Newzque Logo

Technology News

Latest stories and updates from the world of technology

Google maps introduces battery-saver navigation mode; Step-by-Step guide for Pixel 10 Series
Nov 28, 2025india

Google maps introduces battery-saver navigation mode; Step-by-Step guide for Pixel 10 Series

Driving long distances without frequent recharges can test the limits of your smartphone’s battery, even with power-saving measures turned on. To help stretch your phone’s mileage, Google Maps has introduced a new Power Saving Mode, announced in its November 2025 “Pixel Drop.” This mode is now available to owners of the Google Pixel 10 series of phones, including the Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL and Pixel 10 Pro Fold. What is Power Saving Mode? At its core, the Power Saving Mode is a simpler, black and white map. When enabled, the regular navigation experience is replaced with one that emphasizes core information only: next turn, estimated time of arrival (ETA) and basic directions. As a result, it consumes less power. Enabling it is easy: Open Google Maps → Settings → Navigation → Driving options → Power Saving Mode. After starting navigation, just hit the phone’s power button while driving. The screen will lock, and you’ll be instantly presented with the reduced‑glare, power‑saving interface. Hit the power button (or tap the screen) again, and the normal Google Maps driving experience returns. Limitations: While in Power Saving Mode, the map will only display when the phone is in portrait orientation, and it’s only available in driving mode. Walking, biking or public transit directions won’t offer the black and white, reduced‑graphics layout. Automatic shutdown: The feature turns itself off once navigation is complete. Features and benefits The “Pixel Drop” announcement credits a new Android “AOD Min Mode” as the key enabler here. On phones with OLED displays, such as the Pixel 10 series, this setting is particularly power-efficient – because black pixels on OLEDs turn off, and thereby draw almost no power. In addition, the system automatically dims the screen and reduces the display’s refresh rate when Power Saving Mode is on. Taken together, Google says users can enjoy up to four additional hours of navigation compared to standard Google Maps use. Pixel-only feature? Pixel 10 only? Pixels on Android? This new power-saving feature for driving directions is exclusive to the Pixel 10 devices, at least for now. Given the apparent tight integration between hardware and software on these phones, it’s also worth noting that the update is possible only on devices with OLED screens. Whether the feature will eventually work on older Pixels or Android devices with OLED displays remains to be seen. Google hasn’t confirmed or denied the possibility, but early evidence (at least based on some Pixel 9 and 9 Pro users reporting success) suggests that it may not be limited to the Pixel 10 series for long. Key takeaways Navigation apps can guzzle smartphone battery life, especially on long drives or road-trips when access to charging may be intermittent or limited. With the new Power Saving Mode, Google Maps is offering users a way to help alleviate one of the biggest pain‑points when navigating over long distances: running out of phone battery just when you need it the most. By initially making it a Pixel 10‑only feature, Google has simultaneously made a strong (if implicit) case for both OLED screens and deeper hardware‑software integration. It’s not clear if Google will expand this feature to older Pixels or other Android handsets with OLED screens. It hasn’t committed to that yet, but it’s also not ruled it out. If you’re a Pixel 10 owner who frequently uses Google Maps for driving – whether daily commuting or long road‑trips – this new feature could give you a bit more peace of mind, fewer stops for charging and less distraction while searching for the next nearest charger.

Read full story

Latest Technology Updates

Meta supercharges Instagram with new AI translations and Indian language fonts in major update
Nov 28, 2025

Meta supercharges Instagram with new AI translations and Indian language fonts in major update

