New Mexico Attorney General Raúl Torrez won a historic sum of $375 million in a landmark child safety case against Meta earlier this year. But the next stage of the fight could be even more consequential for Meta and the social media industry at large.
Technology
Spyware can hijack your phone in seconds
NEWYou can now listen to Fox News articles!
You already know malware is out there. You hear about phishing emails, fake apps and data breaches almost every week. But every so often, something comes along that feels more personal. ZeroDayRAT spyware is one of those threats.
If your device gets infected, attackers can see almost everything happening on your phone. That includes your messages, notifications, location and even live camera feeds. Let that sink in for a second.
This is not some clunky virus from years ago. Security researchers at iVerify, a mobile security and digital forensics company, describe it as a complete mobile compromise toolkit. And it works on both iPhone and Android devices.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
ZeroDayRAT spyware can secretly access messages, camera feeds and banking apps on infected iPhone and Android devices. (Stefan Sauer/picture alliance via Getty Images)
What makes ZeroDayRAT spyware so dangerous?
Many types of malware focus on one goal. Some steal passwords. Others spy on text messages. ZeroDayRAT spyware goes much further.
Once installed, the infected device starts transmitting data back to a central dashboard controlled by the attacker. From there, they get:
- A full stream of incoming notifications
- A searchable inbox of text messages
- Device model and operating system details
- Battery level and lock status
- Network activity and app usage
In other words, they can build a detailed profile of your daily life. Reports say the dashboard even shows a live activity timeline. That timeline reveals who you talk to most, which apps you use and when you are most active online. For anyone who values privacy, that is chilling.
It can watch and listen in real time
Here is where things get even more disturbing.
ZeroDayRAT spyware includes keylogging and live surveillance tools. That means attackers can:
- Capture every keystroke with context
- See which app you opened
- Track how long you spent inside it
- Record gestures and inputs
- Access your microphone
- Activate your front or rear camera
- View your screen in real time
Imagine someone watching your screen as you log into your bank account. Or listening while you have a private conversation. This is not a hypothetical capability. According to reporting, those features are built directly into the platform.
Your banking and crypto apps are targets too
Many people assume mobile malware only steals passwords. ZeroDayRAT spyware goes after money directly. It reportedly includes tools designed to target digital payment and banking apps such as Apple Pay and PayPal. It can also intercept banking notifications and use clipboard injection to redirect cryptocurrency transfers to the attacker’s wallet.
Even without full remote control of your phone, that level of access is enough to drain accounts and steal digital assets. And here is another troubling detail. Reports indicate the platform is openly sold on Telegram, which lowers the barrier for would-be cybercriminals. You do not need advanced hacking skills to use it. That combination of power and accessibility makes this threat especially concerning.
Why Apple and Google are tightening app rules
There is a reason Apple strongly discourages installing apps outside the App Store. Google is also exploring changes to how sideloading works on Android. When apps bypass official stores, security screening becomes weaker. That opens the door for spyware like ZeroDayRAT to sneak in. While no system is perfect, sticking to trusted app marketplaces dramatically lowers your risk.
How to tell if ZeroDayRAT spyware is on your phone
Advanced spyware is designed to stay hidden. You may not see a flashing warning that something is wrong. Still, your phone often gives subtle clues when something is off. Watch for these warning signs.
Unusual battery drain
Spyware that streams data, records audio or tracks location runs constantly in the background. If your battery suddenly drains much faster than normal, especially after no major app changes, that can be a red flag.
Phone overheating without heavy use
If your device feels hot even when you are not gaming or streaming video, background surveillance activity could be consuming resources.
Strange data usage spikes
Check your mobile data usage in settings. A sudden jump may indicate that your phone is transmitting large amounts of information to an external server.
Unknown apps or configuration changes
Look for apps you do not remember installing. On iPhone, check for unknown configuration profiles under Settings. On Android, review installed apps and device administrator permissions.
Unexpected login alerts
If you receive password reset emails or login alerts you did not trigger, assume your credentials may be compromised.
Microphone or camera indicators are activating randomly
Both iPhone and Android show visual indicators when the camera or microphone is in use. If those indicators appear when you are not actively using them, investigate immediately.
