Connect with us

Technology

Windows PCs at risk as new tool disarms built-in security

Published

on

Windows PCs at risk as new tool disarms built-in security

All modern Windows PCs come with Microsoft Defender built in. For the unaware, this tool is Windows’ native antivirus. 

Over time, it has matured into a reliable security tool capable of blocking a wide range of threats. However, a tool called Defendnot can shut down Microsoft Defender completely, without exploiting a bug or using malware. It simply convinces Windows that another antivirus is already running.

The implications are serious. This tool does not break into the system or use advanced code injection. It uses Windows features the way they were designed to be used. And that makes the problem harder to detect and harder to fix.

Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!

Windows software on a PC (Kurt “CyberGuy” Knutsson)

Advertisement

The tool works by pretending to be an antivirus

Windows is built to avoid running multiple antivirus products at once. When a third-party antivirus registers itself, Windows disables Microsoft Defender to prevent conflicts. Defendnot exploits this system using an undocumented API that security software uses to communicate with the Windows Security Center.

The tool registers a fake antivirus that appears legitimate to the system. It uses a dummy DLL and injects it into Task Manager, a trusted Windows process. By operating inside this signed process, Defendnot avoids signature checks and permission blocks. Once the fake antivirus is registered, Windows disables Microsoft Defender without warning or confirmation.

WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLE

No security alert is shown to the user. No visible changes are made to indicate that the system is unprotected. Unless someone checks manually, the machine remains open to attacks with no real-time protection running.

The tool also includes options to set a custom antivirus name, enable logging and configure automatic startup. It achieves persistence by creating a scheduled task that runs whenever the user logs in.

Advertisement
person typing on laptop

Windows software on a laptop (Kurt “CyberGuy” Knutsson)

WINDOWS DEFENDER VS ANTIVIRUS SOFTWARE: FREE PROTECTION FALLS SHORT

From GitHub takedown to a fresh build

Defendnot is based on an earlier project called No-Defender. That project used code from an actual antivirus product to fake registration. It gained attention quickly and was removed after a copyright complaint from the vendor whose code had been reused. The developer took the project down and walked away from it.

With Defendnot, the creator rebuilt the core features using original code. This version avoids copyright issues and uses a new method to achieve the same effect. It does not rely on another antivirus or third-party binaries. It was written from scratch to demonstrate how simple it is to manipulate Windows security from inside the system.

Microsoft Defender currently flags the tool as a threat. It detects and quarantines it under the name Win32/Sabsik.FL.!ml. However, the fact that it works at all points to a weakness in how Windows handles antivirus registration and trust.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Advertisement
laptop on a desk

Windows laptop showing the home screen (Kurt “CyberGuy” Knutsson)

DOUBLECLICKJACKING HACK TURNS DOUBLE-CLICKS INTO ACCOUNT TAKEOVERS

6 ways to protect yourself from malicious programs

While Defendnot is a research project, there’s a chance that similar tools are already out there and could be used to compromise your PC. Here are a few tips to help you stay safe:

1. Use strong antivirus software: Even with regular updates, Windows systems can be left exposed by tools like Defendnot that silently disable built-in defenses. A strong third-party antivirus with real-time protection and frequent updates provides essential backup security. Look for solutions with real-time protection and frequent updates to tackle emerging threats. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Limit exposure: Many exploits rely on user interaction, such as clicking a shady link, downloading a compromised file or mounting an untrusted virtual disk. Stick to reputable websites, avoid opening unsolicited email attachments and use a browser with built-in security features (like Microsoft Edge or Chrome with Safe Browsing enabled).

3. Avoid running unexpected commands: Never paste or run commands (like PowerShell scripts) you don’t understand or that were copied from random websites. Attackers often trick users into unknowingly running malware this way.

Advertisement

4. Keep your software updated: Regularly update your operating system, browsers and all software applications. Updates often include patches for security vulnerabilities that malware can exploit.

5. Use two-factor authentication (2FA): Enable 2FA on all your accounts. This adds an extra layer of security by requiring a second form of verification, making it harder for attackers to gain access even if they have your password.

6. Invest in personal data removal services: Even with strong device security, your personal information may still be exposed online through data brokers and people-finder sites. These services collect and publish details like your name, address and phone number, making you an easier target for identity theft or phishing. Automated data removal services track down these sites and submit removal requests on your behalf, helping to reduce your digital footprint and increase your online anonymity. While they can’t erase every trace of your information, they make it significantly harder for attackers to find and exploit your personal data, which saves you time and reduces unwanted spam in the process.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

Get a free scan to find out if your personal information is already out on the web.

