Today marked a second weekend of scattered protests at Tesla showrooms, following a “TeslaTakeover” hashtag that has been trending on Twitter alternative Bluesky this week. Protestors’ messages largely focused on the divisive efforts of Tesla CEO Elon Musk as the head of the Department of Government Efficiency since the start of Donald Trump’s Presidency.
Technology
OpenAI has evidence that its models helped train China’s DeepSeek
![OpenAI has evidence that its models helped train China’s DeepSeek OpenAI has evidence that its models helped train China’s DeepSeek](https://platform.theverge.com/wp-content/uploads/sites/2/2025/01/STKB320_DEEPSEEK_AI_CVIRGINIA_D.jpg?quality=90&strip=all&crop=0%2C10.732984293194%2C100%2C78.534031413613&w=1200)
Chinese artificial intelligence company DeepSeek disrupted Silicon Valley with the release of cheaply developed AI models that compete with flagship offerings from OpenAI — but the ChatGPT maker suspects they were built upon OpenAI data.
OpenAI and Microsoft are investigating whether the Chinese rival used OpenAI’s API to integrate OpenAI’s AI models into DeepSeek’s own models, according to Bloomberg. The outlet’s sources said Microsoft security researchers detected that large amounts of data were being exfiltrated through OpenAI developer accounts in late 2024, which the company believes are affiliated with DeepSeek.
OpenAI told the Financial Times that it found evidence linking DeepSeek to the use of distillation — a common technique developers use to train AI models by extracting data from larger, more capable ones. It’s an efficient way to train smaller models at a fraction of the more than $100 million that OpenAI spent to train GPT-4. While developers can use OpenAI’s API to integrate its AI with their own applications, distilling the outputs to build rival models is a violation of OpenAI’s terms of service. OpenAI has not provided details of the evidence it found.
President Donald Trump’s artificial intelligence czar David Sacks said “it is possible” that IP theft had occurred. “There’s substantial evidence that what DeepSeek did here is they distilled knowledge out of OpenAI models and I don’t think OpenAI is very happy about this,” Sacks told Fox News on Tuesday.
“We know PRC (China) based companies — and others — are constantly trying to distill the models of leading US AI companies,” OpenAI said in a statement to Bloomberg. “As the leading builder of AI, we engage in countermeasures to protect our IP, including a careful process for which frontier capabilities to include in released models, and believe as we go forward that it is critically important that we are working closely with the US government to best protect the most capable models from efforts by adversaries and competitors to take US technology.”
![](https://newspub.live/wp-content/uploads/2022/03/np-logo.png)
Technology
‘TeslaTakeover’ protests are small, but numerous
![‘TeslaTakeover’ protests are small, but numerous ‘TeslaTakeover’ protests are small, but numerous](https://platform.theverge.com/wp-content/uploads/sites/2/2025/02/gettyimages-2199120167.jpg?quality=90&strip=all&crop=0%2C10.737892056687%2C100%2C78.524215886627&w=1200)
The protests don’t appear to be especially large, but they are numerous, ranging from places like New York to lesser-known locales like Minneapolis, Minnesota suburb Golden Valley. A section of Action Network’s site for organizing protests shows rallies planned for cities in Ohio, Florida, Washington, New Mexico, and Alberta, Canada.
Tesla investors have expressed concern that Musk’s activities are negatively impacting the company, which saw its stock price plummet by 21 percent since Trump’s inauguration according to an ABC story this week. Inside the company, employees and senior staff said in a recent meeting that “the company would be better off if Musk resigned,” The Washington Post reported.
One of the larger rallies today was outside of Tesla’s Manhattan showroom, where a previous protest took place on February 9th. In the videos below, people can be heard chanting, “Don’t buy swasticars” and “Elon Musk can go to Mars; we don’t need your Nazi cars,” perhaps referencing Musk’s support for far-right groups like Germany’s AfD party or his suspicious salute on Inauguration Day.
