Connect with us

Technology

Verification scams hitting Elon Musk’s X after changing former Twitter check marks

Published

on

Verification scams hitting Elon Musk’s X after changing former Twitter check marks

X – formerly known as Twitter – has gone through more than a name change since it switched over. One of these has been with the account verification process. You know, that little blue check mark that certain profiles have that indicates it’s verified. Without that blue check mark, it can be difficult to contact other people on X, get through certain groups and, essentially, use the platform to the fullest.

It’s no surprise that this little blue check mark has spurred a lot of controversy. But it’s not just this. The changes going on with X’s verification – aka X Premium or Premium+ – also open a whole new can of worms, specifically when it comes to cybersecurity concerns.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

X blue check-mark verification (X) (Kurt “CyberGuy” Knutsson)

How does one get a verified, blue check mark on X?

Before Elon Musk took over Twitter, there was only one way to get the blue check mark – or Twitter Blue – on Twitter. To do so, you had to be a well-known figure like a celebrity, politician, journalist or part of an organization. Generally, Twitter would reach out to the person directly to confirm their identity.

Advertisement

Now, that’s all changed. These days, just about anyone can get a blue check mark via X’s subscription-based model if they’re willing to pay a monthly subscription fee. (And paying more can also get you a gold check mark, which is usually reserved for businesses.)

This fee not only gets you verified but also gives you the ability to do things on X that those without it can’t, like editing tweets, exposure to fewer ads and possibly more visibility for your tweet. Some accounts have even enabled a setting to only be able to receive messages from verified accounts.

X gold check-mark verification (X) (Kurt “CyberGuy” Knutsson)

MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS

How scammers are taking advantage of X’s verification-change chaos

Unfortunately, there is a downside to everyone being able to get that blue check mark. Not only do you now have to be concerned with getting yourself verified so that you can direct message others who have that setting enabled, but you also have to be on the lookout for scammers who are using the blue check mark to trick you. Here are three scams to look out for.

Advertisement

1) Blue-tick scammers

A blue-tick scammer is a person who pays to get the blue-tick check mark verification on X and then uses that to scam people. But who do they scam and how? Blue-tick scammers have a very particular method and usually target users who complain about poor customer service on X. Maybe they are even complaining specifically about the issues getting their verification on X.

Ultimately, the goal of these scammers is to trick you into disclosing your bank details by promising refunds to you. In June of last year, for example, passengers whose EasyJet flights had been canceled were targeted by cybercriminals on X in this exact way. These scammers were using fake profiles to target victims who had resorted to X to voice their complaints against the airline and demand a refund, only to potentially lose more money by being scammed.

2) Elon Musk impersonators

It’s not uncommon to encounter fake accounts pretending to be well-known personalities – even Elon Musk. These accounts might lack official verification, but at first glance, they won’t give unsuspecting users a reason to doubt that the profile is who it appears to be. These Elon Musk impersonators will try just about anything, but a popular scam is in the form of cryptocurrency ads.

Here’s how the scam goes down. An ad appears on X, which appears to be coming from one of Elon Musk’s companies – or a blue-tick verified Elon Musk profile – advertising a new cryptocurrency that he’s created and steps for people to get it, ultimately encouraging you to transfer money over to the scammer’s wallet.

Elon Musk’s official X account (X) (Kurt “CyberGuy” Knutsson)

Advertisement

MORE: PROTECT YOUR BACON: THE RISE OF PIG BUTCHERING SCAMS AND HOW TO AVOID THEM

3) Bots posing as scantily clad women

Not everyone will fall for this one, but it’s a scam as old as time that’s adapted to new rules on social media environments. If you get any direct messages from verified X accounts posing as a scantily clad woman, it could be a legitimate user. But, it could also be a scammer or even a “sexbot,” which has increased in numbers since all the changes at X as well as the introduction of AI.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

I don’t use X. Why should I be concerned?

