Technology
Waymo readies autonomous cars for first international tests in Japan
Next week, Waymo’s driverless vehicles will begin testing on public roads in Japan for the Alphabet company’s first international trip. Waymo has yet to confirm whether it will eventually launch a commercial robotaxi service in the country, but the company is still celebrating the excursion as a “significant milestone.”
Waymo describes it as a simple “road trip” for collecting data about the nuances of Japanese driving, including left-hand traffic and navigating a dense urban environment. The vehicles will be driven manually for the purposes of gathering mapping data and will be managed by a local taxi fleet operator, Nihon Kotsu. About 25 vehicles are being sent, with the first already having been spotted in a parking lot in Tokyo.
As noted by the LinkedIn user who posted the pictures, Waymo’s engineers will have their work cut out for them. Tokyo has its share of idiosyncratic environments, including “tight, winding roads” and thousands of pedestrians and cyclists seamlessly merging with vehicle traffic.
The vehicles will be driven manually for the purposes of gathering mapping data
Waymo says trained drivers employed by Nihon Kotsu will manually navigate the vehicles across seven central Tokyo wards, including Minato, Shinjuku, Shibuya, Chiyoda, Chūō, Shinagawa, and Kōtō. Waymo operates manually when first arriving in a new city so its engineers can collect data on local traffic patterns and road features.
Even though the company’s vehicles have only just arrived, Waymo says it’s already been laying the groundwork, training drivers and fleet managers from GO, a popular taxi app in Japan. The company has also been coordinating with local officials, government agencies, and first responders for the test.
“In Tokyo, we are abiding by the same steadfast principles that guide us in the U.S. — commitment to safety, dedication to earning trust in communities where we operate, and collaboration with local officials and community groups here in Tokyo,” said Nicole Gavel, head of business development and strategic partnerships at Waymo, in a statement.
As Waymo tests its vehicles in Japan, the country directly to the west of the island nation is ramping up its own driverless operations. China’s Apollo Go robotaxi service says it completed 1.1 million paid driverless rides in the fourth quarter of 2024 and is expanding to Hong Kong soon. Like Waymo, Apollo Go says it is performing an average of 200,000 paid trips each week.
Technology
What really happens on the dark web and how to stay safe
NEWYou can now listen to Fox News articles!
The dark web often feels like a mystery, hidden beneath the surface of the internet that most people use every day. But to understand how scams and cybercrimes actually work, you need to know what happens in those hidden corners where criminals trade data, services and stolen access.
Cybercriminals rely on a structured underground economy, complete with marketplaces, rules and even dispute systems to operate safely away from law enforcement. By learning how these systems function, you can better understand the threats that could reach you and avoid becoming the next target.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE
Learn how to protect your personal information from dark web threats with simple cybersecurity habits and tools. (Phil Barker/Future Publishing via Getty Images)
Inside the hidden layers of the internet
The internet is often divided into three layers: the clear web, the deep web and the dark web. The clear web is the open part of the internet that search engines like Google or Bing can index, including news sites, blogs, stores and public pages. Beneath it lies the deep web, which includes pages not meant for public indexing, such as corporate intranets, private databases and webmail portals. Most of the content in the deep web is legal but simply restricted to specific users.
The dark web, however, is where anonymity and illegality intersect. It requires special software such as Tor to access, and much of its activity happens behind encryption and invitation-only walls. Tor, short for The Onion Router, was originally developed by the U.S. Navy for secure communication but has since become a haven for both privacy advocates and criminals.
It anonymizes users by routing traffic through multiple encrypted layers, making it almost impossible to trace where a request truly came from. This anonymity allows criminals to communicate, sell data and conduct illegal trade with reduced risk of exposure.
Over time, the dark web has become a hub for criminal commerce. Marketplaces once operated like eBay for illegal goods, offering everything from drugs and stolen credit card data to hacking tools and fake identities. Many of these platforms have been shut down, but the trade continues on smaller, more private channels, including encrypted messaging apps such as Telegram. Vendors use aliases, ratings and escrow systems to build credibility.
Ironically, even among criminals, trust is a critical part of business. Forums often have administrators, verified sellers and mediators to settle disputes. Members who cheat others or fail to deliver are quickly blacklisted, and reputation becomes the main currency that determines who can be trusted.
The criminal economy and how scams are born
Every major cyberattack or data leak often traces back to the dark web’s underground economy. A single attack typically involves several layers of specialists. It begins with information stealers, malware designed to capture credentials, cookies and device fingerprints from infected machines. The stolen data is then bundled and sold in dark web markets by data suppliers. Each bundle, known as a log, might contain login credentials, browser sessions and even authentication tokens, often selling for less than $20.