Meta Platforms is making it easier for creators to create and consume content in a wider range of Indian languages on Instagram, Facebook, and the standalone Edits app. In a Mumbai-based event called “House of Instagram,” the company today announced native language support for Bengali, Marathi, Telugu, Kannada, and Tamil. It will add these languages to its AI-powered dubbing and translation toolkit for Instagram Reels. Dubbing and translation for Indian languages Creators could already dub and lip-sync their Reels into English, Spanish, Hindi, and Portuguese before today. “With AI Dubbing, creators can translate the audio and match the translated text to the lip movement of the original video using AI lip-syncing,” says the Meta spokesperson in a statement. “AI voice cloning technology will be used to dub reels so the translated version will sound more like the creator’s original voice.” Meta will also make it simple for viewers to recognize dubbed Reels. It will tag AI translated Reels with a “Translated with Meta AI” label, according to the spokesperson. The feature will also be easy to toggle for the audience: viewers can switch off translations or return to the original audio using the settings menu. Styling content in local languages, too In addition to language and audio support, Instagram’s Edits app is also getting a font upgrade. In an update coming to Android “in the coming days,” the app will support native writing scripts for Indian languages including Devanagari (Hindi, Marathi, and more) and Bengali-Assamese. It’s not just about what content creators say, but how it looks. Support for local fonts will add to the cultural context of visual content and help creators make their captions and Overlays look the way they sound when they write in their local languages. For context, Instagram’s list of fonts in the app will be localized to surface relevant fonts based on device’s language settings, according to the spokesperson. There are over 50 fonts in the app currently. Creators and audiences The update could significantly expand reach for content creators in the country. Indian creators who use Reels for storytelling, entertainment, or educational content can now express themselves in local languages of the regions they are targeting. It will also remove language barriers for audiences who may not understand English or Hindi on the platform. The creator voice is also preserved – rather than just subtitles, dubbing with AI lip-syncing can maintain the original creator tone and intonation, which is very important for brand trust and virality. For audiences, dubbed Reels will be fully accessible, rather than requiring focus to watch with subtitles or translating piece-meal with a dictionary. This makes content on the platform more inclusive, in practice if not just policy. One language more In a country with more than 1.3 billion people, covering languages and regional dialects can be a big undertaking. By expanding its translation and dubbing support to include five major Indian languages, Meta is making a bet that more and more social media content will be created and consumed in native tongues in the country. As more people use regional languages online, these projects will help creators and audiences feel more included. Meta also supports this, like with their AI subtitle translations launched recently.

DPDP Rules 2025: Digital Personal Data Protection rules notified – How it empowers citizens, penalties EXPLAINED
Nov 21, 2025

DPDP Rules 2025: Digital Personal Data Protection rules notified – How it empowers citizens, penalties EXPLAINED

