Technology
Tech how-to: How to automatically alert loved ones in an emergency

Shut up of man utilizing 3d generated cell sensible cellphone with emergency name on the display. Display graphics are made up. (iStock)
NEWNow you can take heed to Fox Information articles!
Unsure occasions remind us that we’re not all the time ready as we have to be.
Within the digital world, nobody is ever really prepared for the truth of getting hacked. Faucet or click on to see if somebody is absolutely watching what you do or in the event you’re being paranoid.
Within the bodily world, our tech could make a world of distinction. Take the Apple Watch, which has been credited with saving lives. Faucet or click on for the emergency and well being options you must arrange now earlier than you want them.
Don’t neglect about your cellphone. Right here’s find out how to arrange emergency options that may alert your family members if one thing occurs to you.
You probably have an iPhone
Once you make a name with Apple’s Emergency SOS characteristic, your iPhone does a couple of issues. It’s going to name the native emergency quantity and alert your emergency contacts by way of textual content message.
Your cellphone will even ship your present location to your emergency contacts, together with modifications to your location. Which means they’ll comply with alongside in the event you’re shifting from place to put.
Right here’s find out how to make an SOS name on an iPhone 8 or later:
Press and maintain the facet button and one of many quantity buttons. The Emergency SOS slider will seem.
Drag the slider to name emergency providers. You can too proceed to carry the facet button and a quantity button. As soon as the countdown ends, your cellphone will name emergency providers.
Word: On an iPhone 7 or earlier, rapidly press the facet or high button 5 occasions to allow the emergency slider.
Now that you understand how to make use of this characteristic let’s run by means of find out how to add emergency contacts.

File photograph of an iPhone.
(AP)
Keep in mind, in the event you use the Emergency SOS characteristic, these contacts will obtain a message indicating you’re having an emergency.
- Open the Well being app and faucet your profile image > Medical ID.
- Choose Edit, then scroll to Emergency Contacts.
- Faucet the Add button, then faucet a contact. Add their relationship.
- Hit Completed to substantiate your modifications.
RELATED: Have children within the household? This app from the FBI might assist in an emergency
You probably have an Android
Android’s model of Emergency SOS works equally, although you must set it up forward of time.
- Open the Settings app in your cellphone.
- Faucet Security & emergency > Emergency SOS.
From right here, you may customise what occurs if you use Emergency SOS. You’ve the choice to sound an alarm or keep silent, name an emergency variety of your selecting, share updates and site data along with your emergency contacts, and report a video.
To entry Emergency SOS on an Android cellphone, rapidly press the ability button 5 occasions.
On a Samsung cellphone, steps could fluctuate barely. If the tactic above doesn’t work, open Settings, search for Superior options, then faucet Ship SOS messages. From right here, you may select your emergency contacts.

On this photograph illustration an Android brand seen displayed on a smartphone.
(Photograph Illustration by Rafael Henrique/SOPA Pictures/LightRocket by way of Getty Pictures)
On a Google Pixel and different variations of Android, here is find out how to add emergency contacts:
- Open the Security app and register along with your Google account.
- You’ll be prompted so as to add emergency contacts. Scroll by means of or seek for a contact and faucet the identify to proceed.
- Subsequent, you may add medical info when you have not accomplished so.
- Faucet Completed to substantiate
Bonus Tip: How you can increase your tax refund this yr
The IRS has new modifications together with the $600 rule, WFH deductions, little one tax credit and extra. On this episode, tax accountant Rachel Cheek and I dive into the numerous methods deductions, types, social media, and guidelines will impression your 2021 tax return.
Try my podcast “Kim Komando Explains” on Apple, Google Podcasts, Spotify, or your favourite podcast participant.
Hearken to the podcast right here or wherever you get your podcasts. Simply seek for my final identify, “Komando.”
What digital way of life questions do you will have? Name Kim’s nationwide radio present and faucet or click on right here to seek out it in your native radio station. You’ll be able to take heed to or watch The Kim Komando Present in your cellphone, pill, tv, or laptop. Or faucet or click on right here for Kim’s free podcasts.
Copyright 2022, WestStar Multimedia Leisure. All rights reserved. By clicking the buying hyperlinks, you’re supporting my analysis. As an Amazon Affiliate, I earn a small fee from qualifying purchases. I solely advocate merchandise I imagine in.
Study all the newest know-how on The Kim Komando Present, the nation’s largest weekend radio discuss present. Kim takes calls and dispenses recommendation on immediately’s digital way of life, from smartphones and tablets to on-line privateness and knowledge hacks. For her every day ideas, free newsletters, and extra, go to her web site at Komando.com.

