Connect with us

Technology

US Air Force’s XQ-67A drone thinks, flies, acts on its own

Published

on

US Air Force’s XQ-67A drone thinks, flies, acts on its own

Have you ever wondered what the future of warfare might look like? Well, it’s starting to take shape right above our heads. 

The U.S. Air Force has just unveiled a new aircraft that’s turning heads and raising eyebrows across the globe.

But don’t expect to see a pilot in the cockpit. This high-tech innovation flies itself.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

U.S. Air Force’s XQ-67A drone (AFRL)

Advertisement

XQ-67A: The new kid on the block

On a sunny California day in February 2024, something extraordinary took flight. The XQ-67A, a sleek unmanned aircraft, soared into the sky for the first time, giving us a glimpse into the future of aerial combat and reconnaissance.

The XQ-67A is what’s known as a drone or unmanned aerial vehicle. This aircraft is packed with cutting-edge technology that allows it to fly without a human pilot on board. Instead, it can be controlled remotely or even fly on its own, making decisions based on its programming and the data it collects.

air force drone 2

U.S. Air Force’s XQ-67A drone (AFRL)

A NEW BREED OF MILITARY AI ROBO-DOGS COULD BE MARINES’ NEW SECRET WEAPON

There’s more than meets the eye with the XQ-67A

So, what makes the XQ-67A stand out in a world where drones are becoming increasingly common? For starters, it’s part of a program called the off-board sensing station. This fancy name essentially means it’s designed to be the eyes and ears of the Air Force, gathering crucial information in situations that might be too dangerous for human pilots.

But here’s where it gets really interesting: The XQ-67A is built on what engineers call a “common chassis.” Think of it like a car frame that can be used to build different types of vehicles. This approach allows the Air Force to create various types of drones quickly and cost-effectively. All of these are based on the same core design.

Advertisement

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

air force drone 3

U.S. Air Force’s XQ-67A drone (AFRL)

COULD THESE CREEPY, DEAD STUFFED BIRDS BE USED AS DRONES FOR MILITARY?

It’s a family affair when it comes to the Air Force’s drones

The XQ-67A isn’t alone in this new era of aviation. It’s actually based on an earlier drone called the XQ-58A Valkyrie. And there’s more on the horizon. The Air Force is also developing something called the off-board weapon station, which could be thought of as the XQ-67A’s more combat-oriented cousin.

This family of drones represents a shift in military thinking. Instead of relying solely on expensive, manned aircraft, the Air Force is moving towards a mix of crewed and uncrewed vehicles working together. It’s a concept they call “Loyal Wingman,” where these autonomous drones support and protect human pilots in the air.

air force drone 4

U.S. Air Force’s XQ-67A drone (AFRL)

Advertisement

How the XQ-67A is changing the game

The implications of this technology are huge. With drones like the XQ-67A, the Air Force can gather intelligence, conduct surveillance and potentially even engage in combat without putting pilots directly in harm’s way. It’s not just about reducing risk to human life; it’s about expanding capabilities.

These drones can fly longer missions without the limitations of human endurance. They can be sent into dangerous or contaminated areas without hesitation. And perhaps most importantly, they can make split-second decisions based on data and algorithms, potentially reacting faster than a human pilot could.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

air force drone 5

U.S. Air Force’s XQ-67A drone (AFRL)

Looking to the future of autonomous military aircraft

As exciting as the XQ-67A is, it’s just the beginning. The technology behind these autonomous aircraft is advancing rapidly, and it’s not hard to imagine a future where swarms of artificial intelligence-controlled drones work in perfect coordination with human pilots.

But this future also raises important questions. How will the role of human pilots evolve? What are the ethical implications of having machines make life-and-death decisions in combat? And how might this technology change the nature of warfare itself?

Advertisement

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

air force drone 6

U.S. Air Force’s XQ-67A drone (AFRL)

Kurt’s key takeaways

The XQ-67A represents a pivotal moment in military aviation. The skies of tomorrow will be filled with aircraft that think, decide and act on their own, working alongside human pilots to accomplish missions we can only imagine today. Whether this prospect fills you with excitement or concern, one thing is certain: The future of aerial warfare is here, and it’s autonomous.

What are your thoughts on this new technology? Does the idea of autonomous military aircraft intrigue you, or does it give you pause? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Advertisement

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Netflix’s ad tier is growing really fast — and that means more ads

Published

on

Netflix’s ad tier is growing really fast — and that means more ads

Amy Reinhard, Netflix’s president of advertising, said the streaming service has “the most engaged audience anywhere,” with subscribers on its ad-supported tier spending an average of 41 hours per month on the service.