Another group of criminals, known as initial access brokers, purchases these logs to gain entry into corporate systems. With that access, they can impersonate legitimate users and bypass security measures such as multi-factor authentication by mimicking the victim’s usual device or browser. Once inside, these brokers sometimes auction their access to larger criminal gangs or ransomware operators who are capable of exploiting it further.
Some of these auctions are run as competitions, while others are flash sales where well-funded groups can buy access immediately without bidding. Eventually, this chain of transactions ends with a ransomware attack or an extortion demand, as attackers encrypt sensitive data or threaten to leak it publicly.
Interestingly, even within these illegal spaces, scams are common. New vendors often post fake listings for stolen data or hacking tools, collect payments and disappear. Others impersonate trusted members or set up counterfeit escrow services to lure buyers.
Despite all the encryption and reputation systems, no one is truly safe from fraud, not even the criminals themselves. This constant cycle of deception forces dark web communities to build internal rules, verification processes and penalties to keep their operations somewhat functional.
What you can do to stay ahead of dark web-driven threats
For ordinary people and businesses, understanding how these networks operate is key to preventing their effects. Many scams that appear in your inbox or on social media originate from credentials or data first stolen and sold on the dark web. That is why basic digital hygiene goes a long way. Below are some steps you can take to stay protected.
MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH

From password managers to antivirus software, experts share practical ways to keep hackers out of your data. (Annette Riedl/picture alliance via Getty Images)
1) Invest in personal data removal services
A growing number of companies specialize in removing your personal data from online databases and people search sites. These platforms often collect and publish names, addresses, phone numbers and even family details without consent, creating easy targets for scammers and identity thieves.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
2) Use unique passwords and a password manager
One of the easiest ways to stay safe online is to use unique, complex passwords for every account you own. Many breaches happen because people reuse the same password across multiple services. When one site is hacked, cybercriminals take those leaked credentials and try them elsewhere, a technique known as credential stuffing. A password manager eliminates this problem by generating strong, random passwords and securely storing them for you.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.
3) Install strong antivirus protection
Antivirus software remains one of the most effective ways to detect and block malicious programs before they can steal your information. Modern antivirus solutions do far more than just scan for viruses. They monitor system behavior, detect phishing attempts and prevent infostealer malware from sending your credentials or personal data to attackers.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
4) Keep your software updated
Outdated software is one of the biggest entry points for attackers. Cybercriminals often exploit known vulnerabilities in operating systems, browsers and plugins to deliver malware or gain access to systems. Installing updates as soon as they are available is one of the simplest yet most effective forms of defense. Enable automatic updates for your operating system, browsers and critical applications.
5) Enable two-factor authentication
Even if your password gets leaked or stolen, two-factor authentication (2FA) adds an additional barrier for attackers. With 2FA, logging in requires both your password and a secondary verification method. This includes code from an authentication app or a hardware security key.
6) Consider identity theft protection services
Identity theft protection can provide early warnings if your personal information appears in data breaches or on dark web marketplaces. These services monitor your sensitive data, such as Social Security numbers, bank details or email addresses. If anything suspicious is detected, they alert you. Many providers also offer recovery assistance, helping you restore stolen identities or close fraudulent accounts. While no service can prevent identity theft entirely, these tools can shorten your response time and limit potential damage if your data is compromised.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.
SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

Protecting your identity starts with strong passwords, two-factor authentication and regular software updates. (Jens Kalaene/picture alliance via Getty Images)
Kurt’s key takeaway
The dark web thrives on the idea that anonymity equals safety. But while criminals may feel protected, law enforcement and security researchers continue to monitor and infiltrate these spaces. Over the years, many large marketplaces have been dismantled, and hundreds of operators have been caught despite their layers of encryption. The takeaway for everyone else is that the more you understand how these underground systems function, the better prepared you are to recognize warning signs and protect yourself.
Do you think law enforcement can ever truly catch up with dark web criminals? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Woot is offering solid discounts on some of the best Nintendo Switch 2 games
There haven’t been a lot of opportunities to catch Switch 2 games on sale since the console launched in early June, but that’s changing thanks to Woot. The store is having a sale on new video games and game accessories that’s live now, and runs through November 8th at 11:59PM CT. Dozens of games for all three current-generation systems are on sale, but the Switch 2 titles caught our eye because of how new they are. Woot’s deals are especially enticing because first-party Nintendo games don’t go on sale very often.
Woot’s sale also includes discounts on Switch 2 exclusives, including Donkey Kong Banaza and Mario Kart World, and Switch 2 Edition versions of The Legend of Zelda: Breath of the Wild and Kirby and the Forgotten Land Plus Star-Crossed World. The latter are enhanced versions of games released for the original Switch that have new exclusive content, a boost in performance, or both. If you already own the original versions of these games, Nintendo allows you to download a paid upgrade pack to get the enhancements instead of paying full price for the entire game.