If you suspect spyware, do not ignore it. Back up essential data, perform a factory reset and restore only trusted apps. In severe cases, consult a mobile security professional.
149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK
Security researchers warn ZeroDayRAT functions as a full mobile surveillance toolkit sold openly online. (Photographer: Angel Garcia/Bloomberg via Getty Images)
How to remove ZeroDayRAT spyware from your phone
If you believe your phone may be infected, act quickly. Do not keep using it normally while you figure things out. Follow these steps.
1) Disconnect immediately
Turn off Wi-Fi and cellular data. This stops the spyware from sending more data to the attacker while you take action.
2) Change your passwords from a different device
Do not use the potentially infected phone to change passwords. Use a trusted computer or another secure device. Update passwords for email, banking, social media and payment apps first. Enable two-factor authentication (2FA) on every account. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com
3) Run a trusted mobile security scan
Install and run strong antivirus software on your phone. Let it scan your device for malicious apps, suspicious configuration profiles or hidden spyware components. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
4) Remove suspicious apps and profiles
On iPhone, check Settings > General > VPN & Device Management for unknown configuration profiles. Delete anything you do not recognize. On Android, review installed apps and remove anything unfamiliar. Also, check device administrator settings and revoke access from unknown apps.
5) Back up essential data carefully
If you plan to reset your phone, back up only photos, contacts and critical files. Avoid restoring full system backups that could reintroduce malicious software.
6) Perform a factory reset
A full factory reset on your iPhone or Android is often the most effective way to remove advanced spyware. This wipes the device and removes hidden malware components. After the reset, reinstall apps manually from the official app store instead of restoring everything automatically. Before performing a factory reset, back up important photos, contacts and files, as this process permanently deletes everything stored on the device.
7) Monitor your financial accounts
Because ZeroDayRAT targets banking and crypto apps, watch your accounts closely for unusual transactions. Contact your bank immediately if you see suspicious activity.
When to replace the device
In rare cases, if the phone was deeply compromised or jailbroken, replacing the device may be the safest option. While that sounds extreme, protecting your identity and finances is worth more than the cost of a new phone.
Ways to stay safe from ZeroDayRAT spyware
The good news is that you still have control over your digital safety. Start with these practical steps to reduce your risk of infection and limit the damage if spyware ever targets your phone.
1) Avoid sideloading apps
Only install apps from the App Store or Google Play Store. Official stores screen apps for malicious code and remove threats when discovered. Do not download apps from links in emails or text messages. If an app asks you to install it from outside the store, treat that as a red flag.
2) Think before you tap and use strong antivirus protection
Do not click links from unknown senders. Even one tap can trigger a malicious download or redirect you to a fake login page. Install strong antivirus software on your mobile device. Good mobile security apps scan for spyware, block malicious websites and warn you about suspicious behavior in real time. Some also alert you if your personal information appears in known data breaches, which adds another layer of protection. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
3) Keep your phone updated
Install operating system updates as soon as they become available. Security updates patch vulnerabilities that spyware platforms like ZeroDayRAT try to exploit. Turning on automatic updates helps ensure you do not miss critical fixes.
4) Review app permissions regularly
Check which apps have access to your camera, microphone and location. Remove permissions that do not make sense. If a simple game wants constant microphone access, that should raise questions. Limiting permissions reduces what spyware can capture.
5) Use strong authentication
Turn on two-factor authentication (2FA) for banking, email and social media accounts. Even if spyware captures a password, that second verification step can stop attackers from logging in. Use a reputable password manager to create strong, unique passwords for every account.
6) Use a data removal service to reduce your exposure
Spyware operators often profile targets using personal data that is already available online. Data broker websites collect your phone number, address, relatives and more. A reputable data removal service can help remove your personal details from many of these sites. The less information criminals can gather about you, the harder it becomes to target you with convincing phishing attacks or social engineering. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
7) Do not bypass your phone’s built-in security protections
Some people modify their phones to remove manufacturer restrictions so they can install unofficial apps or customize the system. On an iPhone, this is called jailbreaking. On Android, it is known as rooting. While that may sound harmless, it removes important security safeguards that are designed to block spyware and malicious software. Once those protections are gone, threats like ZeroDayRAT have a much easier time installing and hiding on your device. Keeping your phone in its original security state adds a powerful layer of protection that most people never see but benefit from every day.
YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT
Experts say the spyware can activate a phone’s microphone and camera without a user’s knowledge. (Karl-Josef Hildenbrand/picture alliance via Getty Images)
Kurt’s key takeaways
ZeroDayRAT spyware feels unsettling because it attacks something we rely on every day. Your phone holds your conversations, photos, financial apps and personal routines. When a single piece of malware can see your screen, hear your voice and track your location, the stakes get higher. The silver lining is this. Most infections still depend on user action. A bad link was clicked. A suspicious app was installed. A warning ignored. Staying cautious may not sound exciting, but it remains one of the strongest defenses you have.
Now here is the question worth asking. If spyware can already access your camera, messages and money in one package, are tech companies and app stores doing enough to protect you? Let us know your thoughts by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Reggie Fils-Aimé says Amazon once asked Nintendo to break the law
“Literally, we stopped selling to Amazon, and it’s because I wasn’t going to do something illegal. I wasn’t going to do something that would put at risk the relationship we have with other retailers. But it also set the stage to say, look, you’re not going to push me around. This is the way we do business. And so that’s how, over time, you build respect.”
Technology
Data broker opt-out steps widows should take in 90 days
NEWYou can now listen to Fox News articles!
Three weeks after her husband’s funeral, Carol’s phone rings. The caller knows her husband’s name, their address and their daughter’s name, even mentioning that she lives across town.
He says he’s calling from a life insurance company and that there’s a policy ready to be paid out. He just needs Carol’s Social Security number and bank routing details to process it.
This scenario draws from real scams reported by fraud investigators and elder abuse advocates across the country. The details change, but the playbook stays the same.
The reason these attacks work so well comes down to something most grieving families never think to check.
HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA
Scammers build detailed profiles using obituaries, public records and data broker sites often within days of a loss. (Kurt “CyberGuy” Knutsson)
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Why scammers target widows and how they find you so fast
Losing a spouse creates a perfect storm for scammers. Grief can leave you overwhelmed, and at the same time, you are handling financial decisions, paperwork and major life changes. That combination makes it easier for someone to catch you off guard.
THE ONE THING SCAMMERS CHECK BEFORE TARGETING YOU ONLINE
Meanwhile, your personal information becomes easier to find. Obituaries often include names, relationships and locations. Death records get filed with the Social Security Administration and added to the Death Master File. Probate filings can reveal property transfers, beneficiaries and account details.
Data brokers collect all of this and turn it into detailed profiles that almost anyone can access. According to research from a data privacy company analyzing five years of FBI Internet Crime Complaint Center data, about 52.5% of crimes reported by Americans over 60 in 2023 were either enabled or worsened by personal data available online. Widows, especially those managing estates alone, sit high on that target list.
Here’s what you should do in the first 90 days
Despite being in a high-risk group, taking these protective steps should keep scammers at bay. I know how overwhelming this time can be, so I recommend asking a trusted family member or friend for assistance setting things up. Though you should always refrain from sharing sensitive details like account numbers and your Social Security number.
THE DATA BROKER OPT-OUT STEPS EVERY RETIREE SHOULD TAKE TODAY
Days 1-30: Limit what enters the system
The first month is when the most damaging data gets published. So your first job is damage control.
1) Be strategic about the obituary
Obituaries are the single most accessible data source scammers use after a death. A traditional obituary lists full names, survivor relationships, hometowns and sometimes even ages. That’s a complete family map, and in the wrong hands, it can be a powerful weapon.
You don’t have to skip the obituary. But consider removing or abbreviating the exact home city (use the region instead), names of minor grandchildren and the surviving spouse’s first and last name combined with their address. “Carol of Cleveland” is safer than “Carol Patterson of 114 Birchwood Lane, Cleveland.”
HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE-SEARCH SITES
2) Search your name on people-finder sites
Before you can remove anything, you need to see what’s already there.
Go to Spokeo, Whitepages, BeenVerified and Intelius. Search your name and your spouse’s name. What you find will likely include your address, phone number, email addresses, relatives’ names and property records.