The changes on X highlight wider issues in online verification and the potential for misuse. Even if you don’t use X, scammers may attempt similar tactics on other platforms you frequent. Being aware of these scams and how they work can help you stay safe online.

X gold check-mark verification (X) (Kurt “CyberGuy” Knutsson)

Advertisement

How to stay safe from blue check-mark scammers

The good news is that X is aware of these scams. Now, X’s non-deceptive Twitter eligibility requirements for buying a Premium subscription require the user to not have recently changed their photo, display name or username. One of the best ways to protect yourself from scams on popular social media platforms like X is to simply be aware of what new scams are out there. By staying up to date, you can know your weapon to ward off these scammers.

That being said, there are 10 steps you can take to ensure your safety on X.

1) Protect your personal information: Do not share your full name, address, phone number, email, passwords or other sensitive information with strangers or people you do not trust on X.

2) Be skeptical: If an X account seems fishy, investigate further. Check join dates, usernames and their activity history.

3) Use a unique and strong password for your account and change it regularly: Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess.

Advertisement

4) Enable two-factor authentication: Two-factor authentication is just an extra shield that will prevent a hacker from getting into your accounts. 2FA requires you to enter a code that is sent to your phone or email or generated by an app in addition to your password when you log in. This way, even if someone knows your password, they cannot access your account without the code.

5) Review your privacy settings: Limit who can see your posts, photos and profile information on X by changing your privacy settings.

6) Verify the source and accuracy of information: Do not believe everything you see or read on social media. Always check the source and credibility of the information before you engage with the content and share it with others. Use reliable and reputable sources to verify the source and the facts.

7) Have good antivirus software on all your devices: The best way to protect yourself from having your data breached by a scammer on X is to have antivirus protection installed on all your devices. Having antivirus software on your devices will make sure you are stopped from clicking on any potential malicious links, which may install malware on your devices, allowing hackers to gain access to your personal information. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.

8) Delete anyone who tries to trick you: If anyone tries to scam you, or you encounter any suspicious accounts, consider reporting them to X immediately. You can use X’s reporting features to flag potential scams. This will also help others from being scammed.

Advertisement

9) Stay informed about security updates: Keep your software and apps updated to protect yourself from the latest threats.

10) Prevent strangers from following you, via X’s privacy settings: This can be a good way to prevent some of those bots or scammers from getting to you.

All you need to do is click on Settings, select Privacy and Safety, move the toggle for Protect Your Tweets and select Done. Now, only people whose accounts you approve have permission to follow you. You can also block and remove followers if the former is too strict for you.

MORE: HOW TO PROTECT YOURSELF FROM SOCIAL MEDIA SCAMMERS

Kurt’s key takeaways

Social media can be like the Wild West, especially when a bunch of new changes are happening every day. In terms of cybersecurity and protecting yourself online, it’s important to be aware of scams like this. Just because something has a blue check mark (or, anything else that would make it seem “verified” in a certain context) does not mean that it is. It’s so easy for scammers to pose as someone or something else, and chances are they’ll keep coming along. So, it’s OK to second-guess something if you’re not 100% sure; and online, we never really can be.

Advertisement

What are your biggest concerns about the potential for scams on the social media platforms you frequently visit? Let us know in the comments below. Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

6 crypto scam scripts criminals use to steal your money

Published

on

6 crypto scam scripts criminals use to steal your money

NEWYou can now listen to Fox News articles!

Just about every day, we receive emails from readers who have encountered new scams. Many involve cryptocurrency. The pattern keeps repeating. Someone receives a message that feels urgent, emotional or exciting. The person on the other end sounds confident and persuasive. Before long, the victim is being asked to send money through cryptocurrency. Once the money is sent, it often disappears forever.

Cryptocurrency appeals to scammers for a simple reason. Transactions move quickly, often cross international borders and usually cannot be reversed once completed. That combination makes crypto payments especially attractive to criminals.

Kate recently wrote to us with a great question.

