Technology
Plastic bottles could power your devices one day
NEWYou can now listen to Fox News articles!
Each year, billions of single-use plastic bottles end up in landfills or oceans. That waste problem keeps growing. Now, a new scientific breakthrough suggests those same bottles could help power your daily life.
Researchers have developed a way to transform discarded plastic water bottles into high-performance energy storage devices called supercapacitors. The work focuses on PET plastic, short for polyethylene terephthalate, which is used in most beverage bottles.
The research was published in Energy & Fuels and highlighted by the American Chemical Society. Scientists say the discovery could reduce plastic pollution while helping drive cleaner energy technology.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
SCIENTISTS EXTRACT SILVER FROM E-WASTE USING COOKING OIL
Discarded PET water bottles are one of the most common sources of plastic waste worldwide, with hundreds of billions produced each year. (Kurt “CyberGuy” Knutsson)
Why PET plastic waste is such a growing problem
PET plastic is everywhere. According to the researchers, more than 500 billion single-use PET plastic bottles are produced every year. Most are used once and thrown away. Lead researcher Dr. Yun Hang Hu says that scale creates a major environmental challenge.
Instead of letting that plastic pile up, the team focused on upcycling it into something valuable. Their idea was simple but powerful. Turn waste into materials that support renewable energy systems and reduce production costs at the same time.
NEW TECH RECOVERS 92% OF EV BATTERY METALS
Those upcycled materials come together to form an all-waste-plastic supercapacitor designed for fast charging and long term energy storage. (Kurt “CyberGuy” Knutsson)
How plastic bottles can store and release energy
Imagine a device that can charge fast and deliver power instantly. That is exactly what supercapacitors do. They store and release energy much faster than traditional batteries, which makes them useful for electric vehicles, solar power systems and everyday electronics.
Hu’s team found a way to build these energy storage components using discarded PET plastic water bottles. By reshaping the plastic at extremely high temperatures, the researchers turned waste into materials that can generate electricity efficiently and repeatedly.
Here is how the process works:
For the electrodes, researchers cut PET bottles into tiny, grain-sized pieces. They mixed the plastic with calcium hydroxide and heated it to nearly 1,300 degrees Fahrenheit in a vacuum. That heat transformed the plastic into a porous, electrically conductive carbon powder.
The powder was then formed into thin electrode layers. For the separator, small pieces of PET were flattened and carefully perforated with hot needles. This pattern allowed electric current to pass efficiently while maintaining safety and durability. Once assembled, the device used two carbon electrodes separated by the PET film and submerged in a potassium hydroxide electrolyte.
CIGARETTE BUTTS MAKE ROADS STRONGER THAN EVER BEFORE
Researchers use extreme heat to convert waste PET plastic into porous carbon materials that can store and move electricity efficiently. (Kurt “CyberGuy” Knutsson)
Why the results surprised scientists
When tested, the all-waste-plastic supercapacitor outperformed similar devices made with traditional glass fiber separators. After repeated charging and discharging, it retained 79 percent of its energy capacity. A comparable glass fiber device retained 78 percent. That difference matters. The PET-based design costs less to produce, remains fully recyclable, and supports circular energy storage technologies where waste materials are reused instead of discarded.
What this means for you
This breakthrough could affect everyday life sooner than you might expect. Cheaper supercapacitors can lower the cost of electric vehicles, solar systems and portable electronics. Faster charging and longer device lifespans could follow. It also shows that sustainability does not require giving something up. Waste plastics could become part of the solution instead of the problem. Although this technology is still in development, the research team believes PET-based supercapacitors could reach commercial markets within 5 to 10 years. In the meantime, choosing reusable bottles and plastic-free alternatives still helps reduce waste today.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
Kurt’s key takeaways
Turning trash into energy storage is more than a clever idea. It shows how science can tackle two global challenges at once. Plastic pollution continues to grow. Energy demand does too. This research proves that those problems do not have to be solved separately. By rethinking waste as a resource, scientists are building a cleaner and more efficient future from materials we already throw away.
If your empty water bottle could one day help power your home or car, would you still see it as trash? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Department of Justice appeals Google search monopoly ruling
On Tuesday, the Department of Justice and the plaintiffs in the antitrust case against Google filed a cross-appeal, as the DOJ Antitrust Division announced in a post on X: “Today, the DOJ Antitrust Division filed notice that it will cross-appeal from the remedies decisions in its case against Google’s unlawful monopolization of internet search and search advertising.”
