Connect with us

Technology

Tesla’s spring update activates adaptive high beams that won’t blind oncoming drivers

Published

on

Tesla’s spring update activates adaptive high beams that won’t blind oncoming drivers

Tesla’s vehicles may be in a sales slump, but that’s not stopping the company from regularly introducing fresh features for owners. Tesla’s spring software update includes several useful new functions in its EVs, including adaptive high beams on compatible cars and better trip planning.

The update will allow some Tesla owners to use high beams without blinding other drivers and cyclists on the road by enabling the beamforming capabilities of equipped matrix headlights. The company first started installing the hardware across its vehicles in 2022, but are just now enabling it. Tesla had also enabled the features in Europe last year, and the newly refreshed Model Y will ship with the new smart headlights.

Many automakers like Audi have already been using adaptive headlights for about a decade in Europe, but the technology only became legal in the US in 2022. Other US automakers, including Ford and its F-150 Lightning, have the necessary hardware but aren’t yet enabling all the features of adaptive lights by default.

Another very useful feature in the spring release includes “Alternative Trip Plans,” which lets Tesla owners select different EV navigation routes based on whether they want to get there faster, have the fewest stops, or want to visit highly rated restaurants, shops, and restrooms. It adds to an already comprehensive EV navigation experience that other automakers have yet to catch up to, although Tesla still does not include third party chargers in automatic routing. Additionally, you can now set navigation to avoid highways.

Tesla is also giving its Sentry secure video and Dashcam features the ability to record clips from the B-Pillar side cameras, increasing their capture abilities from six of the vehicle’s cameras instead of four. An updated Dashcam viewer on the infotainment screen includes a new grid view to make it easier to review recordings. These new dashcam features, however, only work on Tesla models with AMD-powered infotainment screens, so anyone with Intel-powered ones won’t get the new functionality.

Advertisement

Other notable features in the update include sideview camera feeds on the instrument cluster for Model S and X, location based trunk height memory so your tailgate doesn’t hit your low-ceiling garage, always-on USB-C and wireless charging, and, for those who refuse to pay Tesla for premium connectivity, the ability to automatically connect to your hotspot when you start to drive.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

The oldest Fire TV devices are losing Netflix support soon

Published

on

The oldest Fire TV devices are losing Netflix support soon

It’s finally time to upgrade for many owners of the earliest Amazon Fire TV devices, as Netflix is ending support for them next month, reports German outlet Heise.

The cutoff for US users is June 3rd, according to ZDNet, which writes that the company has been emailing those who would be affected by the change. Netflix is specifically ending support for the 1st-generation Fire TV streaming box and Fire TV Stick, as well as the 2016 Fire TV Stick with Alexa Voice Remote, ZDNet writes. If you didn’t get the email but want to be certain whether your Fire TV device is one of those reportedly losing Netflix, the outlet writes that you can check the “About” section under Settings > My Fire TV.

According to Heise, Amazon is offering discounts on new Fire TV Sticks to those affected by the change. Amazon didn’t immediately respond when The Verge reached out to ask whether that’s true for US users, as well.

In a FAQ added to a Netflix help page sometime in the last couple of months (March 15th is when it first showed up on The Internet Archive), the company says it may end support for devices that “can no longer get necessary updates from its manufacturer or support new features.” The company also added new references to error codes R4, R12, and R25-1.

Netflix did not immediately respond to The Verge’s request for comment.

Advertisement
Continue Reading

Technology

19 billion passwords have leaked online: How to protect yourself

Published

on

19 billion passwords have leaked online: How to protect yourself

Passwords are outdated, and it’s time for both tech companies and users to move on. There, I said it. Like it or not, the weakest link in cybersecurity is anything that relies on human input. While organizations continue to invest in firewalls and endpoint security, the most persistent vulnerability remains the human password.

The internet has long struggled with poor password practices, but a recent discovery highlights just how serious the problem is. 

Security researchers have uncovered more than 19 billion newly leaked passwords, collected from hundreds of breaches between April 2024 and April 2025. An astonishing 94% of these passwords were either reused, predictable or both.

Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts and exclusive deals — plus instant access to my free Ultimate Scam Survival Guide when you sign up!

Illustration of a hacker at work. (Kurt “CyberGuy” Knutsson)

Advertisement

What you need to know

Between April 2024 and April 2025, data from nearly 200 separate cybersecurity incidents became publicly available, as discovered by Cybernews. These were not isolated events. They involved massive leak repositories including combolists, stealer logs and compromised databases. In total, over 3 terabytes of raw leaked data were analyzed, comprising more than 19 billion passwords. Only 6 percent of these, just over 1.1 billion, were unique.

Among the most used passwords, “123456” appeared in over 338 million instances. Words like “Password” and “admin” followed close behind, despite years of public warnings. Such defaults often originate from devices like routers or enterprise tools, where they are rarely changed and frequently reused elsewhere.