The new ad formats are part of Netflix’s in-house advertising platform, which is now live in the US after arriving in Canada. It plans to bring the platform to all 12 countries with ad-supported plans by June. “The foundations of our ads business are in place,” Reinhard said. “And going forward, the pace of progress will be even faster.”

Continue Reading

Technology

Fake PayPal email let hackers access computer and bank account

Published

on

Fake PayPal email let hackers access computer and bank account

Online scams are becoming more dangerous and convincing every day. Cybercriminals are finding new ways to gain not just your login credentials but full control of your computer and your bank accounts.

Take John from King George, Virginia, for example. He recently shared his alarming experience with us. His story is a powerful warning about how quickly things can escalate if you respond to suspicious emails.

Here is what happened to John in his own words: “I mistakenly responded to a false PayPal email notifying me of a laptop purchase. The message looked real, and I called the number listed. The person on the phone gave me a strange number to enter into my browser, which installed an app that took control of my PC. A warning popped up saying ‘software updating – do not turn off PC,’ and I could see my entire file system being scanned. The scammer accessed my bank account and transferred money between accounts. He told me to leave my PC running and go to the bank, keeping him on the phone without telling anyone what was happening. I shut everything down, contacted my bank, and changed my passwords.”

John’s quick thinking in shutting down his computer and alerting his bank helped minimize the damage. However, not everyone is as lucky.

Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!

Advertisement

Fake PayPal scam email (Kurt “CyberGuy” Knutsson)

How this scam works

This type of scam is known as a remote access scam. It often begins with a fake email that appears to come from a trusted company like PayPal. The message claims there is an issue, such as an unauthorized charge, and urges the victim to call a phone number or click a link. 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Once the scammer makes contact, they guide the victim to enter a code into their browser or install a program, claiming it will fix the problem. In reality, this grants the scammer full control of the victim’s computer. 

Once inside, scammers often search for sensitive files, access banking websites, steal login credentials or install malware to maintain long-term access. Even if the immediate scam is stopped, hidden malware can allow scammers to reenter the system later.

Advertisement
hacker on laptop

A hacker at work (Kurt “CyberGuy” Knutsson)

THE URGENT PAYPAL EMAIL SCAM YOU CAN’T AFFORD TO IGNORE

Key takeaways from John’s experience

John’s close call highlights several important lessons.

Fake emails are harder to spot than ever: Scammers create emails that look almost identical to real ones from trusted companies like PayPal. They copy logos, formatting and even fake customer support numbers. Always double-check the sender’s email address and verify communications by visiting the official website or app directly instead of clicking links inside emails.

Remote access scams can escalate fast: Once scammers gain control of your device, they can steal sensitive data, move funds between accounts and install hidden malware that stays behind even after the scammer disconnects. It often takes only minutes for serious damage to be done, making fast recognition critical.

Psychological pressure plays a big role: Scammers rely on creating a sense of urgency and fear. By keeping you on the phone and urging secrecy, they isolate you from help and rush you into making bad decisions. Recognizing when you are being pressured is key to breaking the scammer’s control.

Advertisement

Fast action can make all the difference: By quickly disconnecting his computer and contacting his bank, John limited the scammer’s access to his accounts. Acting within minutes rather than hours can stop further theft, block fraudulent transactions and protect your sensitive information from being fully compromised.

laptop

A warning on a laptop home screen (Kurt “CyberGuy” Knutsson)

DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX

How to protect yourself from remote access scams

Taking simple but strong security steps can protect you from falling victim.

1. Never call a number listed in a suspicious email: Scammers often set up fake phone numbers that sound professional but are designed to manipulate you into handing over control or information. Always find verified contact information through a company’s official website or app, not links/numbers provided in suspicious messages.

Advertisement

2. Be skeptical of unusual instructions: No legitimate company will ask you to install software or enter strange codes to protect your account. If anything seems unusual, trust your instincts and stop the communication immediately.

3. Install strong antivirus software on all devices: Antivirus programs can detect suspicious downloads, block remote access attempts and help prevent hackers from taking over your system. Having strong antivirus protection installed across all your devices is the best way to safeguard yourself from malicious links that install malware and attempt to access your private information. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Use identity theft protection: These services monitor financial accounts, credit reports and online activity for signs of fraud, alerting you to suspicious transactions. See my tips and best picks on how to protect yourself from identity theft.