DPDP Rules 2025: Prime Minister Narendra Modi-led Central government achieved the full operationalisation of its data protection regime by notifying the Digital Personal Data Protection (DPDP) Rules, 2025 on November 14, 2025. Together, the Act and the Rules form a clear and citizen-centred framework for the responsible use of digital personal data. They place equal weight on individual rights and lawful data processing.The final Rules are the culmination of an extensive consultation process conducted by the Ministry of Electronics and Information Technology. The Ministry held discussions in seven major cities and received 6,915 inputs from a wide array of stakeholders, including startups, MSMEs, industry bodies, civil society groups, government departments, and general citizens.With the notification of the Rules, India now has a practical and innovation-friendly system for data protection. It supports ease of understanding, encourages compliance and strengthens trust in the country’s growing digital ecosystem.Understanding Digital Personal Data Protection Act, 2023Enacted on August 11, 2023, the Digital Personal Data Protection Act follows the SARAL approach—Simple, Accessible, Rational, and Actionable. The law creates a full framework for the protection of digital personal data in India. It explains what organisations must do when they collect or use such data. The text uses plain language and clear illustrations so that people and businesses can understand the rules without difficulty.Key terms under DPDP Act, 2023Data Fiduciary: An entity that decides why and how personal data is processed, either alone or with others.Data Principal: The individual to whom the personal data relates. In the case of a child, this includes a parent or lawful guardian. For a person with a disability who cannot act independently, this includes the lawful guardian acting on their behalf.Data Processor: Any entity that processes personal data on behalf of a Data Fiduciary.Consent Manager: An entity that provides a single, transparent and interoperable platform through which a Data Principal may give, manage, review or withdraw consent.Appellate Tribunal: The Telecom Disputes Settlement and Appellate Tribunal (TDSAT), which hears appeals against decisions of the Data Protection Board.The law is guided by seven core principles, including consent and transparency, purpose limitation, data minimisation, accuracy, storage limitation, security safeguards and accountability. These principles guide every stage of data processing. They also ensure that personal data is used only for lawful and specific purposes.A central feature of the Act is the creation of the Data Protection Board of India. The Board functions as an independent body that oversees compliance, inquires into breaches and ensures that corrective measures are taken. It plays a key role in enforcing the rights granted under the Act and maintaining trust in the system.Penalties under DPDP Act, 2023The DPDP Act imposes substantial financial penalties for non-compliance by Data Fiduciaries. The highest penalty up to Rs 250 crore applies to failure of a Data Fiduciary to maintain reasonable security safeguards. Not notifying the Board or affected individuals of a personal data breach as well as violations of obligations relating to children can each attract penalties of up to Rs 200 crore. Any other violation of the Act or Rules by a Data Fiduciary may attract penalties up to Rs 50 crore.The Act places clear responsibilities on Data Fiduciaries to keep personal data safe and to stay accountable for its use. It also gives Data Principals the right to know how their data is handled and the right to seek correction or removal when needed.Together, the Act and the Rules create a strong and balanced system. They strengthen privacy, build public trust and support responsible innovation. They also help India’s digital economy grow in a secure and globally competitive way.Overview of Digital Personal Data Protection Rules, 2025The Digital Personal Data Protection Rules, 2025 give full effect to the DPDP Act, 2023. They build a clear and practical system to protect personal data in a fast-expanding digital environment. The Rules focus on the rights of citizens and on responsible data use by organisations. The Rules aim to curb unauthorized commercial use of data, reduce digital harms and create a safe space for innovation. They will also help India maintain a strong and trusted digital economy.In carrying this vision forward, the Rules outline several core provisions that follow:Phased and Practical ImplementationThe Rules introduce an eighteen-month period for phased compliance. This gives organisations enough time to adjust their systems and adopt responsible data practices. Every Data Fiduciary must issue a separate consent notice that is clear and easy to understand. The notice must explain the specific purpose for which personal data is collected and used. Consent Managers, who help people manage their permissions, must be companies based in India.Clear Protocols for Personal Data Breach NotificationThe Rules set out a simple and timely process for reporting personal data breaches. When a breach takes place, the Data Fiduciary must inform all affected individuals without delay. The message must be in plain language and must explain what happened, the possible impact and the steps taken to address the issue. It must also include contact details for help.Transparency and Accountability MeasuresThe Rules require every Data Fiduciary to display clear contact information for queries related to personal data. This may be the contact of a designated officer or a Data Protection Officer. Significant Data Fiduciaries face stronger duties. They must conduct independent audits and carry out impact assessments. They must also follow stricter checks while using new or sensitive technologies. In some cases, they must follow government directions on restricted categories of data, including local storage where needed.Strengthening Rights of Data PrincipalsThe Rules reinforce the rights already provided under the Act. Individuals can ask to access their personal data or seek corrections and updates. They may also request the removal of data in certain situations. They can choose someone else to exercise these rights on their behalf. Data Fiduciaries must respond to such requests within ninety days.Digital-First Data Protection BoardThe Rules establish a fully digital Data Protection Board of India, which will consist of four members. Citizens will be able to file complaints online and track their cases through a dedicated portal and mobile application. This digital system supports quicker decisions and simplifies grievance redressal. Appeals against the Board’s decisions will be heard by the Appellate Tribunal, TDSAT.How the DPDP Rules empower individualsThe framework places the individual at its center, granting Data Principals clear control over their data. It aims to give every citizen clear control over personal data and confidence that it is being handled with care. The rules are written in plain language so that people can understand their rights without difficulty. They also ensure that organisations act responsibly and remain accountable for how they use personal data.Rights and protections for citizens include:Right to give or refuse consentEvery person has the choice to allow or deny the use of their personal data. Consent must be clear, informed and easy to understand. Individuals may withdraw their consent at any time.Right to know how data is usedCitizens can seek information on what personal data has been collected, why it has been collected and how it is being used. Organisations must provide this information in a simple form.Right to access personal dataIndividuals can ask for a copy of their personal data that is held by a Data Fiduciary.Right to correct personal dataPeople may request corrections to personal data that is inaccurate or incomplete.Right to update personal dataCitizens can ask for changes when their details have altered, such as a new address or updated contact number.Right to erase personal dataIndividuals may request the removal of personal data in certain situations. The Data Fiduciary must consider and act on this request within the permitted time.Right to nominate another personEvery individual can appoint someone to exercise their data rights on their behalf. This is helpful in cases of illness or other limitations.Mandatory response within Ninety DaysData Fiduciaries are required to address all requests related to access, correction, updating or erasure within a maximum of ninety days, ensuring timely action and accountability.Protection during personal data breachesIf a breach takes place, citizens must be informed at the earliest. The message must explain what happened and what steps they can take. This helps people act quickly to reduce harm.Clear contact for queries, complaintsData Fiduciaries must provide a point of contact for questions relating to personal data. This may be a designated officer or a Data Protection Officer.Special protection for childrenWhen a child’s personal data is involved, verifiable consent from a parent or guardian is required. This consent is needed unless the processing relates to essential services such as healthcare, education or real-time safety.Special protection for persons with disabilitiesIf a person with a disability cannot make legal decisions even with support, their lawful guardian must give consent. This guardian must be verified under the relevant laws.How DPDP aligns with RTI ActSince the DPDP Act and the DPDP Rules expand citizens’ privacy rights, they also clarify how these rights work alongside the access to information guaranteed by the Right to Information (RTI) Act.The changes introduced through the DPDP Act revise Section 8(1)(j) of the RTI Act in a way that respects both rights without diminishing either. The amendment reflects the Supreme Court’s affirmation of privacy as a fundamental right in the Puttaswamy judgment. It brings the law in line with the reasoning already followed by courts, which have long applied reasonable restrictions to safeguard personal information. By codifying this approach, the amendment prevents uncertainty and avoids any conflict between the transparency regime of the RTI Act and the privacy safeguards introduced under the DPDP framework.The revision does not prevent the disclosure of personal information. It simply requires that such information be assessed with care and shared only after considering the privacy interests involved. At the same time, Section 8(2) of the RTI Act remains fully operative. This provision allows a public authority to release information when the public interest in disclosure is strong enough to outweigh any possible harm. This ensures that the essence of the RTI Act, which is to promote openness and accountability in public life, continues to guide decision making.ConclusionThe Digital Personal Data Protection Act and the DPDP Rules mark an important step in building a trustworthy and future-ready digital environment for the country. They bring clarity to how personal data must be handled, strengthen the rights of individuals and create firm responsibilities for organisations. The framework is practical in design and backed by wide public consultation, which makes it both inclusive and responsive to real needs. It supports the growth of India’s digital economy while ensuring that privacy remains central to its progress. With these measures now in place, India moves towards a safer, more transparent and innovation-friendly data ecosystem that serves citizens and strengthens public confidence in digital governance.