Advertisement

RELENTLESS HACKERS ABANDON WINDOWS TO TARGET YOUR APPLE ID

Kurt’s key takeaway

Defendnot points to a bigger issue with how Windows handles security. It takes a feature meant to prevent software conflicts and turns it into a way to completely disable protection. The system assumes any registered antivirus is legitimate, so if attackers can fake that, they get in without much resistance.

We often think of security as blocking the bad and trusting the good. But this case shows what happens when that trust is misplaced. Defendnot doesn’t sneak past Windows defenses. It walks right in using valid credentials. The solution isn’t just more patches or stronger malware signatures. What we need is a smarter way for systems to tell what is actually safe.

Do you think companies like Microsoft need to rethink how Windows handles antivirus registration and trust, given that tools like Defendnot can so easily disable built-in protections without using malware or exploiting a bug? Let us know by writing us at Cyberguy.com/Contact.

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Advertisement

Copyright 2025 CyberGuy.com. All rights reserved.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

How addresses are collected and put on people finder sites

Published

on

How addresses are collected and put on people finder sites

NEWYou can now listen to Fox News articles!

Your home address might be easier to find online than you think. 

A quick search of your name could turn up past and current locations, all thanks to people finder sites. 

These data broker sites quietly collect and publish personal details without your consent, making your privacy vulnerable with just a few clicks.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join.

Advertisement

A woman searching for herself online. (Kurt “CyberGuy” Knutsson)

How your address gets exposed online and who’s using it

If you’ve ever searched for your name and found personal details, like your address, on unfamiliar websites, you’re not alone. People finder platforms collect this information from public records and third-party data brokers, then publish and share it widely. They often link your address to other details such as phone numbers, email addresses and even relatives.

11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025

While this data may already be public in various places, these sites make it far easier to access and monetize it at scale. In one recent breach, more than 183 million login credentials were exposed through an unsecured database. Many of these records were linked to physical addresses, raising concerns about how multiple sources of personal data can be combined and exploited.

Although people finder sites claim to help reconnect friends or locate lost contacts, they also make sensitive personal information available to anyone willing to pay. This includes scammers, spammers and identity thieves who use it for fraud, harassment, and targeted scams.

Advertisement
woman at keyboard

A woman searching for herself online. (Kurt “CyberGuy” Knutsson)

How do people search sites get your home address?

First, let’s define two sources of information; public and private databases that people search sites use to get your detailed profile, including your home address. They run an automated search on these databases with key information about you and add your home address from the search results. 

1. Public sources

Your home address can appear in:

  • Property deeds: When you buy or sell a home, your name and address become part of the public record.
  • Voter registration: You need to list your address when voting.
  • Court documents: Addresses appear in legal filings or lawsuits.
  • Marriage and divorce records: These often include current or past addresses.
  • Business licenses and professional registrations: If you own a business or hold a license, your address can be listed.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

These records are legal to access, and people finder sites collect and repackage them into detailed personal profiles.

2. Private sources

Other sites buy your data from companies you’ve interacted with:

  • Online purchases: When you buy something online, your address is recorded and can be sold to marketing companies.
  • Subscriptions and memberships: Magazines, clubs and loyalty programs often share your information.
  • Social media platforms: Your location or address details can be gathered indirectly from posts, photos or shared information.
  • Mobile apps and websites: Some apps track your location.

People finder sites buy this data from other data brokers and combine it with public records to build complete profiles that include address information.

woman searching online

A woman searching for herself online. (Kurt “CyberGuy” Knutsson)

What are the risks of having your address on people finder sites?

The Federal Trade Commission (FTC) advises people to request the removal of their private data, including home addresses, from people search sites due to the associated risks of stalking, scamming and other crimes.

Advertisement

People search sites are a goldmine for cybercriminals looking to target and profile potential victims as well as plan comprehensive cyberattacks. Losses due to targeted phishing attacks increased by 33% in 2024, according to the FBI. So, having your home address publicly accessible can lead to several risks:

  • Stalking and harassment: Criminals can easily find your home address and threaten you.
  • Identity theft: Scammers can use your address and other personal information to impersonate you or fraudulently open accounts.
  • Unwanted contact: Marketers and scammers can use your address to send junk mail or phishing or brushing scams.
  • Increased financial risks: Insurance companies or lenders can use publicly available address information to unfairly decide your rates or eligibility.
  • Burglary and home invasion: Criminals can use your location to target your home when you’re away or vulnerable.

How to protect your home address

The good news is that you can take steps to reduce the risks and keep your address private. However, keep in mind that data brokers and people search sites can re-list your information after some time, so you might need to request data removal periodically.

