Technology
Vision Pro demos will include scanning your glasses to identify your prescription
For anyone who wants to try the Apple Vision Pro when it’s officially released on February 2nd, there’s going to be a whole procedure. We knew that, but now a report in Mark Gurman’s latest Power On newsletter for Bloomberg sheds light on how the in-store demos for the Vision Pro will work.
According to Gurman, the process will start with an Apple Store employee scanning users’ faces to pick out the light seal for Apple’s headset — a process he likens to configuring Face ID. For those who need vision correction, Apple will reportedly also scan their lenses with a special device to suss out the prescription. Then an employee fits a Vision Pro with one of “hundreds” of on-hand lenses and a seal and tells you how to use the device (including, apparently, how to hold it).
The demo that follows, Gurman says, will last for up to 25 minutes. It will reportedly involve viewing photos and videos (including the 3D “spatial” kind that you can take with the iPhone 15 Pro), using the Vision Pro as a computer or iPad replacement, and checking out third-party apps.
The process is a lot, though it won’t be necessary for purchase. Apple will apparently also sell the headset online. Users will still need to scan their faces with an iPhone or an iPad to get the right head strap, and they’ll need their vision prescription at the ready for the $149 optical inserts.
Gurman writes that Apple has also made a second, more comfortable strap for the headset after complaints that it’s uncomfortable after just 30 minutes of use, although he says this strap won’t be present at the demos. In addition, Belkin will have an accessory clip for the battery pack that lives outside Apple’s headset, according to the article.
Apple reportedly doesn’t expect demand to hold for the Vision Pro, and has told its stores that they’ll need “about twice as much inventory space” during the first weekend than the following ones. A recent supply chain rumor said that Apple only has up to 80,000 of them coming at launch, plus just half a million for all of 2024.
Such low numbers might not do demand for the Vision Pro any more favors than the basic problem of getting people to want an AR / VR headset in the first place. People are already less likely to use one out in a coffee shop. But even if you did see someone doing so, asking a stranger if you can check out their $3,500 head computer is very different from asking if you can toy with their iPhone — they don’t want to let you, and you probably don’t want to anyway. And most people aren’t going to buy one of these without trying it first.
But Apple has plans for its Vision headset line. Rumors have said it means to release a second, cheaper version of the headset. And eventually, the company is expected to make a set of AR glasses that look like normal glasses, at least eventually, when it gets over technical humps. Meanwhile, Meta has aggressively pursued AR glasses with its Ray-Bans partnership, and Xreal just unveiled its $699 Air 2 Ultra AR glasses that are mainly aimed at developers but show that Apple’s potential competition in the space isn’t exactly resting on its laurels.
Technology
Are robots coming to a McDonald’s near you?
NEWYou can now listen to Fox News articles!
Walk into a McDonald’s, and you expect a familiar routine. You order, wait and grab your food. At one location in Shanghai, that routine briefly looked very different.
McDonald’s deployed robots from Chinese robotics firm Keenon Robotics in one of its fast-food restaurants as part of a short-term test tied to a store opening. The robots greeted customers, added a bit of entertainment and helped with simple service tasks.
Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
DRONE FOOD DELIVERY LAUNCHES IN NEW JERSEY
Humanoid and service robots from Keenon Robotics line up outside a McDonald’s in Shanghai, highlighting the mix of experimental machines used in the short-term test. (Keenon Robotics)
What actually happened at this McDonald’s in Shanghai
This test happened at just one location. It was not a rollout. It was a short pilot tied to a store opening. Inside the restaurant, humanoid robots greeted customers and added a fun, interactive element. You can see them wearing McDonald’s uniforms and making simple gestures for diners. At the same time, other robots handled basic tasks like delivering food and clearing trays. It was a mix of different machines working together, not a fully integrated system.
Human workers still did the real work behind the counter. They handled cooking, orders and anything that required judgment.
In the end, this looked more like a live demo than a real shift in operations. The robots were there to attract attention, not replace staff.
Why McDonald’s is experimenting with robots
Even though this was a small test, it reflects a much bigger trend. Restaurants in many regions are dealing with hiring challenges. At the same time, fewer workers are interested in repetitive, lower-paid roles. That creates an opportunity for automation. Robots can handle simple, repetitive tasks with consistency. They do not get tired, and they can operate for long hours. For fast-food chains, that level of reliability is appealing. At this stage, the technology is not advanced enough to replace human workers. But it can support them in limited ways.
Are robot workers the future of fast food?
Not yet. This test was more about exploring possibilities than changing operations. The robots acted more like a demonstration of what could come next rather than a working solution ready for scale. Right now, the most realistic future is a hybrid model. Humans continue to handle cooking, customer issues and complex tasks. Robots assist with basic service and customer-facing roles. That balance could evolve over time as the technology improves.
Why robot tests matter for the future of fast food
Even short-term experiments can signal where things are headed. Robots can speed up service, reduce long-term labor costs and create a unique experience that attracts customers. For families and younger diners, interacting with a robot can turn a routine visit into something memorable. That novelty factor alone makes these tests valuable for companies looking to stand out.
