advertisement

In addition to its long-haul operations, Kodiak AI works with Atlas Energy Solutions, which does oil logistics in the Permian Basin of West Texas and eastern New Mexico. As of Q3 2025, the company has delivered 10 driverless trucks to Atlas, which autonomously deliver sand up to 24 hours a day with no human operator in the cab. Goff says, “We see our work in the Permian as a perfect sandbox for our long-haul operations.”

The company has also sought third-party validation. “Additionally, we have done external-facing studies. We did a study with a company called Nauto, which is one of the leaders in AI-enabled dashcams. They actually help vehicle fleets compute safety scores from an outside perspective. Our system scored the highest ever in the Nauto safety score.”

THE ROAD TO PROSPERITY WILL BE PAVED BY AUTONOMOUS TRUCKING

Where autonomous truck regulations stand today

Policy is another key factor in adoption. “From a regulatory perspective. 25 states have passed laws allowing autonomous vehicle deployment.” Goff believes the danger of everyday driving makes the case clear. “I think people who think about transportation every day understand how dangerous driving a car is, driving a truck is, and just being on the road see the potential for this technology.”

What critics say about autonomous trucks

Autonomous trucking still raises concerns among safety advocates and everyday drivers. Critics question whether software can respond fast enough in emergencies, handle unpredictable human behavior or make judgment calls during complex highway situations.

Advertisement

Kodiak AI says those concerns are exactly why safety comes first. As Goff explained, “In this industry in particular, we really understand how important it is to be safe.”

The company argues that autonomous systems must earn trust over time through real-world performance, transparent testing and measurable results, not promises or hype.

What this means to you

For everyday drivers, autonomous trucks raise understandable questions. Sharing the road with a vehicle controlled by software can feel unsettling, especially when headlines often focus on what could go wrong. Kodiak’s argument is that safety improves when fatigue, distraction and emotional decision-making are removed from long highway driving. If the technology continues to perform as claimed, the impact could show up in quieter ways. That includes fewer tired drivers on overnight routes, more predictable freight movement and potentially safer highways over time. For consumers, it could also mean fewer delivery delays and less strain on a trucking system already short on drivers.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Safety data, real-world miles and third-party reviews now play a central role in building trust in self-driving trucks.  (Kurt “CyberGuy” Knutsson)

Advertisement

Kurt’s key takeaways

Autonomous trucking is not a future concept anymore. Kodiak AI is already moving freight and collecting real safety data on public roads. At the same time, skepticism remains healthy and necessary. Trust in this technology will rise or fall based on transparency, regulation and long-term performance, not promises. The real question is no longer whether self-driving trucks can operate. It is whether they can consistently prove they make roads safer for everyone who shares them.

Would you trust autonomous trucks more if they could show a better safety record than human drivers over time? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement

Continue Reading

Technology

X claims it has stopped Grok from undressing people, but of course it hasn’t

Published

on

X claims it has stopped Grok from undressing people, but of course it hasn’t

Updates to [@]Grok Account

We have implemented technological measures to prevent the Grok account from allowing the editing of images of real people in revealing clothing such as bikinis. This restriction applies to all users, including paid subscribers.

Additionally, image creation and the ability to edit images via the Grok account on the X platform are now only available to paid subscribers. This adds an extra layer of protection by helping to ensure that individuals who attempt to abuse the Grok account to violate the law or our policies can be held accountable.

Geoblock update

We now geoblock the ability of all users to generate images of real people in bikinis, underwear, and similar attire via the Grok account and in Grok in X in those jurisdictions where it’s illegal.

Advertisement
Continue Reading

Technology

Malicious Mac extensions steal crypto wallets and passwords

Published

on

Malicious Mac extensions steal crypto wallets and passwords

NEWYou can now listen to Fox News articles!

Mac users often assume they’re safer than everyone else, especially when they stick to official app stores and trusted tools.

That sense of security is exactly what attackers like to exploit. Security researchers have now uncovered a fresh wave of malicious Mac extensions that don’t just spy on you, but can also steal cryptocurrency wallet data, passwords and even Keychain credentials. What makes this campaign especially concerning is where the malware was found, inside legitimate extension marketplaces that many people trust by default.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Once active, GlassWorm targets passwords, crypto wallets, and even your macOS Keychain without obvious warning signs. (Cyberguy.com)

Advertisement

How malicious Mac extensions slipped into trusted stores

Security researchers at Koi Security uncovered a new wave of the GlassWorm malware hiding inside extensions for code editors like Visual Studio Code (via Bleeping Computer). If you’re not familiar with code editors, they’re tools developers use to write and edit code, similar to how you might use Google Docs or Microsoft Word to edit text. These malicious extensions appeared on both the Microsoft Visual Studio Marketplace and OpenVSX, platforms widely used by developers and power users.

FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE

At first glance, the extensions looked harmless. They promised popular features like code formatting, themes or productivity tools. Once installed, though, they quietly ran malicious code in the background. Earlier versions of GlassWorm relied on hidden text tricks to stay invisible. The latest wave goes further by encrypting its malicious code and delaying execution, making it harder for automated security checks to catch.

Even though this campaign is described as targeting developers, you don’t need to write code to be at risk. If you use a Mac, install extensions or store passwords or cryptocurrency on your system, this threat still applies to you.

What GlassWorm does once it’s on your Mac

Once active, GlassWorm goes after some of the most sensitive data on your device. It attempts to steal login credentials tied to platforms like GitHub and npm, but it doesn’t stop there. The malware also targets browser-based cryptocurrency wallets and now tries to access your macOS Keychain, where many saved passwords are stored.

Advertisement

Researchers also found that GlassWorm checks whether hardware wallet apps like Ledger Live or Trezor Suite are installed. If they are, the malware attempts to replace them with a compromised version designed to steal crypto. That part of the attack isn’t fully working yet, but the functionality is already in place.

To maintain access, the malware sets itself up to run automatically after a reboot. It can also allow remote access to your system and route internet traffic through your Mac without you realizing it, turning your device into a quiet relay for someone else.

Some of the malicious extensions showed tens of thousands of downloads. Those numbers can be manipulated, but they still create a false sense of trust that makes people more likely to install them.

7 steps you can take to stay safe from malicious Mac extensions

Malicious extensions don’t look dangerous. That’s what makes them effective. These steps can help you reduce the risk, even when threats slip into trusted marketplaces.

1) Only install extensions you actually need

Every extension you install increases risk. If you’re not actively using one, remove it. Be especially cautious of extensions that promise big productivity gains, premium features for free or imitate popular tools with slightly altered names.

Advertisement

2) Verify the publisher before installing anything

Check who made the extension. Established developers usually have a clear website, documentation and update history. New publishers, vague descriptions or cloned names should raise red flags.

These malicious extensions looked like helpful tools but quietly ran hidden code once installed. (Cyberguy.com)

3) Use a password manager

A password manager keeps your logins encrypted and stored safely outside your browser or editor. It also ensures every account has a unique password, so if one set of credentials is stolen, attackers can’t reuse it elsewhere.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

Advertisement

HOW HACKERS ARE BREAKING INTO APPLE DEVICES THROUGH AIRPLAY

4) Run strong antivirus software on your Mac

Modern macOS malware doesn’t always drop obvious files. Antivirus tools today focus on behavior, looking for suspicious background activity, encrypted payloads and persistence mechanisms used by malicious extensions. This adds a critical safety net when something slips through official marketplaces.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

5) Consider a personal data removal service

When your data leaks, it often spreads across data broker sites and breaches databases. Personal data removal services help reduce how much of your information is publicly available, making it harder for attackers to target you with follow-up scams or account takeovers.

Advertisement

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

6) Turn on two-factor authentication (2FA)

Enable 2FA wherever possible, especially for email, cloud services, developer platforms and crypto-related accounts. Even if a password is stolen, 2FA can stop attackers from logging in.

7) Keep macOS and your apps fully updated

Security updates close gaps that malware relies on. Turn on automatic updates so you’re protected even if you miss the headlines or forget to check manually.

Advertisement

Mac users often trust official app stores, but that trust is exactly what attackers are counting on. (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaway

GlassWorm shows that malware doesn’t always come from shady downloads or obvious scams. Sometimes it hides inside tools you already trust. Even official extension stores can host malicious software long enough to cause real harm. If you use a Mac and rely on extensions, a quick review of what’s installed could save you from losing passwords, crypto or access to important accounts.

When was the last time you checked the extensions running on your Mac? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Advertisement

Copyright 2026 CyberGuy.com. All rights reserved. 

Continue Reading
Advertisement

Trending