Technology
PC Trouble? How to Check for Memory Problems in Windows

Is Home windows misbehaving? Perhaps it is freezing, crashing, or simply not performing as much as snuff. Diagnosing a basic downside like this may be difficult. It could possibly be software program. It could possibly be {hardware}. However one potential perpetrator it’s possible you’ll not instantly consider is defective reminiscence.
RAM chips can go dangerous identical to some other bodily element, however you may scrutinize it by working a reminiscence diagnostic. In case your reminiscence passes the take a look at, you may rule out this downside. If it fails, one in all your RAM modules seemingly must be changed.
To scan your reminiscence, flip to Microsoft’s free Home windows Reminiscence Diagnostic, which runs quite a lot of exams in your PC’s RAM to see if all the pieces is in working order. It is constructed into all variations of Home windows from the previous a number of years, together with Home windows 7, Home windows 8/8.1, Home windows 10, and Home windows 11. And it really works the identical in every model. Let’s give it a whirl.
First, press Win+R. On the Open area within the Run window, kind mdsched.exe and click on OK. Up pops the opening display screen for the Home windows Reminiscence Diagnostic Device. The instrument must run when your PC begins up, so you’ve got two choices. You possibly can restart your pc now, and the instrument will execute at bootup. Or you may schedule the instrument to run the subsequent time you reboot your PC. Let’s select the choice to restart your pc now.
Your PC restarts and launches the Reminiscence Diagnostic Device’s RAM take a look at. Proper off the bat, the instrument begins checking your reminiscence for potential issues. By default, the Home windows Reminiscence Diagnostic begins in Customary mode, which incorporates eight totally different, successive reminiscence exams, every of which makes use of a singular algorithm to scan for various kinds of errors. You possibly can permit the Customary exams to run till completion, after which era Home windows will restart.
Alternatively, you may press F1 at any time in the course of the take a look at. That takes you to a distinct display screen the place you may select the kind of scan you want to run. The instrument gives three sorts of scans: Fundamental, Customary, and Prolonged.
Fundamental runs solely three exams, but it surely runs them in a short time. Customary runs the eight totally different exams however takes longer to run. And Prolonged runs 17 totally different exams and takes a very long time to finish. Your best choice is to stay with the Customary scan. If a glitch is detected, you may run the Prolonged scan to see if additional particulars pop up.
At this window, it’s also possible to allow or disable the cache. Turning off the processor’s cache in the course of the scan forces the instrument to entry information instantly from RAM, guaranteeing extra thorough testing. You possibly can go away this on the default worth, which implies the cache setting for every take a look at stays as is. Lastly, you may set the Cross Rely, which means the variety of occasions every take a look at will run. Two is the default worth and needs to be ample to unearth any issues. After you’ve made your alternatives, press F10 to use them and run the take a look at.
After every take a look at completes, the instrument shows a Succeeded or Failed message. A Failed message is adopted by particulars in regards to the failure and sometimes signifies a fault with one in all your RAM modules. Relying in your PC atmosphere, the diagnostic might be able to slim down a reminiscence downside to a particular module. Additionally, in case your PC accommodates a couple of reminiscence module, you need to be capable of take away every of the modules one by one and run the Reminiscence Diagnostic to see in case you can pinpoint the errors to a sure module.
After the scan runs, your PC reboots. Log again into Home windows and you will see a small message briefly pop up, supplying you with the outcomes of the scan.
You can even examine reminiscence take a look at leads to Home windows utilizing the Occasion Viewer. Press Win+R. On the Open area within the Run window, kind eventvwr.exe and click on OK; Occasion Viewer launches.
Broaden the class for Home windows Logs. Proper-click on the System setting after which choose Discover from the pop-up menu.
Within the Discover what area, kind MemoryDiagnostics-Outcomes and click on Discover Subsequent.
Click on Cancel on the Discover window to shut it. Within the Occasion window, double-click the primary highlighted entry, which needs to be the take a look at you simply ran. The outcomes will present extra particulars on the scan.
Like What You are Studying?
Join Suggestions & Methods publication for knowledgeable recommendation to get essentially the most out of your know-how.
This article might comprise promoting, offers, or affiliate hyperlinks. Subscribing to a publication signifies your consent to our Phrases of Use and Privateness Coverage. You could unsubscribe from the newsletters at any time.

