Connect with us

Technology

Too loud? Ticket’s in the mail

Published

on

Too loud? Ticket’s in the mail

NEWYou can now listen to Fox News articles!

You already know about speed cameras. Red light cameras. Toll cameras that photograph your plate and bill you later.

Now meet their cousin. Noise cameras are the newest automated enforcement technology spreading through American cities. A pole-mounted device contains sensitive microphones paired with a license plate camera.

IF SOMEONE GETS INTO YOUR EMAIL, THEY OWN EVERY ACCOUNT YOU HAVE. THESE 3 MOVES LOCK THEM OUT FOR GOOD

Your car drives past. If your exhaust tips over the legal decibel limit, a ticket arrives in your mailbox days later. No warning. No officer pulling you over. No flashing lights in your rearview mirror. Just a microphone that never blinks, never takes a break and never misses a shift.

Advertisement

Silence of the Lambos

New York City has been running these since 2021. The cameras have issued more than 1,600 violations and collected nearly $2 million in fines. Get caught once, and you’re looking at $800. Get caught repeatedly, and the fine climbs to $2,500.

New York City implemented noise cameras and has been using the technology since 2021. (Gary Hershorn/Getty Images)

Newport, Rhode Island, put two cameras on scenic Ocean Avenue. Within days, a Mustang GT got nailed at 85 decibels. Two decibels over the limit. $250 fine. Providence approved $180,000 to add cameras in 2026. Connecticut passed statewide legislation.

California has six cities running a five-year pilot program with fines up to $1,105. Chicago, Miami, Philadelphia, Sacramento and Washington, D.C., are all deploying or testing. Colorado, New Jersey and Hawaii have introduced similar legislation. This is not a local story anymore. It’s a national one moving fast, and most drivers have absolutely no idea it’s coming for them.

5 SIMPLE TECH TIPS TO TAKE BACK CONTROL OF YOUR SOCIAL MEDIA

Advertisement

Here’s how the technology actually works. 

The microphone detects sound above the legal threshold, typically between 75 and 95 decibels depending on the city. To put that in plain English, a normal conversation runs about 60 decibels. A lawnmower hits around 90. Most cities are drawing the line somewhere in between. The camera cross-references the sound spike with the exact moment a vehicle passes, photographs the plate, and generates the ticket automatically. No officer involved. No human review in most cases. Just math, a microphone and a camera pointed at your plate.

Too loud and furious

When I’m in my Porsche and flip into manual mode, rowing through the gears with that beautiful exhaust note singing, I’m not doing the math on that out loud. Let’s just say I’m watching the camera location maps very carefully. You probably should too.

If your car reaches a certain decibal above the “legal threshold,” the microphone in the camera can detect the sound and cross references with the moment a vehicle passes. (Utah Department of Transportation)

Here’s what should concern drivers with completely stock vehicles. That Mustang GT wasn’t a tuned track car. It’s a car you buy at a dealership. Two decibels over the limit. $250 gone. Motorcycles are even more exposed. A stock Harley-Davidson idles around 75 decibels and can hit 90 under acceleration. Well inside the danger zone in several cities already running cameras. You don’t need a modified exhaust to get a ticket. You just need bad timing.

Advertisement

AI is being used to pinpoint which specific vehicle in a group triggered the alert. Not just the loudest car in the frame. Your car. The tech is getting smarter every single month.

DRONE FOOD DELIVERY LAUNCHES IN NEW JERSEY

Roar and peace

There are two valid sides here.

If someone with a straight-pipe exhaust does a flyby past your bedroom at midnight, you’re probably delighted they got caught. Noise pollution is a real health issue linked to sleep disorders, elevated blood pressure and anxiety. Cities have tried everything and nothing worked at scale until now.

An undated file photo of rush hour traffic in Manhattan, New York City, New York. (iStock)

Advertisement

But this is also another layer of always-on surveillance that never forgets and never gives you the benefit of the doubt. Critics have raised legitimate questions about whether cameras get placed disproportionately in lower-income neighborhoods, turning a public health tool into a revenue machine aimed at the wrong zip codes. Fair questions worth asking out loud.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

These cameras are spreading faster than most drivers realize. Search your city name plus “noise camera ordinance” to find the exact decibel limits where you live. Know the number before the camera does.