ROBOT FIREFIGHTERS ENTER BURNING BUILDINGS FIRST
A humanoid robot greets a customer at the counter, showing how the machines were used to create an interactive, front-of-house experience. (Keenon Robotics)
Why fast food automation is still in the early stages
Today’s robots are limited. They struggle with complex tasks and unpredictable situations that require human judgment. Cooking, handling special requests and managing busy environments still depend on people. That is why this test remained small and temporary. It shows potential, but it also highlights how far the technology still has to go.
What this means to you
You are not about to walk into a fully automated McDonald’s. But you may start seeing more technology in everyday places. That could mean faster service and fewer delays. It could also mean less direct interaction with human staff. Jobs in fast food are unlikely to disappear overnight. Instead, they may shift toward roles that focus on customer support, problem-solving and managing technology. At the same time, these early tests raise questions about how far automation will go and how quickly it could change the workforce.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com
A humanoid robot dressed as a chef stands on display, underscoring how the test leaned more toward demonstration and entertainment than real kitchen operations. (Keenon Robotics)
Kurt’s key takeaways
This was not a rollout. It was a glimpse. McDonald’s used humanoid robots in one location for a short period to test reactions and explore possibilities. The machines added novelty, but they did not replace workers. Still, the direction is clear. Automation is moving into everyday spaces, one small test at a time.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
If robots can already greet you and deliver your food, how long before they take on the rest of the job? Let us know by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Red Rooms makes online poker as thrilling as its serial killer
It’s rare for a movie to get technology right. And it’s even rarer for that movie to be a thriller or horror, where realism takes a backseat to scares and tension. But Red Rooms mostly gets it. Nothing takes me out of a film quicker than a tech MacGuffin that might as well be literal magic. Yes, the phrase “dark web” will always sound a bit silly, but at no point during its 118 minutes does the tech become a distraction.
It’s not the tech that makes Red Rooms great, though. It’s just something that could have easily tanked an otherwise excellent movie. What carries the film is the expert tension building by director Pascal Plante. The perfect slow-burn pacing. And the incredible performances by Juliette Gariépy as Kelly-Anne and Laurie Babin as Clementine.
The film centers mostly on Kelly-Anne, a model / hacker / professional gambler who attends the trial of serial killer Ludovic Chevalier. She befriends Clementine, a fan of Chevalier who insists that he is being framed.
Clementine neurotically and loudly defends Chevalier, calling into TV shows and shouting at reporters outside the courtroom. She makes a spectacle of herself. But Kelly-Anne remains more mysterious, her motives unclear. Even at the end of the film, there is ambiguity about what she was trying to accomplish and why.
The ambiguity is part of what makes Red Rooms so enthralling. The movie feels unpredictable. None of the characters seem trustworthy or relatable. The world they inhabit is familiar, yet uncanny.
The movie lingers in that discomfort for long periods of time, making you squirm. Giving you the opportunity to play through all the possible scenarios that could play out in your head. Is Chevalier really the killer? Is Kelly-Anne the killer? Was one of the victim’s mothers an accomplice? Is the prosecutor keeping a secret?
The movie inches along, drawing out a tale of kidnapping, live-streamed torture, and snuff films before erupting into a climax that unexpectedly mines online poker and Bitcoin for legitimate drama. It’s ultimately less about the murders themselves than it is about obsession, internet bubbles, and the media. It almost feels like a grimier companion piece to David Fincher’s Gone Girl.
Technology
FBI email hack shows why you must lock down your tech
NEWYou can now listen to Fox News articles!
Here’s the uncomfortable truth. If someone can break into the personal email of the head of the Federal Bureau of Investigation, your inbox is not off limits.
Malicious actors targeted the personal email account of FBI Director Kash Patel, according to the FBI, and a group known as the Handala Hack Team in Iran has claimed responsibility for posting photos and documents online.
No classified systems were breached. But that is not the point. The real story is this: the front lines of cyber warfare now run straight through personal accounts like yours.
FBI SAYS ‘MALICIOUS ACTORS’ TARGETED PATEL’S PERSONAL EMAIL, IRAN-BASED HACKING GROUP CLAIMS RESPONSIBILITY
Hackers didn’t breach FBI systems; they accessed a personal email account, showing how everyday accounts can become targets. (Donato Fasano/Getty Images)
Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
What happened in the FBI director’s email hack
Hackers gained access to Patel’s personal email account, not any official FBI systems. The stolen material included photos, travel details and older messages that spanned more than a decade, with emails dating from around 2011 through 2022.
The FBI said “malicious actors” targeted Patel’s personal email account but did not attribute the attack to a specific country. A group known as the Handala Hack Team, which operates out of Iran, has claimed responsibility for the breach.
The Federal Bureau of Investigation says no government or classified data was compromised. The U.S. State Department is offering up to a $10 million reward for information leading to the identification of members of the Handala Hack Team. CyberGuy reached out to the FBI for comment, but did not receive a response before our deadline.