Technology
A GameStop damaged Switch 2 screens with staples, but they’re getting replaced

Some people reported an unwelcome surprise after picking up their Nintendo Switch 2 preorders at GameStop: staples used to attach receipts to Switch 2 boxes ended up damaging the screens on the console, as reported by IGN. However, GameStop says this was an issue that was “isolated” to a single store and that it has already offered replacements.
When you open the box for the Switch 2, the tablet / screen part of the device is just under the top flap of the packaging. The tablet’s proximity to the top of the box possibly explains how staples could get through and poke holes in the screen — especially if the person using the stapler gave it a solid push.
Reports started trickling in overnight as people got their preorders. In this post on X, for example, you can see photos of two dots on the box, a bag, and the screen.
To IGN, a GameStop spokesperson said that it was “investigating the matter” and promised to “make customers whole.” And on Thursday, one Reddit user affected by the problem said that they spoke with a GameStop manager who said they would be able to exchange their damaged unit.
“We’ve addressed a unique case of staples damaging Switch 2 screens – isolated to one store,” GameStop says in a post on X. “Replacements have been offered. Staplers have been confiscated.”
Technology
Major data broker hack impacts 364,000 individuals’ data

NEWYou can now listen to Fox News articles!
Americans’ personal data is now spread across more digital platforms than ever. From online shopping habits to fitness tracking logs, personal information ends up in hundreds of company databases. While most people worry about social media leaks or email hacks, a far less visible threat comes from data brokers.
I still find it hard to believe that companies like this are allowed to operate with so little legal scrutiny. These firms trade in personal information without our knowledge or consent. What baffles me even more is that they aren’t serious about protecting the one thing that is central to their business model: data.
Just last year, we saw news of a massive data breach at a data broker called National Public Data, which exposed 2.7 billion records. And now another data broker, LexisNexis, a major name in the industry, has reported a significant breach that exposed sensitive information from more than 364,000 people.
Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!
A hacker at work (Kurt “CyberGuy” Knutsson)
LexisNexis breach went undetected for months after holiday hack
LexisNexis filed a notice with the Maine attorney general revealing that a hacker accessed consumer data through a third-party software development platform. The breach happened on Dec. 25, 2024, but the company only discovered it months later. LexisNexis was alerted on April 1, 2025, by an unnamed individual who claimed to have found sensitive files. It remains unclear whether this person was responsible for the breach or merely came across the exposed data.
MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINS
A spokesperson for LexisNexis confirmed that the hacker gained access to the company’s GitHub account. This is a platform commonly used by developers to store and collaborate on code. Security guidelines repeatedly warn against storing sensitive information in such repositories; however, mistakes such as exposed access tokens and personal data files continue to occur.
The stolen data varies from person to person but includes full names, birthdates, phone numbers, mailing and email addresses, Social Security numbers and driver’s license numbers. LexisNexis has not confirmed whether it received any ransom demand or had further contact with the attacker.

An individual working on their laptop (Kurt “CyberGuy” Knutsson)
CUSTOM DATA REMOVAL: WHY IT MATTERS FOR PERSONAL INFO ONLINE
Why the LexisNexis hack is a bigger threat than you realize
LexisNexis isn’t a household name for most people, but it plays a major role in how personal data is harvested and used behind the scenes. The company pulls information from a wide range of sources, compiling detailed profiles that help other businesses assess risk and detect fraud. Its clients include banks, insurance companies and government agencies.
In 2023, the New York Times reported that several car manufacturers had been sharing driving data with LexisNexis without notifying vehicle owners. That information was then sold to insurance companies, which used it to adjust premiums based on individual driving behavior. The story made one thing clear. LexisNexis has access to a staggering amount of personal detail, even from people who have never willingly engaged with the company.
Law enforcement also uses LexisNexis tools to dig up information on suspects. These systems offer access to phone records, home addresses and other historical data. While such tools might assist in investigations, they also highlight a serious issue. When this much sensitive information is concentrated in one place, it becomes a single point of failure. And as the recent breach shows, that failure is no longer hypothetical.