I recommend a few ways to delete your private information, including your home address, from such websites.

1. Use personal data removal services: Data brokers can sell your home address and other personal data to multiple businesses and individuals, so the key is to act fast. If you’re looking for an easier way to protect your privacy, a data removal service can do the heavy lifting for you, automatically requesting data removal from brokers and tracking compliance.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. 

Get a free scan to find out if your personal information is already out on the web

Advertisement

2. Opt out manually : Use a free scanner provided by a data removal service to check which people search sites that list your address. Then, visit each of these websites and look for an opt-out procedure or form: keywords like “opt out,” “delete my information,” etc., point the way.

Follow each site’s opt-out process carefully, and confirm they’ve removed all your personal info, otherwise, it may get relisted.

3. Monitor your digital footprint: I recommend regularly searching online for your name to see if your location is publicly available. If only your social media profile pops up, there’s no need to worry. However, people finder sites tend to relist your private information, including your home address, after some time.

4. Limit sharing your address online: Be careful about sharing your home address on social media, online forms and apps. Review privacy settings regularly, and only provide your address when absolutely necessary. Also, adjust your phone settings so that apps don’t track your location.

Kurt’s key takeaways

Your home address is more vulnerable than you think. People finder sites aggregate data from public records and private sources to display your address online, often without your knowledge or consent. This can lead to serious privacy and safety risks. Taking proactive steps to protect your home address is essential. Do it manually or use a data removal tool for an easier process. By understanding how your location is collected and taking measures to remove your address from online sites, you can reclaim control over your personal data.

Advertisement

How do you feel about companies making your home address so easy to find? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.  

Continue Reading

Technology

Inside Mark Zuckerberg’s AI hiring spree

Published

on

Inside Mark Zuckerberg’s AI hiring spree

AI researchers have recently been asking themselves a version of the question, “Is that really Zuck?

As first reported by Bloomberg, the Meta CEO has been personally asking top AI talent to join his new “superintelligence” AI lab and reboot Llama. His recruiting process typically goes like this: a cold outreach via email or WhatsApp that cites the recruit’s work history and requests a 15-minute chat. Dozens of researchers have gotten these kinds of messages at Google alone.

For those who do agree to hear his pitch (amazingly, not all of them do), Zuckerberg highlights the latitude they’ll have to make risky bets, the scale of Meta’s products, and the money he’s prepared to invest in the infrastructure to support them. He makes clear that this new team will be empowered and sit with him at Meta’s headquarters, where I’m told the desks have already been rearranged for the incoming team.

Most of the headlines so far have focused on the eye-popping compensation packages Zuckerberg is offering, some of which are well into the eight-figure range. As I’ve covered before, hiring the best AI researcher is like hiring a star basketball player: there are very few of them, and you have to pay up. Case in point: Zuckerberg basically just paid 14 Instagrams to hire away Scale AI CEO Alexandr Wang.

It’s easily the most expensive hire of all time, dwarfing the billions that Google spent to rehire Noam Shazeer and his core team from Character.AI (a deal Zuckerberg passed on). “Opportunities of this magnitude often come at a cost,” Wang wrote in his note to employees this week. “In this instance, that cost is my departure.”

Advertisement

Zuckerberg’s recruiting spree is already starting to rattle his competitors. The day before his offer deadline for some senior OpenAI employees, Sam Altman dropped an essay proclaiming that “before anything else, we are a superintelligence research company.” And after Zuckerberg tried to hire DeepMind CTO Koray Kavukcuoglu, he was given a larger SVP title and now reports directly to Google CEO Sundar Pichai.

I expect Wang to have the title of “chief AI officer” at Meta when the new lab is announced. Jack Rae, a principal researcher from DeepMind who has signed on, will lead pre-training. Meta certainly needs a reset. According to my sources, Llama has fallen so far behind that Meta’s product teams have recently discussed using AI models from other companies (although that is highly unlikely to happen). Meta’s internal coding tool for engineers, however, is already using Claude.

While Meta’s existing AI researchers have good reason to be looking over their shoulders, Zuckerberg’s $14.3 billion investment in Scale is making many longtime employees, or Scaliens, quite wealthy. They were popping champagne in the office this morning.

Then, Wang held his last all-hands meeting to say goodbye and cried. He didn’t mention what he would be doing at Meta. I expect his new team will be unveiled within the next few weeks after Zuckerberg gets a critical number of members to officially sign on.

Tim Cook.
Getty Images / The Verge
Advertisement

Apple is accustomed to being on top of the tech industry, and for good reason: the company has enjoyed a nearly unrivaled run of dominance.