Send this to someone who is a car enthusiast, a motorcycle rider or anyone with a loud vehicle. Forward this before they find out the hard way. Consider it your good deed for the week.

Copyright 2026, WestStar Multimedia Entertainment. All rights reserved.

Advertisement

Technology

Texas sues Netflix for advertising ‘bait and switch’ and spying

Published

on

Texas sues Netflix for advertising ‘bait and switch’ and spying

Texas Attorney General Ken Paxton has filed a lawsuit against Netflix, accusing the company of turning its back on its promise to remain ad-free and safe for kids. The lawsuit, filed on Monday, claims Netflix has “opened Texans’ data for inspection by the same Big Ad Tech community it once criticized for exploiting users in this same way.”

In the lawsuit, Paxton claims Netflix drove up subscriptions by promoting its platform as an “escape from Big Tech surveillance.” But at the same time, Paxton alleges the streamer “built a behavior-surveillance program” in the background with addictive features, like autoplay, which automatically plays the next episode after one is finished.

“Netflix’s endgame is simple and lucrative: get children and families glued to the screen, harvest their data while they are stuck there, and then monetize the data for a handsome profit,” Paxton’s lawsuit claims, citing the streaming service’s annual revenue, which jumped from $15 billion in 2018 to an estimated $50 billion in 2026.

“Netflix has built a surveillance program designed to illegally collect and profit from Texans’ personal data without their consent, and my office will do everything in our power to stop it,” Paxton says in the press release. “Netflix is not the ad-free and kid-friendly platform it claims to be. Instead, it has misled consumers while exploiting their private data to make billions.”

Paxton accuses Netflix of violating the Texas Deceptive Trade Practices Act, and asks the court to block the streamer’s “unlawful collection and disclosure” of user data, as well as to disable autoplay by default on kids’ profiles. Netflix didn’t immediately respond to a request for comment.

Advertisement
Continue Reading

Technology

School app Canvas breach hits during finals

Published

on

School app Canvas breach hits during finals

NEWYou can now listen to Fox News articles!

Finals week is stressful enough without your school’s main classroom app suddenly going dark.

That is what many students faced when Canvas, the school platform used by colleges, universities and K-12 schools, went down for several hours. The outage came after Instructure, the company behind Canvas, detected unauthorized activity tied to a cybersecurity incident on the platform.

For students and teachers, this was more than a tech glitch. Canvas is where many schools post assignments, messages, grades, class updates and exam instructions. So when access disappeared, it created confusion at the worst possible time.

Sign up for my FREE CyberGuy Report

Advertisement
  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

WHY LAST YEAR’S BREACH IS THIS YEAR’S IDENTITY FRAUD

Canvas outage during finals week leaves students locked out after cybersecurity incident triggers shutdown of key classroom platform. (Matthew Horwood/Getty Images)

What happened in the Canvas data breach?

Instructure says it detected unauthorized activity in Canvas on April 29, 2026. The company said it immediately revoked the unauthorized party’s access, started an investigation and brought in outside forensic experts.

Then, on May 7, Instructure said it identified additional unauthorized activity tied to the same incident. The company said the unauthorized actor made changes to pages that appeared when some students and teachers were logged in through Canvas.

Out of caution, Instructure temporarily took Canvas offline into maintenance mode to contain the activity, investigate and apply additional safeguards.

How Free-For-Teacher accounts fit into the Canvas breach

Instructure said it later confirmed that the unauthorized actor exploited an issue related to its Free-For-Teacher accounts. The company said this was the same issue that led to the unauthorized access the prior week.

Advertisement

In a statement to CyberGuy, Instructure said, “Instructure discovered the unauthorized actor involved in our ongoing security incident made changes to the pages that appeared when some students and teachers were logged in. Out of an abundance of caution, we immediately took Canvas offline to contain access and further investigate. We have confirmed that the unauthorized actor exploited an issue related to our Free-For-Teacher accounts. As a result, we have made the difficult decision to temporarily shut down our Free-For-Teacher accounts. This gives us the confidence to restore access to Canvas, which is now fully back online and available for use. We regret the inconvenience and concern this may have caused.”

That detail is important because it explains how the company says the attacker gained access. It also shows why Instructure took a more aggressive step after the May 7 activity.

Canvas outage disrupted students during finals

The timing made the outage especially frustrating. Students across the country are preparing for finals or already taking them.