A cybersecurity expert described the exposed material as a “personal junk drawer.” That detail is what makes this incident hit close to home. Most people have one too.
The threat is real and it is getting more sophisticated
This does not appear to be random. U.S. officials have warned for years that foreign government-linked hackers, including groups associated with Iran, have targeted Americans, especially those connected to government or politics. These campaigns often ramp up during periods of geopolitical tension. Similar actors have previously targeted individuals tied to the Trump administration, including:
- Donald Trump Jr.
- Todd Blanche
- Lindsey Halligan
These groups also hit private companies. In one recent case, hackers claimed responsibility for disrupting operations at a U.S. medical device company and spreading propaganda tied to geopolitical events. This is coordinated. It is persistent. And it is not slowing down.
Why your everyday tech is now part of the battlefield
Cyber warfare used to target government systems. Now it targets you. Why? Because personal accounts are easier to break into. They are often protected by reused passwords, old emails and weak security habits.
Once hackers get in, they can:
- Map out your life through old messages
- Steal personal photos or financial details
- Impersonate you in scams
- Use your contacts to spread attacks
FBI Director Kash Patel speaks during a press briefing at the White House in Washington, D.C., on Nov. 12, 2025. (AP Photo/Evan Vucci)
In simple terms, your digital life can be used against you or someone you know.
IF SOMEONE GETS INTO YOUR EMAIL, THEY OWN EVERY ACCOUNT YOU HAVE. THESE 3 MOVES LOCK THEM OUT FOR GOOD
What you need to do right now to lock down your tech
I know it can sound intimidating, but it really comes down to this. You don’t need special skills, just a few smarter habits starting today.
1) Turn on two-factor authentication everywhere
Two-factor authentication (2FA) is one of the strongest defenses you have. Even if someone steals your password, they cannot get in without the second code. Focus on your email first. That is the master key to everything else.
2) Stop reusing passwords
If you reuse one password across accounts, one breach can unlock your entire digital life. Use a password manager and create unique passwords for each account. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com
3) Clean out your “digital junk drawer”
Remember that phrase from the FBI case? Old emails, documents and attachments can expose years of your life. Go back and delete anything you no longer need, especially files that contain personal, financial or travel details. For anything important, move it to a secure location instead of leaving it sitting in your inbox. You can also check out CyberGuy’s 5 digital clean-up tips you didn’t know you needed to reduce long-term clutter and limit what attackers could access if your account is ever compromised.
4) Watch for highly targeted phishing
These attacks are getting more convincing. Hackers can use stolen data to craft emails that look personal and real. Always double-check links and sender addresses before clicking. Use strong antivirus software that can detect suspicious links, block malicious downloads and warn you before you interact with a dangerous site. Think of it as an extra layer of defense you do not have to think about. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
5) Consider using a data removal service
Even if you clean up your inbox, your personal information may already be circulating online through data broker sites. These companies collect and sell details like your address, phone number and even past activity. A data removal service can help automatically request the removal of your information from hundreds of these sites, reducing what hackers can find and use against you.
6) Keep your devices updated Updates fix known security flaws. Delaying them gives attackers a window to exploit your device.
7) Separate your digital life
Use different email accounts for banking, shopping and personal communication. This limits the damage if one account is compromised. Consider using email aliases, which are alternate addresses that forward to your main inbox. For example, you can use one alias for online shopping and another for signups. If one alias gets exposed or starts receiving spam, you can disable it without affecting your primary email account. For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com
Cyberattacks today often focus on personal data like emails and photos, which can be used to expose or manipulate victims. (Philip Dulian/picture alliance via Getty Images)
8) Use passkeys where available
Passkeys replace passwords with a secure login tied to your device or biometrics. They cannot be reused or phished, which makes them one of the safest ways to protect your accounts today.
Kurt’s key takeaways
The U.S. is facing capable cyber adversaries. Hacker groups have shown they can keep pushing, adapt quickly and target both institutions and individuals. At the same time, the most common entry point is still simple. A weak password. An old email account. A moment of inattention. That means the first line of defense is not just government agencies. It is you.
What’s one thing you’ve done or haven’t done to protect your accounts that still worries you? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
Copyright 2026 CyberGuy.com. All rights reserved.
-
Sports1 week agoIOC addresses execution of 19-year-old Iranian wrestler Saleh Mohammadi
-
New Mexico1 week agoClovis shooting leaves one dead, four injured
-
Miami, FL4 days agoJannik Sinner’s Girlfriend Laila Hasanovic Stuns in Ab-Revealing Post Amid Miami Open
-
Tennessee6 days agoTennessee Police Investigating Alleged Assault Involving ‘Reacher’ Star Alan Ritchson
-
Minneapolis, MN4 days agoBoy who shielded classmate during school shooting receives Medal of Honor
-
Politics1 week agoSchumer gambit fails as DHS shutdown hits 36 days and airport lines grow
-
Science1 week agoRecord Heat Meets a Major Snow Drought Across the West
-
Technology1 week agoYouTube job scam text: How to spot it fast