This snapshot is your starting point. Take screenshots. You’ll need them.
10 SIGNS YOUR PERSONAL DATA IS BEING SOLD ONLINE
3) Set up a Google Alert for your name and address
It takes two minutes, and it’s free. Go to google.com/alerts and create alerts for:
- Your full name
- Your spouse’s full name
- Your street address.
If your information gets published anywhere new, you’ll get an email notification. This is your early warning system.
REMOVE YOUR PERSONAL INFO FROM THE WEB — STOP IT FROM COMING BACK
Days 31-60: Start removing and automating what you can’t do manually
People-search sites can expose your address, relatives and contact details, making it easier for scammers to target you. (Kurt “CyberGuy” Knutsson)
By now, your information has had weeks to spread. Manual opt-outs are worth doing, but here’s the reality: there are hundreds of data broker sites. Each one has its own removal process. Many require you to submit ID, wait days for confirmation and then re-submit when your data reappears, because it will.
1) Opt out of people-search sites
Prioritize manual opt-outs from the sites that appear in your Google search results. These carry the most weight because scammers often start with whatever Google surfaces first.
You can find these exposures quickly and easily with Incogni’s free scanner. This tool will scan the web for your personal information and email you a report with a list of results you can start with.
HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE
If you’d rather go about it on your own, some of the most common sites include:
- Spokeo: spokeo.com/opt_out/new
- Whitepages: whitepages.com/suppression_requests
- BeenVerified: beenverified.com/opt-out
- Intelius: intelius.com/opt-out.
Each one will ask you to verify your email. Follow through on every confirmation; unconfirmed requests don’t get processed.
Keep in mind that removing your information takes time and persistence. There are hundreds of data broker sites, and many of them re-list your information after it has been removed, especially when new public records become available.
Because of that, some people choose to use automated data removal services that send ongoing opt-out requests on their behalf. These services can help reduce the workload by continuously monitoring and removing listings as they reappear.
No matter which approach you take, consistency matters. Checking your information regularly and following up on removals helps limit what scammers can find.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
2) Update security questions on all financial accounts
This step is urgent, and most people skip it entirely.
Data broker profiles almost always contain the exact answers to your bank’s security questions. Mother’s maiden name. Previous address. City where you were born. Scammers use these to impersonate you and access your accounts.
WHAT HACKERS CAN LEARN ABOUT YOU FROM A DATA BROKER FILE
Call your bank, brokerage and insurance companies. Ask to update your knowledge-based authentication questions. Use answers that are completely made up, something only you know and store them in a password manager. Don’t use any answer that appears anywhere in a data broker profile.
Days 61-90: Lock down the perimeter
By now, the most urgent exposure has been addressed. These final steps close the remaining gaps and protect you in the long term.
1) Place a credit freeze on your account and your spouse’s
A credit freeze prevents new credit accounts from being opened in your name. It’s free at all three major bureaus: Equifax, Experian and TransUnion.
HOW TO SAFEGUARD YOUR CREDIT SCORE IN RETIREMENT AS FRAUD AND IDENTITY THEFT RISE AMONG SENIORS
Critically: freeze your spouse’s credit too. After a death, identity thieves frequently open new accounts in the deceased person’s name before the credit bureaus are updated. This is called ghosting, and it can haunt an estate for years.
To freeze a deceased spouse’s credit, contact each bureau individually and provide the death certificate. It’s a few phone calls. It’s worth every minute.
2) Request removal from the Social Security Death Master File
Families can submit a request to limit access to a deceased person’s Social Security data in certain contexts. Visit ssa.gov for current guidance. This won’t scrub the record entirely, but limiting access to the Death Master File reduces the pool of parties who can use it to enrich your data broker profile.
3) Review all joint account access and update beneficiary information
This isn’t directly a data privacy step, but it protects you from a related threat. Scammers who know about an estate sometimes pose as financial advisors, attorneys or government representatives to intercept beneficiary changes. Confirm all account changes directly through institutions you contact yourself, never through a number someone else gives you.