Other posts showed what protests looked like today in Berkeley, California:
San Francisco, California:
And Kansas City, Missouri:
Similar gatherings occurred in Austin, Texas; Seattle, Washington; and Boston, Massachusetts. Meanwhile, few appear to have shown up today in Pittsburgh, Pennsylvania:
Or Baltimore, Maryland, where a single person held a sign outside a Tesla showroom:
Actor, director, and progressive activist Alex Winter, who heavily promoted this weekend’s protests over the last few days, posted an image of himself holding a sign urging people to sell their Teslas at a protest in Pasadena, California:
Winter re-shared posts from protests at Tesla showrooms in the California cities Corte Madera, San Jose, and Los Angeles, along with others from people who’d posted about rallies in Rockville, Maryland; Tucscon, Arizona; and Golden Valley, Minnesota.
There are many posts on Bluesky with the #TeslaTakeover hashtag, but far fewer show up when searching X, Instagram, or Threads. Outside of picketing, others protested Musk in different ways. Musician Sheryl Crow posted a video of a Tesla being driven away on a flatbed truck, along with a message saying “There comes a time when you have to decide who you are willing to align with. So long Tesla,” and noting that she had donated the money to NPR, which is currently threatened by an FCC investigation into public media.
More protests are expected, including during the President’s Day holiday on Monday, with one set for Lowell, Maine and at least one other in Richmond, Virginia. Those are in addition to numerous demonstrations planned this weekend that don’t target Tesla showrooms but still relate to the actions of Musk, DOGE, and President Trump more broadly.
Technology
How cyberscams are draining Americans wallets by the billions
![How cyberscams are draining Americans wallets by the billions How cyberscams are draining Americans wallets by the billions](https://static.foxnews.com/foxnews.com/content/uploads/2025/02/3-how-cyberscams-are-draining-americans-wallets-by-the-billions.jpg)
Cyberscams have reached alarming levels in the U.S., with nearly 30% of Americans falling victim to fraudulent schemes in the past year alone.
The financial toll is staggering — scams cost Americans over $159 billion annually, with average individual losses now exceeding $3,500 per victim. This epidemic is not just a financial crisis but also a human rights issue, as many scams originate from forced labor operations in Southeast Asia.
With nearly 90% of Americans targeted by scam attempts and 40% receiving suspicious messages daily, the question remains: how can we protect ourselves and hold perpetrators accountable in an increasingly digital world?
STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW
The word scam with data in the background (Kurt “CyberGuy” Knutsson)
The mechanics of “pig butchering”
One of the most pervasive scams today is the so-called “pig butchering” scheme. Originating in China and spreading across Southeast Asia, this scam involves criminals building trust with victims through social media or messaging apps. Once trust is established, victims are lured into fraudulent cryptocurrency investment schemes. These scams are meticulously crafted to appear legitimate, often involving fake trading platforms and simulated profits. Victims are encouraged to invest more until they are “slaughtered,” losing their entire savings when the scammers vanish with their funds.
9 WAYS SCAMMERS CAN USE YOUR PHONE NUMBER TO TRY TO TRICK YOU
Forced labor behind these scam centers
What makes these scams even more horrifying is their reliance on human trafficking. Criminal syndicates in countries like Myanmar, Cambodia and Laos force trafficked individuals to run these operations under threat of violence. These “scam centers” operate in lawless regions controlled by rebel groups or corrupt officials, making international intervention challenging. Survivors describe conditions akin to modern slavery, with physical abuse and even torture being common.
![cyberscam 2](https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/02/1200/675/2-how-cyberscams-are-draining-americans-wallets-by-the-billions-1.jpg?ve=1&tl=1)
Illustration of a scam on a computer key. (Kurt “CyberGuy” Knutsson)
BEST PRESIDENT’S DAY DEALS
Why America is a prime target
Cyberscams have taken hold in the U.S. for several reasons that make it particularly vulnerable. As an American, you’re likely connected to the digital world through social media platforms, messaging apps and other online tools. This high level of connectivity makes it easier for scammers to reach you directly, whether through a text message, email or social media chat. The sheer number of people online in the U.S. creates a vast pool of potential targets for cybercriminals.