“Could you do an article that illustrates the scripts used by scammers to lure people to send money using cryptocurrency. Those scripts must be very convincing to get so many reasonably intelligent people to send money. Maybe five or six examples of the scripts, so people, especially seniors, will know what to watch out for.”

— Kate

Advertisement

Kate is absolutely right. These scripts are convincing because scammers practice them constantly. They use psychology, urgency and emotion to push people toward quick decisions.

FAKE GOOGLE GEMINI AI PUSHES ‘GOOGLE COIN’ CRYPTO SCAM

Crypto scammers use polished scripts built on urgency, trust and emotion to pressure victims into sending irreversible payments. (gpointstudio/Getty Images)

Let’s break down some of the most common crypto scam scripts, so you know what they sound like before they reach your inbox or phone.

Sign up for my FREE CyberGuy Report

Advertisement
  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

The investment opportunity script

This script often begins with a friendly introduction through social media, email or even a text message.

Example script:

“Hi, I work with a private investment group that trades cryptocurrency. We’ve helped many people earn steady returns. If you invest $500 today, you could earn $5,000 within weeks. I can show you proof of other investors’ success.”

The scammer may send fake screenshots of profits. Some will even allow a small withdrawal early on to build trust. Eventually, they push the victim to send larger deposits. Once the larger transfer is sent, the account suddenly stops responding.

The romance crypto script

This scam often starts with a simple message on a dating app, Facebook or Instagram. The first contact is friendly and low-pressure.

Example initial script:

Advertisement

“Hi, insert name here, I hope you don’t mind me saying hello. Your profile caught my attention, and you seem like a very kind person. How has your day been?”

After a few days of conversation, the scammer begins sharing details about their life. They often claim to work overseas as an engineer, doctor or business owner. Eventually, they mention cryptocurrency trading as something they do on the side.

Later message in the script:

“I have been doing some short-term crypto trading after work. It has helped me save a lot faster. If you are interested, I can show you the platform I use. It is very easy to start with a small amount.”

From there, the scammer guides the victim to a fake trading site or asks them to transfer cryptocurrency to a wallet they control. At first, the account may show fake profits. The victim believes the investment is working and sends more money. Eventually, the victim cannot withdraw any money. 

Advertisement

MALICIOUS MAC EXTENSIONS STEAL CRYPTO WALLETS AND PASSWORDS
 

From romance schemes to fake government threats, scammers often follow repeatable crypto scripts designed to sound convincing. Knowing the pattern can help you stop the fraud early. (Nhac NGUYEN / AFP via Getty Images)

The government impersonation script

Scammers often pretend to represent government agencies or law enforcement.

Example script:

“This is an urgent notice regarding your tax account. Your Social Security number has been linked to suspicious activity. To prevent legal action, you must verify your identity and pay the outstanding balance today using cryptocurrency.”

Advertisement

Government agencies do not demand payment through cryptocurrency. The goal is to scare you into acting quickly without checking the facts. 

The tech support emergency script

This scam often begins with a pop-up warning or an unexpected phone call.

Example script:

“Your computer has been compromised by hackers. Your bank information may be at risk. To secure your system, we need you to transfer funds temporarily into a protected cryptocurrency wallet.

The scammer claims the funds will be returned once the system is secure. In reality, the transfer moves the money directly to the criminal.

Advertisement

The crypto giveaway script

This scam frequently appears on social media or video platforms.

Example script:

We are celebrating a new crypto launch. Send 0.1 Bitcoin to this wallet, and we will immediately send back double the amount.”

The message may appear to come from a well-known company or public figure. The wallet address belongs to the scammer. Anyone who sends funds receives nothing in return.

The fake recovery service script

This scam targets people who have already lost money.

Advertisement

Example script:

“We specialize in recovering stolen cryptocurrency. Our investigators located the wallet that received your funds. To begin the recovery process, we require a small crypto payment to unlock the legal tracing tools.”

The victim believes they are hiring professionals to recover their money. Instead, they are being scammed again.