4) Set up simple safeguards to stop scams early
By this stage, your data is more controlled. Now the focus shifts to stopping scams before they escalate. Start by setting clear expectations with your family. Let them know you will never ask for money through an unexpected call, text or email. Creating a simple code word or check-in rule can stop panic-driven decisions, which is exactly what scammers rely on.
Next, slow down any urgent financial request. Scammers create pressure to force quick action. If someone claims there is a payout, problem or deadline, pause and verify it using a phone number or website you trust, not one they provide. It also helps to keep a short list of your financial institutions and their official contact details in one place. That way, you always know how to reach them directly without relying on incoming calls or messages.
Taking simple steps early, like removing your data and freezing your credit, can reduce your risk during the most vulnerable time. (Kurt “CyberGuy” Knutsson)
INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU
Finally, be cautious in real-time conversations. Scammers often build trust by collecting small details over multiple interactions. Keeping answers brief and avoiding unnecessary personal details makes it that much harder.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com
Get a free scan to find out if your personal information is already out on the web: CyberGuy.com
Kurt’s key takeaways
The first few months after losing a spouse bring enough decisions without adding fraud risks on top. Yet that is when your personal information spreads the fastest. Public records and data broker sites can quietly build a profile that scammers use against you. Early action makes a real difference. Limiting what gets published, removing existing data and securing your accounts all reduce your exposure. Even small steps, like updating security questions or freezing credit, can stop a scam before it starts. You do not need to handle everything at once. Start with a simple search of your name and review what appears. From there, take control at your own pace and protect what matters most.
If someone can piece together your personal life within days of a loss, how much of your information are you comfortable leaving online? Let us know by writing to us at CyberGuy.comCyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Meta’s historic loss in court could cost a lot more than $375 million
Beginning Monday, attorneys for Meta and New Mexico will return to a Santa Fe courthouse for a three-week public nuisance trial, where they’ll argue over the changes the AG wants the judge to order Meta make to Facebook, Instagram, and WhatsApp. Those changes include adding age verification for New Mexico users, prohibiting end-to-end encryption for users under 18 and capping their use to 90 hours per month, limiting engagement-boosting features like infinite scroll and autoplay, and requiring Meta to detect 99 percent of new child sexual abuse material (CSAM).
“From the outset, our goal was to try and change the way the company’s doing business,” Torrez told The Verge on a recent visit to Washington, DC, to advocate for new kids safety legislation. “I recognize that even at $375 million for a company this big and this profitable, it’s not enough in and of itself to change the way they’re doing business. In fact, there’s probably some folks in that company who think of it as the cost of doing business.”
“Even at $375 million for a company this big and this profitable, it’s not enough in and of itself to change the way they’re doing business”
While any changes ordered by the judge would only apply to Meta and its operations in New Mexico, the company could apply the changes in other states for the sake of simplicity. Or, as it’s threatened to do, it could simply go dark in the state. A court order could send a message to other tech companies that courts may be willing to alter their businesses if they’re found liable.
During the trial, New Mexico will argue Meta has become a public nuisance by creating a public health hazard in the state. The AG’s office expects to call on about 15 witnesses, including experts who will testify to the feasibility of their proposed remedies, and fact witnesses who will testify about Meta’s alleged harms. After Meta makes its defense, Judge Bryan Biedscheid will evaluate which proposals are relevant and feasible — a process that could take some time, compared to the speedy turnaround of the jury verdict in March.
A sweeping win for New Mexico could energize Torrez and thousands of other plaintiffs currently pursuing cases against tech companies. Conversely, a limited order could be a significant blow. The outcome won’t directly impact other cases, but it will almost certainly color negotiations over potential settlements.
Several of Torrez’s requests are hot-button tech policy issues. Age verification would almost certainly require Meta or a third-party provider to collect more personal information on adults and minors alike, which privacy advocates have consistently warned can make users less safe. Don McGowan, who previously served on the board of the National Center for Missing and Exploited Children (NCMEC), said that barring encrypted communications on platforms like Facebook “is a great way to make sure that nobody uses Facebook Messenger anymore and just moves their activity to other platforms that aren’t touched by this lawsuit.”