Additionally, the growing popularity of cryptocurrency in the U.S. has made it a prime medium for fraud. Cryptocurrency transactions are fast, anonymous and difficult to trace, which makes them ideal for scammers looking to steal funds without leaving a trail. Many scams are designed to exploit this lack of transparency, leaving victims with little chance of recovering their money once it’s gone.
Another major issue is the lack of a centralized reporting system for cyberscams in the U.S. If you’ve ever been scammed or know someone who has, you might have noticed how confusing it can be to figure out where to report the crime — whether to the FBI, the Federal Trade Commission (FTC) or another agency. This fragmented system not only makes it harder for victims to seek help but also prevents authorities from gathering comprehensive data to tackle the problem effectively. These factors combined have made Americans some of the most targeted individuals in the world when it comes to cyberscams.
![person typing](https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/02/1200/675/3-how-cyberscams-are-draining-americans-wallets-by-the-billions.jpg?ve=1&tl=1)
Illustration of a scammer at work. (Kurt “CyberGuy” Knutsson)
FBI’S NEW WARNING ABOUT AI-DRIVEN SCAMS THAT ARE AFTER YOUR CASH
Global solutions: Lessons from other nations
Several countries have implemented innovative measures to combat cyberscams, offering valuable lessons for the U.S. Singapore, for instance, has introduced a mandatory SMS Sender ID Registry (SSIR) that requires organizations to register their alphanumeric Sender IDs. This system effectively blocks unregistered SMS senders, significantly reducing impersonation scams. In fact, cases involving scam SMSes in Singapore fell by 70% over three months after mandating the SSIR.
Britain has taken a different approach by establishing a dedicated “159” hotline, allowing residents to instantly verify suspicious calls. This simple yet effective system provides a quick way for individuals to check the legitimacy of unexpected communications, potentially preventing many scams before they occur.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Many nations have also implemented stricter authentication measures, such as biometric checks and in-app verifications, which have proven highly effective in reducing fraud. For example, Singapore has required facial verification for higher-risk transactions through Singpass since 2022, resulting in no further reports of malware-enabled scams involving unauthorized CPF withdrawals since its implementation in June 2023.
Some countries are exploring ways to slow down cryptocurrency transactions or cap transfer amounts, which could significantly hinder scammers who rely on quick, anonymous transfers. These measures, combined with a coordinated global response involving major victim nations like the U.S. and China, could prove instrumental in dismantling criminal networks more effectively. By learning from these international examples and adapting them to the American context, the U.S. could significantly strengthen its defenses against the rising tide of cyberscams.
![cyberscam 4](https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/02/1200/675/4-how-cyberscams-are-draining-americans-wallets-by-the-billions.jpg?ve=1&tl=1)
Illustration of scamming techniques. (Kurt “CyberGuy” Knutsson)
Tips to protect yourself and your loved ones
Recognizing red flags is essential to avoid falling victim to scams. Here are some important red flags to be aware of:
- Unsolicited calls or emails: Be wary of anyone asking for personal or financial information. Legitimate organizations will not ask for sensitive information in this manner.
- Urgent requests for payment: Scammers often demand immediate action to avoid scrutiny. Take a moment to verify the request through official channels before responding.
- Unfamiliar contact information: Be cautious if the contact information provided does not match the official contact details of the company or organization.
- Untraceable payment methods: Requests for payment via gift cards, cryptocurrency or wire transfers are major warning signs. Reputable companies will not ask for these types of payments.
- Too good to be true offers: If an offer seems too good to be true, it likely is. Research and verify any claims before proceeding.
10 ways to protect yourself from being scammed
Protecting yourself and your loved ones from scams requires vigilance and awareness. Here are eight effective ways to safeguard against scammers:
1. Verify before you act: Always verify the identity of the person or organization contacting you. Use official contact information to reach out directly and confirm the legitimacy of the request.
2. Limit personal information sharing: Avoid sharing personal or financial information over the phone, email or online unless you are certain of the recipient’s identity and legitimacy.
3. Use strong, unique passwords for all your accounts: A robust password should include a mix of uppercase and lowercase letters, numbers and symbols. Avoid reusing passwords across multiple platforms, and consider using a reputable password manager to store and generate complex passwords securely.