PS5 Console Black Friday Deals: PlayStation India announces sale from THIS date — Discount on PS5, DualSense controllers, PS VR2, PS 4 and more
Nov 21, 2025

PS5 Console Black Friday Deals: PlayStation India announces sale from THIS date — Discount on PS5, DualSense controllers, PS VR2, PS 4 and more

PS5 Console Black Friday Deals: PlayStation India has announced its Black Friday sale, offering significant discounts on PS5 consoles, accessories, and games from November 21 to December 4, 2025. The sale features price cuts of up to Rs 10,000 on select products from leading online and offline retailers.PlayStation IndiaBlack Friday sale dateBlack Friday Sale starts from November 21 to December 04, 2025. PlayStation India announced big discounts on PS5 Consoles, Games, & Accessories.PS5 Console Black Friday DealsThe PlayStation 5 console (Disc Edition) will be available for Rs 49,990, down from its MRP of Rs 54,990, while the PS5 Digital Edition will be priced at Rs 44,990, down from Rs 49,990. Both consoles are receiving a Rs 5,000 discount during the promotional period.Purchase dealCustomers can avail these deals through online platforms including Amazon, Flipkart, Blinkit and Zepto as well as offline stores like Croma, Reliance Digital, Vijay Sales, Sony Centre and other authorised PlayStation retailers across India, ToI reported.Great deal on DualSense controllers, PS VR2, and PS5 accessoriesDualSense controllers in all colors—White, Black, Red, Gray Camo, and Ice Blue—are being offered at a discount of Rs 2,000, bringing their price down from Rs 6,390 to Rs 4,390. Premium Metallic and Chrome variants, including Metallic Blue, Metallic Red, Chrome Teal, and Chrome Indigo, will be available for Rs 4,849, a Rs 2,000 reduction from their original price of Rs 6,849, according to ToI.The PlayStation VR2 headset is getting the biggest discount of Rs 10,000, now down from Rs 44,999 to Rs 34,999. The Pulse Explore wireless earbuds are available at Rs 9,990, down from Rs 9,000, and the Pulse Elite wireless headset is available at Rs 7,990, down from Rs 5,000. The DualSense Edge wireless controller, designed for competitive gaming, is available at Rs 15,990, down from Rs 3,000. Discount on PlayStation 5 and PS4Popular PS5 titles are included in the sale with varying discounts. "Death Stranding 2" is priced at Rs 4,199 after a Rs 1,000 discount, while "Astro Bot" is available at Rs 3,199. Action titles including "Marvel's Spider-Man 2," "Rise of the Ronin," and "Gran Turismo 7" are all priced at Rs 2,599 after discounts ranging from Rs 2,000 to Rs 2,600, as per the ToI."God of War Ragnarök" sees the highest game discount at Rs 3,100, bringing its price down to Rs 2,099 from Rs 5,199. Other notable titles like "Ghost of Tsushima Director's Cut," "The Last of Us Part 1 Remake," and "Ratchet & Clank: Rift Apart" are also discounted to Rs 2,599 from Rs 5,199.