5. React immediately if you suspect a scam: Disconnect your device from the internet, contact your bank or credit card company immediately and change your passwords, especially for banking and email accounts. Monitor your accounts closely for unauthorized activity and report the scam to the Federal Trade Commission as well as the company that was impersonated. Acting quickly can prevent further access and limit the damage scammers can cause.

6. Use multifactor authentication (MFA): MFA adds a critical layer of security beyond passwords, blocking unauthorized logins even if credentials are stolen. Enable MFA on all accounts, especially banking, email and payment platforms, to stop scammers from bypassing stolen passwords.

Advertisement

7. Update devices and software immediately: Regular updates patch security flaws that scammers exploit to install malware or hijack systems. Turn on automatic updates wherever possible to ensure you’re always protected against newly discovered vulnerabilities.

8. Employ a password manager with strong, unique passwords: Avoid password reuse and use complex passphrases to minimize credential-stuffing attacks. A password manager generates and stores uncrackable passwords, eliminating the risk of weak or repeated credentials. Get more details about my best expert-reviewed password managers of 2025 here.

9. Never share screen access or grant remote control: Scammers exploit screen-sharing tools to steal passwords and manipulate transactions in real time. Legitimate tech support will never demand unsolicited screen access; terminate the call immediately if pressured.

10. Invest in personal data removal services: These services automate requests to delete your personal information from data brokers and people-search sites, reducing publicly available details scammers could exploit for phishing or impersonation. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

PROTECT YOURSELF FROM TECH SUPPORT SCAMS

Advertisement

Kurt’s key takeaways

John’s story is a reminder that online scams are evolving quickly and becoming more aggressive. Staying skeptical, verifying all suspicious messages and acting quickly if something feels wrong can make the difference between staying safe and losing sensitive information. Protect your devices, trust your instincts and remember it is always better to be cautious than to take a risk with your security.

Have you or someone you know been targeted by a scam like this? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Meta’s beef with the press flares at its antitrust trial

Published

on

Meta’s beef with the press flares at its antitrust trial

Long-simmering tension between Silicon Valley and the press that covers it is surfacing during the Federal Trade Commission’s antitrust trial against Meta.

During a heated cross-examination of the FTC’s key economic expert, Scott Hemphill, Meta’s lead attorney, Mark Hansen, noted that Hemphill joined Facebook co-founder Chris Hughes and former Biden official Tim Wu in pitching regulators on an antitrust probe of the company back in 2019. The pitch deck for the probe that was shown in court included “public recognition” of the company’s aggressive acquisition strategy from two reporters: Kara Swisher, who currently hosts two podcasts for The Verge’s parent company, Vox Media, and Om Malik, the founder of the early tech blog GigaOm who is now a venture capitalist.

In an attempt to undercut Hemphill’s credibility, Hansen caught Swisher and Malik in the crossfire. He called Malik a “failed blogger” with an axe to grind against Meta. He then suggested that Swisher, whom he referred to as a Vanity Fair columnist (she last wrote for the site in 2015), was similarly biased against the company. In court, he projected a headline about her recently calling Mark Zuckerberg a “small little creature with a shriveled soul.”

The 2019 pitch deck shown at court by Hansen also cited a Post story to support that Facebook should be investigated as a monopoly. Meta’s Hansen asked if Hemphill agreed that “The New York Post is a scandal sheet,” to which he replied that he didn’t “have a view one way or another.” Hansen showed the infamous Post front page headline, “Headless Body in Topless Bar,” to make his point.

The exchange resurfaced years-old tensions between the press and tech titans. After experiencing relatively positive coverage during the early, aspirational days of Silicon Valley, Facebook and a handful of startups grew to become the largest platforms in the world. Along the way, they’ve chafed at increasingly critical coverage of their businesses.

Advertisement

Malik and Swisher have indeed both criticized Meta and its executives. In 2016, Malik critiqued Facebook’s intentions for offering free access to its apps and others in India, after board member Marc Andreesseen blamed local resistance to the program on “anti-colonialism” in a later-deleted tweet. “I am suspicious of any for-profit company arguing its good intentions and its free gifts,” Malik wrote at the time.

It was not the first time Meta has pointed a finger at the media while at trial

Tuesday’s exchange was not the first time that Meta has pointed a finger at the media while at trial. When discussing major scandals like Cambridge Analytica from the witness stand, company leaders have chalked up downswings in user sentiment to negative media attention and testified that Meta’s services haven’t seen comparable declines in engagement.

The FTC has argued that this fact is a sign of monopoly power because people can’t leave Facebook and Instagram without viable alternatives. A judge will ultimately decide if that is true or not. In the meantime, Meta’s grudges with the press are on full display.

Advertisement
Continue Reading

Trending