Why these scripts work so well

These scams succeed because they exploit human behavior. First, they create urgency. Victims feel pressured to act quickly.

Second, they create trust. The scammer may sound friendly or sympathetic.

Advertisement

Third, they promise rewards. Investment scams offer profits that feel life-changing.

Finally, cryptocurrency adds confusion. Many people are still learning how it works. Criminals take advantage of that uncertainty.

Understanding these scripts is the first step to protecting yourself. Once you recognize the patterns scammers use, it becomes much easier to stop the conversation before money is involved. 

How to protect yourself from crypto scams

Crypto scammers rely on urgency, trust and confusion to pressure victims into sending money. These practical steps can help you recognize warning signs and avoid costly mistakes. 

1 CLICK COST A FATHER $4 MILLION IN BITCOIN TO VISHING SCAMMERS

Advertisement

Criminals favor cryptocurrency because transactions move fast, cross borders easily and usually cannot be reversed. That makes crypto a powerful tool for scammers. (Mario Tama/Getty Images)

1) Slow down when money is involved

Scammers depend on urgency to push victims into fast decisions. If someone pressures you to send money immediately, treat it as a warning sign. Pause the conversation and verify the situation independently. Contact the company, agency or person through a known phone number or official website. Taking even a few minutes to step back can stop a scam before money leaves your account.

2) Never send cryptocurrency to someone you do not know

Cryptocurrency transactions work very differently from credit cards or bank transfers. Once funds are sent, they usually cannot be reversed. Scammers prefer crypto because it moves quickly and often crosses international borders. If someone asks for payment through Bitcoin, Ethereum or another digital currency, assume the request is suspicious until proven otherwise.

3) Verify investment opportunities independently

Many crypto scams promise fast profits or guaranteed returns. Legitimate investments never guarantee profits. Before investing, search the company name, website and contact information online. Look for warnings from regulators or consumer protection agencies. If you cannot find reliable information about the company, that is a major red flag.

4) Use strong antivirus software on your devices

Scammers frequently use phishing links, fake websites and malicious downloads to trick victims. Strong antivirus software can help detect these threats before they cause damage. Strong antivirus software can warn you about suspicious websites, block malicious downloads and help stop phishing attempts that try to steal your financial information. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

Advertisement

5) Reduce the personal information scammers can find online

Scammers often research their targets before sending messages. They may gather details from public records, social media or data broker websites. Limiting the amount of personal information available online can make it harder for criminals to craft convincing messages. Removing your data from people search sites with a data removal service can reduce the chances of becoming a target. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

6) Be cautious with online relationships

Romance scams often begin with friendly messages on dating apps or social media. Over time, the scammer builds trust and eventually introduces a crypto investment opportunity. If someone you have never met begins discussing cryptocurrency investments or asks you to move money, take a step back. Real relationships do not require financial transfers to strangers.

7) Never trust screenshots or profit dashboards

Crypto scammers often show screenshots of trading accounts that appear to generate large profits. These images are easy to fake or are displayed on fraudulent websites controlled by the scammer. Even if a platform shows profits, it does not mean the money exists. If you cannot withdraw funds easily through a verified exchange, the investment may be fake.

8) Watch for requests to move conversations off the platform

Many scams begin on social media, dating apps or messaging platforms. After the first contact, scammers often ask victims to continue the conversation on WhatsApp, Telegram or another private messaging app. Moving the conversation helps them avoid detection by the original platform. If someone quickly asks you to switch apps, treat it as a warning sign. 

9) Talk to someone you trust before sending money

Scammers often isolate their victims and discourage them from discussing the situation with friends or family. Before sending cryptocurrency or making a large investment, pause and talk to someone you trust. A second opinion can often spot warning signs that are easy to miss when emotions are involved. 

Advertisement

What to do if you already sent cryptocurrency to a scammer

If you believe you sent cryptocurrency to a scammer, act quickly. Contact the exchange or platform you used to send the funds and report the transaction immediately. Some exchanges may be able to flag the receiving wallet and help investigators track suspicious activity.