Several schools reported problems with Canvas access. Student newspapers at Harvard, the University of Pennsylvania, Duke, UCLA and the University of Nebraska were reportedly blocked from using Canvas and saw a message from the hacking group ShinyHunters.

Think about how that feels if you are a student. You may need to submit a paper, check exam details or message a professor. Then the system you rely on suddenly stops working.

Advertisement

That is the real-life problem with school tech. When one major platform goes down, the disruption spreads fast.

Hackers claimed responsibility for the Canvas breach

A hacking group called ShinyHunters claimed responsibility for the attack. The group reportedly threatened to leak school data unless it heard from affected schools by May 12, 2026.

The group also claimed it had data tied to nearly 9,000 schools and about 275 million people. Those numbers come from the hackers’ claims. Instructure has not publicly verified that full scale.

That is worth keeping in mind. Cybercriminals often use big numbers to create panic and pressure victims. However, the confirmed incident is serious enough for schools and families to pay attention.

What student and teacher data may be at risk?

Based on Instructure’s investigation so far, the data taken in the April 29 incident includes certain personal information of users at affected organizations. That includes names, email addresses, student ID numbers and messages among Canvas users. Instructure said it has found no evidence that passwords, dates of birth, government identifiers or financial information were involved.

Advertisement

The company also said that, based on its investigation to date, it has not found evidence that data was taken during the May 7 activity. Still, Instructure said the investigation is ongoing.

Even so, this kind of information can still create problems. A scammer could use a student’s school email and Canvas details to send a fake message that looks official.

For example, a student may get an email that says a final exam file failed to upload. Another message may claim the student needs to verify a Canvas account. A fake IT alert could ask for a login code. That is how a data breach can turn into a phishing attack. 

Is Canvas back online after the breach?

Yes. Instructure says Canvas is fully back online and available for use. However, Free-For-Teacher accounts remain temporarily shut down while the company works through the issue.

The company also says its outside forensic partner reviewed the known indicators and found no evidence that the threat actor currently has access to the platform.

Advertisement

Instructure says it has revoked privileged credentials and access tokens tied to affected systems. It also says it deployed additional platform protections, rotated certain internal keys, restricted token creation pathways and added monitoring across its platforms.

Why the Canvas breach matters for families

Many parents may not know how much school life now runs through platforms like Canvas. Students use Canvas to track deadlines, get teacher updates, submit work and read class messages. Teachers use it to manage assignments and communicate with students.

That makes Canvas a tempting target. If criminals can disrupt access or steal user information, they can create chaos quickly. The bigger lesson here is that school accounts deserve the same protection as bank accounts or email accounts. They hold personal details, private messages and information tied to a student’s daily life.

HACKERS THREATEN TO LEAK DATA FROM 275M USERS AFTER BREACHING MAJOR COLLEGE PLATFORM USED NATIONWIDE

Instructure takes Canvas offline after detecting unauthorized activity tied to breach affecting schools nationwide. (Photo by Carmen Jaspersen/picture alliance via Getty Images)

Advertisement

Ways to stay safe after the Canvas data breach

Even if passwords and financial details were not part of the breach, students and teachers should still stay alert. Scammers can use names, school emails, student ID numbers and message details to make fake alerts look convincing.

1) Watch for fake Canvas emails

Be careful with any message that claims to come from Canvas, Instructure or your school’s IT department. Scammers may use urgent language. They may say your account will be locked, your exam file is missing, or your final grade is at risk. That pressure is the trick. Go directly to your school’s official website or Canvas login page instead of clicking links in surprise emails.

2 Change your password if your school recommends it

Instructure said it found no evidence that passwords were involved. Even so, follow your school’s instructions. If your school tells you to reset your password, do it right away. Choose a strong password you do not use anywhere else. A password manager can help you create and store unique logins for each account. Check out the best expert-reviewed password managers of 2026 at CyberGuy.com.

3) Turn on multifactor authentication

If your school offers multifactor authentication, turn it on. MFA adds another step when someone tries to log in. That extra step can stop a scammer who has your password. An authenticator app or passkey is stronger than a text code. Still, any MFA is better than leaving your account wide open.

4) Never share login codes

No real school IT worker should ask for your password or login code. If someone asks for that information, treat it as a red flag. End the conversation and contact your school through an official help desk number or website.