After spending time at Apple HQ this week for WWDC, I’m not sure that its leaders appreciate the meteorite that is heading their way. The hubris they display suggests they don’t understand how AI is fundamentally changing how people use and build software.

Heading into the keynote on Monday, everyone knew not to expect the revamped Siri that had been promised the previous year. Apple, to its credit, acknowledged that it dropped the ball there, and it sounds like a large language model rebuild of Siri is very much underway and coming in 2026.

The AI industry moves much faster than Apple’s release schedule, though. By the time Siri is perhaps good enough to keep pace, it will have to contend with the lock-in that OpenAI and others are building through their memory features. Apple and OpenAI are currently partners, but both companies want to ultimately control the interface for interacting with AI, which puts them on a collision course.

Apple’s decision to let developers use its own, on-device foundational models for free in their apps sounds strategically smart, but unfortunately, the models look far from leading. Apple ran its own benchmarks, which aren’t impressive, and has confirmed a measly context window of 4,096 tokens. It’s also saying that the models will be updated alongside its operating systems — a snail’s pace compared to how quickly AI companies move.

Advertisement

I’d be surprised if any serious developers use these Apple models, although I can see them being helpful to indie devs who are just getting started and don’t want to spend on the leading cloud models. I don’t think most people care about the privacy angle that Apple is claiming as a differentiator; they are already sharing their darkest secrets with ChatGPT and other assistants.

Some of the new Apple Intelligence features I demoed this week were impressive, such as live language translation for calls. Mostly, I came away with the impression that the company is heavily leaning on its ChatGPT partnership as a stopgap until Apple Intelligence and Siri are both where they need to be.

AI probably isn’t a near-term risk to Apple’s business. No one has shipped anything close to the contextually aware Siri that was demoed at last year’s WWDC. People will continue to buy Apple hardware for a long time, even after Sam Altman and Jony Ive announce their first AI device for ChatGPT next year. AR glasses aren’t going mainstream anytime soon either, although we can expect to see more eyewear from Meta, Google, and Snap over the coming year.

In aggregate, these AI-powered devices could begin to siphon away engagement from the iPhone, but I don’t see people fully replacing their smartphones for a long time. The bigger question after this week is whether Apple has what it takes to rise to the occasion and culturally reset itself for the AI era.

I would have loved to hear Tim Cook address this issue directly, but the only interview he did for WWDC was a cover story in Variety about the company’s new F1 movie.

Advertisement
  • AI agents are coming. I recently caught up with Databricks CEO Ali Ghodsi ahead of his company’s annual developer conference this week in San Francisco. Given Databricks’ position, he has a unique, bird’s-eye view of where things are headed for AI. He doesn’t envision a near-term future where AI agents completely automate real-world tasks, but he does predict a wave of startups over the next year that will come close to completing actions in areas such as travel booking. He thinks humans will need (and want) to approve what an agent does before it goes off and completes a task. “We have most of the airplanes flying automated, and we still want pilots in there.”
  • Buyouts are the new normal at Google. That much is clear after this week’s rollout of the “voluntary exit program” in core engineering, the Search organization, and some other divisions. In his internal memo, Search SVP Nick Fox was clear that management thinks buyouts have been successful in other parts of the company that have tried them. In a separate memo I saw, engineering exec Jen Fitzpatrick called the buyouts an “opportunity to create internal mobility and fresh growth opportunities.” Google appears to be attempting a cultural reset, which will be a challenging task for a company of its size. We’ll see if it can pull it off.
  • Evan Spiegel wants help with AR glasses. I doubt that his announcement that consumer glasses are coming next year was solely aimed at AR developers. Telegraphing the plan and announcing that Snap has spent $3 billion on hardware to date feels more aimed at potential partners that want to make a bigger glasses play, such as Google. A strategic investment could help insulate Snap from the pain of the stock market. A full acquisition may not be off the table, either. When he was recently asked if he’d be open to a sale, Spiegel didn’t shut it down like he always has, but instead said he’d “consider anything” that helps the company “create the next computing platform.”

If you haven’t already, don’t forget to subscribe to The Verge, which includes unlimited access to Command Line and all of our reporting.

As always, I welcome your feedback, especially if you’re an AI researcher fielding a juicy job offer. You can respond here or ping me securely on Signal.

Continue Reading

Technology

AI tennis robot coach brings professional training to players

Published

on

AI tennis robot coach brings professional training to players

NEWYou can now listen to Fox News articles!

Finding a reliable tennis partner who matches your energy and skill level can be a challenge. 

Now, with Tenniix, an artificial intelligence-powered tennis robot from T-Apex, players of all abilities have a new way to practice and improve. 