X down? Twitter users are struggling to log in? Are you also facing issue?
Nov 21, 2025

X down? Twitter users are struggling to log in? Are you also facing issue?

The popular social media platform X (formerly known as Twitter) is reportedly facing a major service disruption in across the world, including India, with thousands of users flagging concerns on the outage tracking site, Downdetector.The widespread glitch is affecting access to the platform across all major interfaces, including the web version at x.com and the mobile applications for both Android and iOS devices.The widespread outage has critically impacted core platform functions such as logging in, loading new posts, and accessing both the mobile application and the website. Related News | Multi-billion dollar AI, cloud, chip deals: From Nvidia, Amazon to Tesla, Google - Key firms, triggers, investment amount | EXPLAINEDAs of 5:15 PM (IST), there were more than 11,500 reports of issues with the social media platform, as recorded by the Downdetector, which tracks outages by collating status reports from a number of sources.Reported problems were primarily related to the Feed (47%), the Website (30%), and Server Connection issues (23%). However, the microblogging social media platform has not issued a statement regarding the reasons behind the massive disruption.Affected users saw a message indicating there was an “internal server error on Cloudflare’s network”. It asked users to “please try again in a few minutes”, reported www.independent.co.uk. A potential contributing factor may be simultaneous issues experienced by Cloudflare, a web infrastructure company whose services power many modern online experiences, including protection against cyberattacks and managing heavy traffic.It is currently unclear whether the outages affecting the social media platform and Cloudflare are directly related.Cloudflare is an internet infrastructure that offers many of the core technologies that power today’s online experiences. That includes tools that protect websites from cyber attacks and ensure that they stay online amid heavy traffic, for instance.“Cloudflare is aware of, and investigating an issue which potentially impacts multiple customers,” the company said in a new update.“Further detail will be provided as more information becomes available,” it added.

Why is "Please unblock challenges.cloudflare.com to proceed." trending? What does it mean? Here's what we know so far
Nov 21, 2025

Why is "Please unblock challenges.cloudflare.com to proceed." trending? What does it mean? Here's what we know so far