Technology
The head of a Biden program that could help rural broadband has left

1. Delays in getting broadband to the people. Some states are on the 1 yard line. A bunch are on the 5 yard line. More will be getting there every week. These more-sweeping changes will only cause delays. The administration could fix the problems with the program via waiver and avoid slowdowns. Shovels could already be in the ground in three states, and they could be in the ground in half the country by the summer without the proposed changes to project selection.
2. More people will get Starlink/Kuiper, and fewer people will get fiber connection. This could be dramatic, or it could be measured, depending on where the admin sets the threshold limit, and whether states are permitted to award projects above the new threshold on the basis of value per dollar, or if they’re forced to take the cheapest proposal, even if it provides poorer service.
3. The 3 states with approved Final Proposals remain in limbo. They are currently held in NIST review regarding their proposed FPFRs (the budgets accompanying their approved final proposals).
This makes no sense – these states are ready to go, and they got the job done on time, on budget, and have plans that achieve universal coverage. If the administration cares about getting shovels in the ground, states with approved Final Proposals should move forward, ASAP.
4. West Virginia (and soon additional states) who have completed their work, but don’t have approved Final Proposals also remain in limbo. They have a final proposal ready to go that gets exceptional service to all West Virginia homes and businesses. Like the three states with approved Final Proposals, only the current administration stands between them and getting shovels in the ground. If the administration cares about getting things done, they should allow any state that comes forward with a Final Proposal under the old rules in the next couple of months move forward with that plan.
5. No decision has been made about how much of the existing progress the 30 states who are already performing subgrantee selection should be allowed to keep. The administration simply cannot say whether the time, taxpayer funds, and private capital that were spent on those processes will be wasted and how much states will have to re-do.
6. The wireless industry will be, effectively, shut out of the BEAD program. There will be few, if any, locations that are above any new cost limit that will be able to be more cheaply served by fixed wireless than low earth satellites.
Technology
Warning signs your mail has been fraudulently redirected

Change-of-address scams involve some of the most seemingly harmless personal information getting into the wrong hands. This can lead to a whole host of problems, including financial losses and identity theft, although change-of-address fraud is technically a form of identity theft.
This kind of fraud involves a scammer impersonating you to request a change of address with the United States Postal Service (USPS).
Once they have your mail redirected to an address they control, they can go through it at their leisure, looking for mail they can steal and information they can use to perpetrate further scams, like taking out loans or credit cards in your name or using your identity to defraud others.
STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW
USPS delivery truck (Kurt “CyberGuy” Knutsson)
Here’s how it works, step by step
This detailed breakdown explains the process of a change-of-address scam, from initial targeting to the potential consequences and warning signs to watch for.
Targeting
A person with criminal intent gets your postal address and full name, something that’s most easily done using a so-called people search site. People search sites, also known as people finder sites, are a kind of data broker that specializes in collecting, organizing and selling access to personal information.
Making a fraudulent change-of-address request
The scammer then mails a change-of-address request to the USPS, providing your name and a new address he has access to. The online change-of-address form is generally more secure, requiring confirmation via a bank account. That’s why scammers will almost always mail in the request.
The form requires a signature, but this is unlikely to be verified when processing the request. So, the scammer will either find an image of your signature somewhere, steal a document that includes your signature or simply sign your name any which way.
Harvesting sensitive documents and data
Now that they’ve redirected your mail straight into their hands, the scammer just has to patiently wait for sensitive mail to arrive. They’re on the lookout for anything they can use to steal from you or defraud you. Bank statements, tax documents, checks and even your household bills can be used to commit further acts of fraud and identity theft.
One of the scariest things a scammer can do once he has enough of your personal information is to commit deed fraud, otherwise known as home title theft. You’re far from helpless, though. There are telltale signs that you can watch for to catch change-of-address scams early.
The signs to look out for
The most obvious sign to watch for is a sudden and persistent drop in the amount of mail entering your mailbox. This only applies to mail addressed to you by name. Mail delivered to your address without an addressee, including mail addressed to “homeowner” or “occupant,” won’t be affected by a change-of-address scam.
The other major things to keep an eye on are your credit report, credit card statements and bank statements. You can request a free credit report from one of the three credit bureaus once per year.