You should also report the scam to the FTC at reportfraud.ftc.gov and notify your local law enforcement agency. If the scam began on a social media site, dating app or messaging platform, report the account there as well so it can be investigated and removed. 

While recovering funds can be difficult, reporting the incident can help authorities identify larger fraud networks and potentially prevent others from becoming victims. 

Kurt’s key takeaways

Cryptocurrency scams continue to grow because the scripts are polished and carefully tested. The criminals behind them understand human psychology. They know when to apply pressure, when to build trust and when to promise rewards. Recognizing these patterns is one of the most powerful ways to stop them. When you know the script, the scam becomes much easier to spot.

Have you ever received a message that tried to convince you to send cryptocurrency, and did the script almost sound believable? Let us know by writing to us at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

This pasta sauce wants to record your family

Published

on

This pasta sauce wants to record your family

As if there weren’t already enough devices listening in on everything being said in your home, Prego, the pasta and pizza sauce brand, is releasing a device designed to record everything said around the dinner table for posterity. The Connection Keeper, which looks like an oversized pasta jar lid, was created in collaboration with StoryCorps, the nonprofit organization focused on preserving the stories of Americans in a collection housed at the Library of Congress’ American Folklife Center. There’s no AI, Wi-Fi, or Bluetooth, but you can optionally upload recordings to StoryCorps’ website to make them easier to share with family.

Prego says the goal of the device is to encourage families to make memories through conversation during dinner instead of staring at their phones — but only for a small number of families. The company is only planning to make less than 100 of them. The Connection Keeper will be available for purchase online starting on April 27th for $20 as part of a bundle that includes the device, a jar of Prego sauce, spaghetti noodles, and a deck of cards featuring conversation prompts and ideas.

Using the device is as easy as plopping the Connection Keeper down in the middle of everyone at the table and pressing one button to start recording. Using a pair of microphones, it captures CD-quality audio to a 16GB microSD card for up to eight hours when fully charged.

When dinner’s over, the recordings can be transferred to a computer over USB-C and then uploaded to a dedicated microsite created by StoryCorps where they’re preserved and accessible only by the uploader, unless they choose to share them with other StoryCorps users or the general public. You even have the option to archive them within the Library of Congress, which makes them public automatically, so hopefully your family talks about more than just stealing brainrots.

The recordings can be accessed on a smartphone through the StoryCorps app, but Prego intentionally left phones out of the rest of the process to discourage their use at the table. It’s also why the Connection Keeper lacks a screen. The goal was to minimize interactions with the device so family members instead focused on talking with each other.

Advertisement
Continue Reading

Technology

BMW puts humanoid robots to work building EVs

Published

on

BMW puts humanoid robots to work building EVs

NEWYou can now listen to Fox News articles!

BMW Group has spent years testing automation, but this latest move feels different. Instead of robotic arms locked in cages, the company is now using humanoid robots that move through factories more like people. After a successful pilot in Spartanburg, South Carolina, BMW is bringing that same idea into its Leipzig, Germany, factory, where it is testing robots in real production environments. This time, it is partnering with Hexagon Robotics to introduce a new generation of AI-powered machines. Unlike many robot demos you see online, this one is already being tested inside a real production environment.

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.

Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

CHINESE ROBOT BREAKS HUMAN WORLD RECORD IN BEIJING HALF-MARATHON

BMW’s new AI-driven robots are now operating inside active factories, marking a shift from traditional automation to flexible, human-like systems. (Christof Rührmair/picture alliance via Getty Images)

Advertisement

How BMW’s humanoid robot pilot built over 30,000 vehicles

BMW’s earlier pilot used Figure 02 humanoid robots for a very specific task. They handled the precise positioning of sheet metal for welding on the BMW X3 production line. That task may seem small, but it plays a key role in keeping production moving smoothly. Precision work like this can easily slow things down or create bottlenecks. According to BMW, those robots helped contribute to building more than 30,000 vehicles. Because of that success, the company now feels confident about expanding the concept. Instead of limiting testing to one plant, BMW is moving forward with its iFACTORY initiative in Leipzig, where EV production is already a major focus.