The mandate may do little to change the reality of certain parts of the business — Meta recently announced it was getting rid of end-to-end encrypted messaging on Instagram that it said “very few people” actually used.
Peter Chapman, associate director of the Knight-Georgetown Institute, which works to connect policymakers and others with independent tech policy research, said there could be “significant tradeoffs” to a prohibition on encryption, and other changes may be more effective. For example, evidence presented by the state showed that Meta’s own profile recommendations were connecting adults and minors, a feature that poses a clearer danger of harm without much benefit, and which Torrez is also asking the court to stop. “There’s an opportunity to intervene at that level and try to prevent more of these harmful interactions from taking place without having to tackle encryption,” said Chapman.
No single feature change is likely to solve the entire child and teen safety problem, said Chapman, which is why it’s notable that Torrez plans to ask for several layers of changes. Still, the overall effectiveness of any given remedy will also depend on how it’s implemented and monitored. For instance, what would be the methodology Meta uses to report a 99 percent detection rate of new CSAM? How does it count or surmise what it hasn’t caught? The same goes for the accuracy and reliability of any mandated age verification.
Meta points to this potential issue in its argument against Torrez’s proposed remedies. “Regardless of where the accuracy threshold is set, Meta would never be able to prove that the system met that standard, because doing the calculation would require that Meta detect 100% of CSAM to use as the denominator,” the company wrote in a legal filing. Torrez’s chief deputy, James Grayson, said on a press call that the court and an appointed independent monitor would have some discretion over tracking; the office hasn’t yet identified who this monitor would be.
“The demands that are being made in New Mexico are ill-informed and provide massive additional exposure for other kinds of exploitation”
Meta and other groups that oppose the AG’s approach say the outcomes he’s seeking are counterproductive. “The demands that are being made in New Mexico are ill-informed and provide massive additional exposure for other kinds of exploitation,” said Maureen Flatley, president of Stop Child Predators, a group that advocates for more funding for enforcement of criminal laws against child predators, and has received funding from Meta-backed trade group NetChoice. “This notion that the platforms have to be responsible for pushing all these people out would be like saying to the US Bankers Association, ‘By the way, you are responsible for all the bank robberies from now on,’ which is ludicrous.”
“The New Mexico Attorney General’s focus on a single platform is a misguided strategy that ignores the hundreds of other apps teens use daily,” Meta spokesperson Chris Sgro said in a statement. “The state’s proposed mandates infringe on parental rights and stifle free expression for all New Mexicans. Regardless, we remain committed to providing safe, age-appropriate experiences and have already launched many of the protections the state seeks, including 13 safety measures this past year.”
But Torrez has taken aim at the broader tech industry, too. He recently visited Washington, DC, to advocate for new protections for kids online and an overhaul of Section 230, the law that protects tech platforms from being held liable for their users’ posts. “While we were able to prevail in our district court in Santa Fe, I still think the law as it currently exists creates a lot of ambiguity,” he told The Verge on that visit. “If Section 230 were not something that these companies could hide behind, then it increases the chances that they’re going to have to actually make their case to a jury.”
But Chapman said regulation through lawsuits isn’t an “uncommon sort of story” in the US. “Whether that’s tobacco, opioids, e-cigarettes, there is precedent for legal action moving a broader policy conversation.”
-
Cleveland, OH6 minutes agoCleveland Metroparks Zoo evacuates ‘out of caution’ after reported threat
-
Austin, TX12 minutes ago$20 million Powerball jackpot-winning ticket sold at QuikTrip in Leander
-
Alabama18 minutes agoNew interactive Gopher Tortoise exhibit coming to Alabama Nature Center
-
Alaska24 minutes agoFlooding closes Alaska Highway, cuts off access to U.S.-Canada border | CBC News
-
Arizona30 minutes agoArizona joins new plan to cut Colorado River water use
-
Arkansas36 minutes ago5-Star Center Obinna Ekezie Jr. Reveals MCBB Commitment Between Kentucky, Louisville, Arkansas, More
-
Colorado48 minutes agoMugshot Monday: Most wanted in the Colorado Springs area for May 4
-
Connecticut54 minutes agoScammers use AI images of injured pets to target owners, Blumenthal warns Connecticut residents