Just a few weeks ago, Google itself filed a notice to appeal and requested a pause on the remedies ordered by DC District Court Judge Amit Mehta last year. Those remedies included requiring Google to share search data with its rivals and barring Google from making exclusive distribution deals for its search or AI products that could hinder distribution for competitors. However, Google was ultimately not required to sell its Chrome browser and wasn’t barred from paying distribution partners for preloading or premium placement of its search or AI products.
The DOJ’s cross-appeal suggests that neither party is fully satisfied with Judge Mehta’s ruling in the case, or at least the remedies ordered in September.
Technology
149 million passwords exposed in massive credential leak
NEWYou can now listen to Fox News articles!
It has been a rough start to the year for password security. A massive database containing 149 million stolen logins and passwords was found publicly exposed online.
The data included credentials tied to an estimated 48 million Gmail accounts, along with millions more from popular services. Cybersecurity researcher Jeremiah Fowler, who discovered the database, confirmed it was not password-protected or encrypted. Anyone who found it could have accessed the data.
Here is what we know so far and what you should do next.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN
A publicly exposed database left millions of usernames and passwords accessible to anyone who found it online. (Wei Leng Tay/Bloomberg via Getty Images)
What was found in the exposed database
The database contained 149,404,754 unique usernames and passwords. It totaled roughly 96 GB of raw credential data. Fowler said the exposed files included email addresses, usernames, passwords and direct login URLs for accounts across many platforms. Some records also showed signs of info-stealing malware, which silently captures credentials from infected devices.
Importantly, this was not a new breach of Google, Meta or other companies. Instead, the database appears to be a compilation of credentials stolen over time from past breaches and malware infections. That distinction matters, but the risk to users remains real.
Which accounts appeared most often
Based on estimates shared by Fowler, the following services had the highest number of credentials in the exposed database.
- 48 million – Gmail
- 17 million – Facebook
- 6.5 million – Instagram
- 4 million – Yahoo Mail
- 3.4 million – Netflix
- 1.5 million – Outlook
- 1.4 million – .edu email accounts
- 900,000 – iCloud Mail
- 780,000 – TikTok
- 420,000 – Binance
- 100,000 – OnlyFans
Email accounts dominated the dataset, which matters because access to email often unlocks other accounts. A compromised inbox can be used to reset passwords, access private documents, read years of messages and impersonate the account holder. That is why Gmail appearing so frequently in this database raises concerns beyond any single service.
SUPER BOWL SCAMS SURGE IN FEBRUARY AND TARGET YOUR DATA
Email accounts appeared most often in the leaked data, which is especially concerning because inbox access can unlock many other accounts. (Felix Zahn/Photothek via Getty Images)
Why the exposed database creates serious security risks
This exposed database was not abandoned or forgotten. The number of records increased while Fowler was investigating it, which suggests the malware feeding it was still active. There was also no ownership information attached to the database. After multiple attempts, Fowler reported it directly to the hosting provider. It took nearly a month before the database was finally taken offline. During that time, anyone with a browser could have searched it. That reality raises the stakes for everyday users.
This was not a traditional hack or company breach
Hackers did not break into Google or Meta systems. Instead, malware infected individual devices and harvested login details as people typed them or stored them in browsers. This type of malware is often spread through fake software updates, malicious email attachments, compromised browser extensions or deceptive ads. Once a device is infected, simply changing passwords does not solve the problem unless the malware is removed.
TIKTOK AFTER THE US SALE: WHAT CHANGED AND HOW TO USE IT SAFELY
Researchers believe infostealing malware collected the credentials, silently harvesting logins from infected devices over time. (Jaap Arriens/NurPhoto via Getty Images)
How to protect your accounts after a massive password leak
This is the most important part. Take these steps even if everything seems fine right now. Credential leaks like this often surface weeks or months later.
1) Stop reusing passwords immediately
Password reuse is one of the biggest risks exposed by this database. If attackers get one working login, they often test it across dozens of sites automatically. Change reused passwords first, starting with email, financial and cloud accounts. Each account should have its own unique password. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
2) Switch to passkeys where available
Passkeys replace passwords with device-based authentication tied to biometrics or hardware. That means there is nothing for malware to steal. Gmail and many major platforms already support passkeys, and adoption is growing fast. Turning them on now removes a major attack surface.