There are also some respectable discounts on games released for the original Nintendo Switch, which can be played on the Switch 2, so we’ve included them here. In some cases games are listed as being an “international version” of the title, which is fine because the Nintendo Switch 2 is a region free console that’s able to play them.
Technology
Nike partners with robotics company to create world’s first motor-powered footwear system
NEWYou can now listen to Fox News articles!
Nike has taken a bold step into the future with Project Amplify, the world’s first motor-powered footwear system made for people who love to move. Created with robotics partner Dephy, the design combines a carbon-plated running shoe with a motorized cuff and drive belt that add a gentle push to every stride.
Unlike performance tech built for pros, Project Amplify is designed for everyday movers such as runners, walkers and commuters. It helps anyone who wants to go a little faster and a little farther with less effort. Think of it like the running world’s version of an e-bike. It makes movement simpler, smoother and more fun for everyone.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
SKECHERS’ AIRTAG SHOES LET YOU TRACK YOUR KIDS’ STEPS
How Project Amplify works
At the center of Project Amplify is a small but powerful motor. It connects to a rechargeable cuff that wraps comfortably around your calf. The cuff links to a carbon plate inside the shoe. Together, they provide natural assistance with each step.
Nike’s Project Amplify pairs sleek design with advanced robotics to help every step feel lighter and smoother. (Nike)
Testing in the Nike Sport Research Lab has been extensive. More than 400 athletes have taken over 2.4 million steps during trials. According to testers, the system makes uphill running feel like flat ground. Some even said it helped them go from a 12-minute mile to a 10-minute mile with less effort.
NIKE IS NOW ON AMAZON: SHOP WALKING SHOES, JOGGERS, SOCKS AND SHORTS TODAY
Because of this, Nike says Project Amplify isn’t about competition. The company’s focus is on making movement easier and more approachable for a wider range of people. Whether someone is new to running or wants to fit more walking into daily life, the technology is designed to offer gentle support without taking over the effort.
Innovation made accessible
Nike’s VP of Emerging Sport and Innovation Michael Donaghu described the idea behind Project Amplify as this, “What if we could help athletes move faster and farther with less energy and a lot more fun?”
HUMANOID ROBOT TURNS HEADS AT NYC SNEAKER STORE
That question inspired years of research and collaboration between Nike and Dephy. Together, they combined robotics, biomechanics and motion algorithms to create a powered shoe that feels natural to wear.
Like e-bikes transformed cycling, Project Amplify could do the same for running and walking. It aims to help people stay active more often and enjoy movement in new ways. Through this approach, Nike is showing how innovation can make fitness more accessible to everyone.

Early testing shows the powered cuff and drive system give runners steady support on every stride. (Nike)
What this means for you
AFFORDABLE 3D-PRINTED BIONIC ARM USES MUSCLE SIGNALS TO MOVE
Imagine finishing a run with energy to spare. Picture walking an extra mile without feeling tired. Project Amplify makes that possible. Its gentle mechanical assist feels like an extra set of calf muscles that supports your natural stride.
For casual runners, this means more miles with less strain. For commuters, it could make daily travel faster and more efficient. Overall, it gives you the power to enjoy movement again. The goal is not to do less. The goal is to get more from every step.
Take my quiz: How safe is your online security?
NEW EXOSKELETON BUILT TO BOOST ENDURANCE AND CUT FATIGUE
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com
Kurt’s key takeaways
With Project Amplify, Nike is blending art, science and sport to change how movement feels. This new technology aims to enhance natural motion rather than replace it. As testing moves forward, one thing is clear: Project Amplify could completely change how we think about running, walking and human performance.

As Nike refines Project Amplify, the focus remains on making movement easier, more natural, and more enjoyable for everyone. (iStock)
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
If powered shoes could make running and walking easier, would you try them or stick with pure muscle power? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
-
New York1 week agoVideo: How Mamdani Has Evolved in the Mayoral Race
-
News1 week agoVideo: Inside Our Reporter’s Collection of Guantánamo Portraits
-
Milwaukee, WI4 days agoLongtime anchor Shannon Sims is leaving Milwaukee’s WTMJ-TV (Channel 4)
-
News5 days agoWith food stamps set to dry up Nov. 1, SNAP recipients say they fear what’s next
-
Politics1 week agoAOC, Sanders rake in millions as far-left cements grip on Democrat Party
-
Alabama6 days agoHow did former Alabama basketball star Mark Sears do in NBA debut with Milwaukee Bucks?
-
Politics1 week agoGrassley releases memo showing DOJ ‘unleashed unchecked government power’ on Trump associates
-
News1 week agoMap: Minor Earthquake Strikes Southern California