Advertisement

5) Review your Canvas messages

Since Canvas messages may have been involved, think about what you shared there. Did you send personal details? Did you mention another account? Did you share private information with a teacher or classmate? You do not need to panic. But you should stay alert for messages that reference details from your Canvas account.

6) Use strong antivirus software

A breach like this can lead to phishing emails with malicious links or attachments. Strong antivirus software can help block malware, warn you about dangerous websites and protect your devices if you accidentally click the wrong link. Keep it updated on your phone, tablet and computer. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

7) Consider a data removal service

Student and teacher information can end up on people-search sites and data broker databases. A data removal service can help reduce how much personal information is floating around online. That can make it harder for scammers to connect your school email, home address, phone number and other personal details. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

8) Use identity theft protection if your data was exposed

If your school confirms that your personal information was involved, identity theft protection can help you spot suspicious activity faster. These services can monitor your personal information, alert you to possible misuse and help you respond if someone tries to use your identity. See my tips and best picks on Best Identity Theft Protection at CyberGuy.com.

9) Parents should talk to students about phishing

Younger students may not recognize a fake school message. Parents should keep the warning simple. Tell students not to click unexpected links, share codes or respond to scary messages without checking first. A quick conversation now can prevent a bigger mess later.

Advertisement

What schools and Canvas users should do next?

Instructure says it notified impacted organizations on May 5, 2026. If a school or institution was affected, Instructure says it will contact that organization’s primary contacts directly.

For students, parents and employees, Instructure says the school or institution should be the first point of contact. It also recommends being cautious of unexpected emails or messages about the incident, avoiding suspicious links and reporting anything unusual to the school’s IT or security team.

Schools should also warn students and staff about follow-up scams. A breach does not end when the platform comes back online. For students and teachers, the risk can continue through fake emails, fake login pages and scam messages.

ADT DATA BREACH EXPOSES CUSTOMER INFORMATION

Students scramble as Canvas outage disrupts exams, assignments and communication during critical finals period. (Katherine Frey/The Washington Post via Getty Images)

Advertisement

Kurt’s key takeaways 

The Canvas breach shows how much school now depends on a few digital platforms. When one of them goes down, students feel it right away. The good news is that Instructure says it has found no evidence that passwords, financial data, birthdays or government IDs were involved. The tougher reality is that names, school emails, student IDs and private messages still have value to scammers. So the best move is to stay calm and stay skeptical. Use official school links. Turn on stronger login protection where possible and treat urgent messages with caution.

Should schools and tech companies do more to protect student and teacher data before a breach puts their privacy at risk? Let us know by writing to us at CyberGuy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

The Bastl Kalimba is a wild synth that thinks it’s a thumb piano

Published

on

The Bastl Kalimba is a wild synth that thinks it’s a thumb piano

Make no mistake, the Bastl Kalimba is a synthesizer, you just play it like a kalimba. Its tines don’t really make much sound. There is an internal mic that you can blend in for a little acoustic spice, but it’s mostly driven by the synth engine that combines physical modeling and FM. The tines are actually touch and velocity-sensitive triggers. And, while it can sound somewhat like a real kalimba, it’s a lot more sonically versatile and offers features you can only find on a synth.

Beyond the synth sounds that range from pluck to pads, there are also built-in effects covering basic spatial effects like delay and reverb, as well as distortion, bit crushing, and even tape emulation. There’s also a multi-mode high- and low-pass filter, a simple arpeggiator.

More interesting, though, are the looper and touch points that add unique effects. The looper has time-stretching features, can be reversed, and rerecorded through the effects for destructive processing. A series of touchpads on the front enable note glides and alter the timbre using effects that Bastl calls Soil and Wind. Those effects unlock the Kalimba’s accelerometer for further timbral manipulation. There are also two programmable touch points on the top that can be assigned to almost any parameter, from simple pitch bends to the size of the reverb.

Bastl is currently running a Kickstarter campaign for the first batch of Kalimbas. Normally, this is where you get the caveats about crowdfunded products. But Bastl Instruments is a well-established company with a long track record of delivering oddball music gear at scale. The company called it “one of the most challenging” products it has ever created, and it spent more than three years in development, so it’s possible that Bastl is gauging interest before committing to mass production. We’ve reached out to Bastl for comment and will update if we hear back.

Continue Reading
Advertisement

Trending