BMW’s new AI humanoid robots for EV factories

The new robots, called AEON, come from Hexagon Robotics. They are designed to work inside active factory environments without constant human direction. They rely on AI-based motion control, which helps them move through complex spaces. At the same time, built-in sensors allow them to understand their surroundings in real time. Because of that, they can adjust their actions on the fly instead of following fixed instructions. Hexagon refers to this as “Physical AI.” In simple terms, the robot can make decisions based on what it sees around it. As a result, the robot does not stop when something unexpected happens. Instead, it adapts and keeps working. That marks a clear shift from traditional factory automation.

Why BMW is investing in humanoid robots now

BMW executives have made it clear that this is not about replacing people overnight. Instead, the goal is to test what actually works in real production environments. Michael Nikolaides, who oversees BMW’s production network, says these pilot programs help the company refine how AI-powered robots learn on the job. He goes on to point to a broader vision, saying: “Digitalization improves the competitiveness of our production, here in Europe and worldwide. The symbiosis of engineering expertise and artificial intelligence opens up entirely new possibilities in production.” There is also a practical reason for the humanoid design. Factories are already built for human workers. Because of that, a robot that can use the same spaces and tools is much easier to integrate than one that requires a complete redesign.

HUMANOID ROBOTS HIT MASS PRODUCTION IN CHINA

After a successful U.S. pilot, BMW is deploying humanoid robots in Leipzig to improve efficiency and adaptability in electric vehicle manufacturing. (Christof Rührmair/picture alliance via Getty Images)

Advertisement

How humanoid robots could transform factory work

For years, humanoid robots felt more like something you saw in those social media demo videos than something you would trust on a real factory floor. Yes, they looked impressive, but they struggled in real environments. That is starting to change. Factories are still unpredictable. Parts do not always arrive in the exact same position. Workers move around constantly, and tools and materials shift throughout the day. Because of this, traditional robots often struggle since they rely on tightly controlled conditions. AI-powered humanoid robots can handle that kind of variability. They move around people and equipment without stopping. They adjust when parts are slightly off, and they work in spaces built for human workers.  That level of flexibility is what sets this new wave of AI-powered robotics apart from earlier forms of automation.

What this means to you

Even if you never step inside a factory, this shift still matters. For one, it could change how cars are built, whether they are electric or gas. When production speeds up, costs can come down over time, which could affect what you pay for your next vehicle. At the same time, factory jobs are likely to change. Some repetitive or physically demanding work may move to robots. In many cases, that means people shift into roles focused on oversight, maintenance or more skilled tasks. Step back for a second, and you can see this is a sign of where AI is headed next. It is no longer limited to apps on your phone or software on your computer. Now, it is starting to show up in the physical world in ways you can actually see and interact with.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com   

HOME ROBOT COOKS, CLEANS AND ORGANIZES YOUR LIFE

Advertisement

BMW is expanding its humanoid robot program into a German EV factory, testing AI-powered machines designed to work alongside humans in real production environments. (Christof Rührmair/picture alliance via Getty Images)

Kurt’s key takeaways

BMW is not the only company testing humanoid robots, but it is one of the first to bring them into real production environments. That is a big shift from the testing phase most of us are used to seeing. The fact that these robots are already helping build tens of thousands of vehicles shows that this is moving beyond early trials. It is starting to become part of how factories actually run. Where this goes next is still an open question. If the technology keeps improving, you could see more of these robots show up in factories and warehouses over time.

So here is the bigger question. How do you feel about humanoid robots working alongside people in factories? Would you trust them to help build the car you drive? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report

Advertisement
  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join. 

Copyright 2026 CyberGuy.com.  All rights reserved.

Continue Reading
Advertisement

Trending