3) Enable two-factor authentication on every account
Two-factor authentication (2FA) adds a second checkpoint, even if a password is exposed. Use authenticator apps or hardware keys instead of SMS when possible. This step alone can stop most account takeover attempts tied to stolen credentials.
4) Scan devices for malware with strong antivirus software
Changing passwords will not help if malware is still on your device. Install strong antivirus software and run a full system scan. Remove anything flagged as suspicious before updating passwords or security settings. Keep your operating system and browsers fully updated as well.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
5) Review account activity and login history
Most major services show recent login locations, devices and sessions. Look for unfamiliar activity, especially logins from new countries or devices. Sign out of all sessions if the option is available and reset credentials right away if anything looks off.
6) Use a data removal service to reduce exposure
Stolen credentials often get combined with data scraped from data broker sites. These profiles can include addresses, phone numbers, relatives and work history. Using a data removal service helps reduce the amount of personal information criminals can pair with leaked logins. Less exposed data makes phishing and impersonation attacks harder to pull off.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
7) Close accounts you no longer use
Old accounts are easy targets because people forget to secure them. Close unused services and delete accounts tied to outdated app subscriptions or trials. Fewer accounts mean fewer chances for attackers to get in.
Kurt’s key takeaways
This exposed database is another reminder that credential theft has become an industrial-scale operation. Criminals move fast and often prioritize speed over security. The good news is that simple steps still work. Unique passwords, strong authentication, malware protection and basic cyber hygiene go a long way. Do not panic, but do not ignore this either.
If your email account was compromised today, how many other accounts would fall with it? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
The Switch is now Nintendo’s best-selling console of all time
The original Switch is officially Nintendo’s best-selling console of all time after surpassing the DS handheld in lifetime sales. In its latest earnings release, Nintendo reports that the Nintendo Switch has, as of December 31, 2025, sold 155.37 million units since its launch in 2017, compared to 154.02 million units for the 2004 Nintendo DS.
In November, Nintendo reported that the Switch and DS were neck and neck. We expected the holiday sales period would see the Switch surpass the DS, even with Nintendo announcing that primary development would focus on the Switch 2. Nintendo previously said that it would continue to sell the original Switch “while taking consumer demand and the business environment into consideration.”
Nintendo has to keep selling the Switch if it wants to dethrone Sony’s PlayStation 2 as the best-selling video game console of all time. The PlayStation 2, discontinued in January 2013, sold more than 160 million units over its 13-year lifespan.
Demand for the Switch 2 accelerated over the holidays, with Nintendo reporting 7.01 million units sold during the quarter covering October through December, compared to 4.54 million units in the previous quarter. In total, the Switch 2 has now sold 17.37 million units since it launched in June 2025, taking less than a year to surpass the Wii U’s 13.7 million lifetime sales.
The Switch 2 launch has helped Nintendo to drive a 51 percent increase in net profit over the first nine months of FY26, reaching ¥358.86 billion (about $2.31 billion). Net sales almost doubled during the same period, jumping to ¥1.906 trillion (about $12.2 billion) compared to ¥956.2 billion ($6.1 billion) last year. Looking ahead, Nintendo maintains its forecast to sell 19 million Switch 2 units by the end of this financial year.
-
Indiana2 days ago13-year-old rider dies following incident at northwest Indiana BMX park
-
Massachusetts3 days agoTV star fisherman, crew all presumed dead after boat sinks off Massachusetts coast
-
Tennessee3 days agoUPDATE: Ohio woman charged in shooting death of West TN deputy
-
Pennsylvania1 week agoRare ‘avalanche’ blocks Pennsylvania road during major snowstorm
-
Movie Reviews1 week agoVikram Prabhu’s Sirai Telugu Dubbed OTT Movie Review and Rating
-
Indiana1 day ago13-year-old boy dies in BMX accident, officials, Steel Wheels BMX says
-
Austin, TX4 days ago
TEA is on board with almost all of Austin ISD’s turnaround plans
-
Politics1 week agoTrump’s playbook falters in crisis response to Minneapolis shooting