Tenniix brings smart technology and adaptability to your training sessions, making it easier to get the most out of your time on the court.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join.

Advertisement

Tenniix, the AI-powered tennis robot (T-Apex)

What is Tenniix? Meet the AI tennis robot transforming practice sessions

Tenniix is an AI-powered tennis robot that is compact and weighs only 15 pounds, which is much lighter than traditional ball machines. Despite its small size, it serves balls at speeds of up to 75 mph, with spins reaching 5,000 RPM, and holds up to 100 balls at a time. The robot’s movable base allows it to deliver shots from different angles, keeping practice sessions dynamic and engaging.

TENNIS PRO ERIN ROUTLIFFE EXPLODES OVER LACK OF ‘ROBOTS’ AT AUSTRALIAN OPEN

AI tennis robot 2

A player lifting the Tenniix, an AI-powered tennis robot, out of the vehicle. (T-Apex)

NO TENNIS PARTNER? NO WORRIES WITH THIS AI ROBOT

AI tennis coaching: How Tenniix delivers realistic, pro-level practice

One of the standout features of Tenniix is its AI-driven coaching. The robot has been trained on over 8,000 hours of professional tennis data, allowing it to adjust its shots based on your position and playing style. This gives you a realistic and challenging experience every time you step on the court. Tenniix offers a wide variety of training modes, with more than 1,000 drills and three skill levels, so you can focus on everything from timing and footwork to shot accuracy.

Advertisement
AI tennis robot 3

Tenniix, the AI-powered tennis robot being carried (T-Apex)

WILL 3D TECH CHANGE SPORTS FOREVER?

Smart and simple: How to control Tenniix with voice, gestures or your phone

Controlling Tenniix is simple and intuitive. You can use voice commands or gestures to change spin, speed or shot type without interrupting your practice. Tenniix also features convenient app controls, letting you select training modes, adjust settings and review session data right from your smartphone for a fully customized and trackable experience. The robot’s modular design means you can start with the model that fits your needs and upgrade as your skills improve. With a built-in camera and AI chip, Tenniix analyzes your shots and provides instant feedback, helping you track your progress over time.

AI tennis robot 4

Tenniix, the AI-powered tennis robot (T-Apex)

SKYROCKET TO A HEALTHIER LIFESTYLE WITH THIS GEAR IN 2025

Advanced tracking and movement: How Tenniix adapts to your game in real time

Tenniix uses a combination of visual tracking and ultra-wideband sensors to know exactly where you and the ball are on the court. Its motorized base moves smoothly to deliver a wide range of shots, from high lobs to fast groundstrokes, at different speeds and spins. The battery lasts up to four hours, which is enough for a solid training session.

AI tennis robot 5

Tenniix, the AI-powered tennis robot (T-Apex)

BEST FATHER’S DAY GIFTS FOR EVERY DAD

Advertisement

Practice like the pros: Train against Nadal-style shots with Tenniix

Another feature that sets Tenniix apart is its ability to mimic the playing styles of tennis greats like Nadal and Federer. This helps you prepare for matches by practicing against shots and spins similar to those you’ll face in real competition. Coaches and players have noted how Tenniix creates realistic rallies and adapts to different skill levels, making training both efficient and enjoyable.

AI Tennis robot 6

Tenniix, the AI-powered tennis robot (T-Apex)

Portable, smart and backed by support: Why tennis players love Tenniix

Tenniix is easy to carry and set up, making it convenient for players who want to practice anywhere. With thousands of shot combinations and drills, your workouts stay fresh and challenging. The smart technology, real-time tracking and instant feedback help make every session productive. Each robot comes with a one-year warranty and reliable customer service.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

AI tennis robot 7

Tenniix, the AI-powered tennis robot (T-Apex)

Tenniix models and pricing: Which AI tennis robot is right for you?

There are three Tenniix models to choose from. The Basic model is priced at $699, the Pro at $999 and the Ultra at $1,499. Each model offers a different set of features, with the Ultra version including advanced options like the movable base and enhanced vision system. Tenniix was launched through a Kickstarter campaign, giving early supporters a chance to back the project and receive the robot at a special price.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Advertisement
AI Tennis robot 8

Tenniix, the AI-powered tennis robot (T-Apex)

Kurt’s key takeaways

Tenniix feels less like a machine and more like a smart tennis partner who’s always ready to help you improve. Whether you want to polish your technique or get serious about your game, it offers a flexible and engaging way to train. If you’re looking for a training partner that adapts to you, Tenniix is worth checking out.

Would you rather challenge yourself playing against a robot like Tenniix, or do you prefer training with a human opponent? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Trending