A mailbox in front of a house (Kurt “CyberGuy” Knutsson)
HOW DATA BROKERS ARE FUELING ELDER FRAUD IN AMERICA
What to do if you think your mail has been fraudulently redirected
If you have good reason to believe that someone has redirected your mail without permission, don’t hesitate to take action. The sooner you catch this, the better. Here’s what you can do:
- Start by keeping detailed records: Document everything that’s led you to believe your mail has been redirected. This includes the mail you were expecting, any communication with the senders of the missed mail (such as confirming dispatch dates), suspicious phone calls, texts or emails, and any unusual activity in your online accounts, bank accounts or credit reports.
- Reach out to the USPS for help: Use the online locator to find and contact your local U.S. Postal Inspection Service (USPIS) office. They can assist with investigating fraudulent mail redirection.
- Take action if identity theft is suspected: If you believe you’ve become a victim of identity fraud, visit the Federal Trade Commission’s identity theft portal. This resource will help you develop a recovery plan and guide you through the steps to protect yourself.
Taking these steps will put you on the road to regaining control and getting through what can quickly become a stressful situation.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

A stack of mail (Kurt “CyberGuy” Knutsson)
DON’T LET THIS CREDIT CARD FRAUD NIGHTMARE HAPPEN TO YOU
Stop change-of-address scammers in their tracks
Prevention is better than a cure, and, luckily, there’s a lot you can do to stop change-of-address scams before they start.
1. Invest in personal data removal services: Have your personal information removed from data broker databases, including people search sites. They’re the first port of call for many scammers. Without these companies in the mix, scammers aren’t likely to come across your address in the first place.
A reputable personal information removal service can take your data down from hundreds of sites and keep it off by resending removal requests, even as data brokers try to add your information to their databases.
While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
2. Reduce the amount of sensitive mail in your mailbox: Start by switching to paperless options wherever available. This will dramatically reduce the amount of sensitive mail heading to your mailbox, leaving criminals with little value to steal. Check your mail daily, as soon as possible after it’s delivered. Get someone to do this for you if you’re away. Some redirection scams start with mail being stolen from your mailbox. Definitely avoid allowing your mailbox to overflow.
3. Secure your mailbox: Consider upgrading to a locked mailbox to prevent mail theft. If you live in an area prone to mail theft, this simple step can stop criminals from intercepting sensitive documents before they even reach you.
4. Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.
5. Set up USPS Informed Delivery: Enroll in USPS Informed Delivery, a free service that lets you preview images of incoming mail before it arrives. This can help you spot missing mail early and identify potential issues with mail redirection.
6. Report suspicious activity immediately: If you notice anything unusual, such as missing mail or unauthorized changes to your accounts, report it right away. Contact the USPS, your bank and the Federal Trade Commission to ensure the issue is documented and addressed promptly.
BEWARE OF FRAUDSTERS POSING AS GOVERNMENT OFFICIALS TRYING TO STEAL YOUR CASH
Kurt’s key takeaways
Change-of-address scams might sound like an unlikely threat, but they can wreak havoc on your finances and peace of mind if left unchecked. By staying alert, securing your personal information and taking proactive measures like monitoring your mail and credit, you can greatly reduce the risk of falling victim to these scams. Remember, catching fraud early is key. So, don’t hesitate to act if something feels off.
What do you think should be done to prevent change-of-address scams? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover
Follow Kurt on his social channels
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Air taxis: the latest on the flying electric cars bringing the Jetsons dream to life

There’s a future where we don’t need roads and regular folks like you and me can jump into a boat-sized electric pod and just fly anywhere on a whim. While we’ve been perfecting the miracle of human flight for more than a century, instant air transportation has long been relegated to science fiction.
But in the last decade, many companies have stepped up to help get flying cars and air taxis out of the Hollywood movie magic bubble. Startups like Joby Aviation and Archer are building electric vertical take-off and landing (eVTOL) aircraft that can taxi several people around in the sky without burning nasty fuel. The air taxi dream is already passing some regulatory milestones: the FAA has now established rules.
Although these vehicles aren’t exactly the “flying cars” we’ve imagined, this is a rapidly growing new field with big established automakers like Toyota, Hyundai, Stellantis, and others either bankrolling their own ventures or one of the dozens of startups. And there’s a whole lot of drama and unpredictability in this new industry, from fighting over “stolen” patents to the companies that’ve failed to survive, like Lilium and the Larry Page-funded Kitty Hawk. Scroll down to read the latest on air taxis.
-
News1 week ago
Gene Hackman Lost His Wife and Caregiver, and Spent 7 Days Alone
-
Politics1 week ago
Republicans demand Trump cut American legal association out of nominee process
-
Politics1 week ago
Agriculture secretary cancels $600K grant for study on menstrual cycles in transgender men
-
News1 week ago
States sue Trump administration over mass firings of federal employees
-
News1 week ago
Trump Seeks to Bar Student Loan Relief to Workers Aiding Migrants and Trans Kids
-
Politics1 week ago
Kristi Noem says 2 leakers accused of disclosing ICE operations ID'd: 'Put law enforcement lives in jeopardy'
-
News5 days ago
Grieving Covid Losses, Five Years Later
-
World5 days ago
Ukraine accepts 30-day ceasefire in US talks: What it means for Russia war