A hacker at work (Kurt “CyberGuy” Knutsson)
MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINS
7 expert tips to protect your personal data after a data broker breach
Keeping your personal data safe online can feel overwhelming, but a few practical steps can make a big difference in protecting your privacy and reducing your digital footprint. Here are 7 effective ways to take control of your information and keep it out of the wrong hands:
1. Remove your data from the internet: The most effective way to take control of your data and avoid data brokers from selling it is to opt for data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
Get a free scan to find out if your personal information is already out on the web.
2. Review privacy settings: Take a few minutes to explore the privacy and security settings on the services you use. For example, limit who can see your social media posts, disable unnecessary location-sharing on your phone and consider turning off ad personalization on accounts like Google and Facebook. Most browsers let you block third-party cookies or clear tracking data. The FTC suggests comparing the privacy notices of different sites and apps and choosing ones that let you opt out of sharing when possible.
3. Use privacy-friendly tools: Install browser extensions or plugins that block ads and trackers (such as uBlock Origin or Privacy Badger). You might switch to a more private search engine (like DuckDuckGo or Brave) that doesn’t log your queries. Consider using a browser’s “incognito” or private mode when you don’t want your history saved, and regularly clear your cookies and cache. Even small habits, like logging out of accounts when not in use or using a password manager, make you less trackable.
4. Beware of phishing links and use strong antivirus software: Scammers may try to get access to your financial details and other important data using phishing links. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
5. Be cautious with personal data: Think twice before sharing extra details. Don’t fill out online surveys or quizzes that ask for personal or financial information unless you trust the source. Create separate email addresses for sign-ups (so marketing emails don’t go to your main inbox). Only download apps from official stores and check app permissions.
6. Opt out of data broker lists: Many data brokers offer ways to opt out or delete your information, though it can be a tedious process. For example, there are sites like Privacy Rights Clearinghouse or the Whitepages opt-out page that list popular brokers and their opt-out procedures. The FTC’s consumer guide, “Your Guide to Protecting Your Privacy Online,” includes tips on opting out of targeted ads and removing yourself from people-search databases. Keep in mind you may have to repeat this every few months.
7. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.
HR FIRM CONFIRMS 4M RECORDS EXPOSED IN MAJOR HACK
Kurt’s key takeaway
For many, the LexisNexis breach may be the first time they realize just how much of their data is in circulation. Unlike a social media platform or a bank, there is no clear customer relationship with a data broker, and that makes it harder to demand transparency. This incident should prompt serious discussion around what kind of oversight is necessary in industries that operate in the shadows. A more informed public and stronger regulation may be the only things standing between personal data and permanent exposure.
Should companies be allowed to sell your personal information without your consent? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Volvo’s new seatbelts use real-time data to adapt to different body types

Volvo is looking to boost its reputation for safety with the release of a new “multi-adaptive safety belt” that uses real-time data from the vehicle’s sensors to better protect the person wearing it.
Seatbelt technology hasn’t changed much since Volvo patented one of the first modern three-point safety belts in the early 1960s. But cars have changed significantly, adding sensors, cameras, and high-powered computers to power advanced driver assist features and anti-crash technology.
Now, Volvo wants to put those gadgets to work for seatbelts. Modern safety belts use load limiters to control how much force the safety belt applies on the human body during a crash. Volvo says its new safety belt expands the load-limiting profiles from three to 11 and increases the possible number of settings, enabling it to tailor its performance to specific situations and individuals.
As such, Volvo can use sensor data to customize seatbelts based on a person’s height, weight, body shape, and seating position. A larger occupant, for example, would receive a higher belt load setting to help reduce the risk of a head injury in a crash, while a smaller person in a milder crash would receive a lower belt load setting to reduce the risk of rib fractures.
During a crash, Volvo says its vehicles’ safety systems will share sensor data — such as direction, speed, and passenger posture — with multi-adaptive seatbelts to determine how much force to apply to the occupant’s body. And using over-the-air software updates, Volvo promises that the seatbelts can improve over time.
Volvo has previously deviated from traditional practices to introduce new technologies meant to underscore its commitment to safety. The company limits the top speed on all of its vehicles to 112 mph — notably below the 155 mph established by a “gentleman’s agreement” between Mercedes-Benz, Audi, and BMW to reduce the number of fatalities on the Autobahn.
The new seatbelts will debut in the Volvo EX60, the automaker’s mid-sized electric SUV which is scheduled to come out next year.
-
Politics1 week ago
Trump admin asking federal agencies to cancel remaining Harvard contracts
-
Culture1 week ago
Can You Match These Canadian Novels to Their Locations?
-
Technology1 week ago
The Browser Company explains why it stopped developing Arc
-
News1 week ago
Harvard's president speaks out against Trump. And, an analysis of DEI job losses
-
News1 week ago
Read the Trump Administration Letter About Harvard Contracts
-
News7 days ago
Video: Faizan Zaki Wins Spelling Bee
-
World1 week ago
Drone war, ground offensive continue despite new Russia-Ukraine peace push
-
Politics5 days ago
Michelle Obama facing backlash over claim about women's reproductive health