4. Enable two-factor authentication (2FA) wherever possible: 2FA adds an extra layer of security by requiring a secondary verification method, such as a code sent to your phone or biometric authentication. This ensures that even if your password is compromised, unauthorized access remains highly unlikely.
5. Keep your devices and software up to date: By regularly installing the latest updates and security patches, you can ensure your devices are equipped with the latest security features and bug fixes, reducing the risk of becoming a target for cyberattacks. Many cyberattacks exploit unpatched vulnerabilities, so enabling automatic updates for your operating system, apps and antivirus software can significantly reduce your risk.
6. Invest in personal data removal services: Consider using a service that specializes in removing your personal information from the internet to reduce your exposure to potential scammers. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
7. Monitor financial accounts: Regularly check your bank and credit card statements for any unusual or unauthorized transactions. Promptly report any suspicious activity.
8. Be skeptical of unsolicited requests: Treat unexpected requests for money or personal information with caution. Scammers often create a sense of urgency to pressure you into acting quickly.
9. Be vigilant against phishing attempts and use strong antivirus software: Avoid clicking on links or downloading attachments from unsolicited emails or messages. Ensure your devices are protected with strong antivirus software that can detect and block malicious activities. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
10. Report Suspected Scams: If you suspect you’ve encountered a scam, report it to your local authorities, the Federal Trade Commission (FTC), and any relevant financial institutions.
SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Kurt’s key takeaways
The rise of cyberscams is not just an economic issue but a moral one that demands immediate action. With billions lost annually and countless lives disrupted, we cannot afford complacency in addressing this crisis. By learning from global best practices and fostering international collaboration, we can begin to dismantle these criminal networks. Be sure to follow the steps I outlined to keep yourself safe.
What do you think should be done to tackle cyberscams more effectively? Should governments focus on stricter regulations or public education campaigns? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
All the smart home news, reviews, and gadgets you need to know about
![All the smart home news, reviews, and gadgets you need to know about All the smart home news, reviews, and gadgets you need to know about](https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/24423300/236527_Matter_smart_plugs_JTuohy_0007.jpg?quality=90&strip=all&crop=0%2C10.732984293194%2C100%2C78.534031413613&w=1200)
The smart home holds so much promise. It can make life more convenient with lights that turn on as you walk in a room, doors that unlock as you approach, and robots that clean your floors. It can also make your home safer, more energy efficient, and even a little more fun. (Have you tried asking Alexa to beam you up?)
But for all its benefits, the smart home can be complicated, confusing, and occasionally maddening. It’s also hard to keep up with all the changes. New gadgets are arriving daily, new features come to old products, and there are so many different ways to turn on a smart light bulb.
If you need a guide, that’s what I’m here for.
Here, I’ll be posting the latest smart home reviews, guides, news, and opinions on everything happening in the connected home. Follow this page to stay updated on what Apple, Amazon, Samsung, Google, and Home Assistant and the rest are doing with their smart home platforms. I’ll keep you in the loop on all the newest technologies — including Matter, Thread, Sidewalk, UWB — as well as the old favorites. And, of course, I’ll cover all the news on the latest gadgets and the biggest releases around tech for your home.
-
World1 week ago
Georgia’s EU membership by 2030 is achievable, PM Kobakhidze says
-
News1 week ago
Justice Department sues Chicago and Illinois over 'sanctuary' laws
-
Politics1 week ago
The Hitchhiker's Guide to House Republicans releasing their tax and spending cut plan
-
Politics1 week ago
Sanctuary city mayors to testify at House Oversight after AG Bondi cuts them off from federal funds
-
Technology1 week ago
Tinder adds new Explore categories to help you find likeminded dates
-
World1 week ago
Cyprus jails Syrian man over death of young girl on migrant boat
-
World1 week ago
Fact check: Did Clinton set the precedent for mass federal worker buyouts?
-
Politics1 week ago
Hegseth to look into 'what went wrong' in Afghanistan and pledges accountability, slams diversity motto