1.7 BILLION PASSWORDS LEAKED ON DARK WEB AND WHY YOURS IS AT RISK

Personal names remain a common pattern as well. The name “Ana” appeared in nearly 179 million passwords, followed by countless other first names and name-based combinations. Pop culture, food, cities and even swear words were frequent themes. Words like “Mario,” “love,” “pizza,” “Rome” and various profanities were not just creative choices. They are now security liabilities.

Even worse, attackers do not need to guess anymore. They have automation. Credential stuffing tools now run through billions of known passwords across hundreds of platforms, breaching accounts at success rates as high as two percent. That equates to thousands of compromised profiles, bank accounts, emails and cloud tools every single day.

Advertisement
hacker on keyboard

Illustration of a hacker at work. (Kurt “CyberGuy” Knutsson)

200 MILLION SOCIAL MEDIA RECORDS LEAKED IN MAJOR X DATA BREACH

The bigger problem

According to CyberNews researcher Neringa Macijauskaite, the core issue is not just weak passwords but how often they are reused. Only six percent of passwords are unique. For most users, security depends entirely on two-factor authentication, if it is enabled at all.

Most passwords fall between eight to 10 characters, with eight being the most common. Around 27 percent of them contain only lowercase letters and digits, making them highly vulnerable to brute force attacks. Less than 20 percent use a mix of cases and numbers, and only a small fraction includes symbols.

HOW SECURE IS MY PASSWORD? USE THIS TEST TO FIND OUT

Despite widespread education efforts, user habits remain stagnant, but one positive trend has emerged. In 2022, only one percent of passwords used a mix of lowercase, uppercase, numbers and symbols. Now that figure has grown to 19 percent, likely driven by stricter password requirements across platforms.

Advertisement

Get a free scan to find out if your personal information is already out on the web.

another hacker

Illustration of a hacker at work. (Kurt “CyberGuy” Knutsson)

HR FIRM CONFIRMS 4M RECORDS EXPOSED IN MAJOR HACK

A password manager is the solution

Reused or weak passwords pose a massive threat, not just to individuals but to organizations. A single compromised password can trigger a domino effect, exposing multiple accounts across services. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed Password Managers of 2025 here.

Four ways to stay safe from password-stealing scammers

Protecting your data requires a mix of smart security habits and reliable tools. Here are four effective ways to keep your information safe.

1. Enable two-factor authentication (2FA): Even if your password is stolen, 2FA adds an extra layer of security by requiring a second form of verification, such as a code from an authentication app or biometric confirmation. Cybercriminals rely on stolen usernames and passwords to break into accounts, but with 2FA enabled, they cannot gain access without the additional security step. Make sure to enable 2FA on important accounts like email, banking and work-related logins.

Advertisement

2. Use strong antivirus software and be cautious with downloads and links: Infostealer malware is the root cause of why your password is out there. It often spreads through malicious downloads, phishing emails and fake websites. Avoid downloading software or files from untrusted sources, and always double-check links before clicking them. Attackers disguise malware as legitimate software, game cheats or cracked applications, so it is best to stick to official websites and app stores for downloads.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3. Keep software updated: Cybercriminals exploit outdated software to deliver malware. Keeping your operating system, browsers, and security software up to date ensures that known vulnerabilities are patched. Enable automatic updates whenever possible, and install reputable antivirus or endpoint protection software that can detect and block infostealer threats before they compromise your system.

4. Consider a personal data removal service: These services can help remove your personal information from data broker sites, reducing your risk of identity theft, spam and targeted scams. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Advertisement

Kurt’s key takeaways 

When it comes down to it, passwords just aren’t cutting it anymore. The sheer number of leaked passwords and the fact that so few are unique show how vulnerable we really are. Cybercriminals are getting smarter and faster, but we don’t have to make it easy for them. By using password managers, enabling two-factor authentication, keeping our software updated and considering extra privacy tools, we can take back some control over this situation. It might take a little effort to change old habits, but the peace of mind you get is worth it.

How many of your accounts use the same password or a variation of it? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.  

Advertisement
Continue Reading

Technology

The Verge’s 2025 graduation gift guide

Published

on

The Verge’s 2025 graduation gift guide

Graduation is one of those unique milestones in life that’s both exciting and nerve-wracking. It’s worth celebrating, but it also marks a new chapter that can feel overwhelming. That’s why your grad will surely appreciate a little support as they step into the next phase of their life, whether that be college or their first job.

Lucky for you, we’ve put together a list of gifts that are designed to make the transition into post-grad life a little smoother. Our picks cover essentials they might need for their first apartment or dorm — from kitchenware to tools — along with a few gifts to remind them of home. We’ve also sprinkled in a ton of gadgets to set them up for success, including e-readers and portable chargers. And because they’ve certainly earned some downtime, we’ve included a selection of other ideas to help them unwind and celebrate a job well done.

Update, May 23rd: Adjusted pricing / availability and added several new gift suggestions, including Apple’s latest MacBook Pro 13 and Lovepop’s colorful Black-Eyed Susan Bouquet.

Continue Reading
Advertisement

Trending