Please unblock challenges.cloudflare.com to proceed: Online services such as ChatGPT and Claude faced massive disruption affecting a number of websites, which have now been fixed. ChatGPT, Anthropic’s Claude, Perplexity, Downdetector, and other websites suffered major outages due to a bug in Cloudflare’s servers. The issue began around 6:00 AM ET (4:30 PM IST) on November 18 and quickly spread worldwide. Cloudflare, which many websites use for security and faster performance, confirmed that a technical failure caused widespread 500 errors and API issues across multiple platforms. Data from Downdetector showed the outage growing rapidly as more services were affected.“Please unblock challenges.cloudflare.com to proceed.” error message decodedMany users visiting different websites were met with a confusing message: “Please unblock challenges.cloudflare.com to proceed.” This error comes from Cloudflare’s security system, which is meant to verify users and block harmful traffic. In this case, the system itself malfunctioned, stopping users from accessing working websites.According to a message on the Cloudflare community, this error indicates that something on the user’s end is blocking Cloudflare’s security tool, which protects the website. This could be a local firewall, a browser extension, or another security tool on the user’s device or network. Only the user can identify and unblock it.Cloudflare responds to major outageIn an official statement, Cloudflare confirmed the issue, saying: "Cloudflare is aware of, and investigating an issue which impacts multiple customers: Widespread 500 errors, Cloudflare Dashboard and API also failing. We are working to understand the full impact and mitigate this problem."Later updates noted that services were gradually recovering, but users might still face higher-than-normal error rates as the team continued to fix the problem.Also read: Misplaced your Aadhaar card or forgot number? Recover it online for FREE - Check step-by-step guide

EXCLUSIVE | MASSIVE Rs 11.5 lakh cr target for software exports | Karnataka IT Minister Priyank Kharge INTERVIEW
Nov 21, 2025

EXCLUSIVE | MASSIVE Rs 11.5 lakh cr target for software exports | Karnataka IT Minister Priyank Kharge INTERVIEW

Karnataka's IT Minister Priyank Kharge on Wednesday, November 19 told ET Now that the state has set a target to double the software exports to Rs 11.5 lakh crore by 2030, powered by IT services and the growing Global Capability Centre ecosystem.He said, "we are already achieving close to 5.3 lakh this year, and the goal is to double that in the next four years through services and through GCCs. We are confident we will reach this target well before the policy deadline."He said, "We command 47 per cent of all investment in global capability centres. Whether it is AI or deep tech, these technologies are now entering every possible sector and vertical. We are confident of achieving our target because we have the talent pool to support it -- talent that extends far beyond the Bengaluru ecosystem.""Through our Nipuna programme, the philosophy is “skill locally, work globally.” So why can’t people trained in Bengaluru work in Brussels, Brisbane or Britain? Global companies are seeking our talent and our reskilling and upskilling initiatives will ensure that our workforce becomes one of the most employable talent pools in the world. We believe we can achieve this target within the next few years," Kharge added.Space TechnologyOn the space tech policy, Priyank Kharge said, "We remain leaders in space tech -- whether in SMEs, MSMEs or in innovation. Our space tech policy focuses not just on upstream activities but also heavily on downstream applications, using space technology and space-based solutions to address real-life problems. We are starting a Centre of Excellence in space for this purpose. We have ISRO, NAL, HAL and the entire supporting ecosystem here. Only the launchpads are elsewhere due to coastal advantages."SubsidiesTalking about subsidies offered by other states, Kharge said, "You cannot attract investments purely by offering higher subsidies. You need a strong ecosystem. Bengaluru, Hyderabad and Chennai have been built over two to three decades. It’s not just about subsidies or land availability. Office space leasing is one of the most expensive in Bengaluru, yet 47 per cent of all GCC office leasing last year happened in this city.""We do not offer incentives or subsidies for investments in Bengaluru -- only in areas beyond Bengaluru. That’s why we created the Local Economic Accelerator Programmes to develop sector-specific clusters and they’re working well. Subsidies may help states with central support, but I’m not sure how sustainable that is for a revenue-deficit state," he added.Competition between southern statesOn the topic of competition between southern states, Kharge stated, "Of course, there will be competition for investments. All of us are vying for the same piece of the pie but we must understand where the acrimony comes from. You cannot scavenge for investments based on someone’s tweet or complaint. Let everyone pitch fairly, and may the best state win. We are not afraid of competition; in fact, we thrive in it. Data speaks for itself."Bengaluru’s second airportRegarding Bengaluru’s much anticipated second airport, Kharge said, "an expert committee has been formed to assess passenger and cargo movement, connectivity and overall logistics and to ensure Bengaluru is decongested. The committee will make a decision in the coming weeks."https://youtu.be/pmVwyhmu93o?si=mBDGCwKYAYZ8ZRCC

Advertisement
Banner Ad Space Available
728 x 90px (Leaderboard)

More Technology Stories

10M Americans hit in government contractor data breach
Nov 17, 2025foxnews

10M Americans hit in government contractor data breach

Data breaches hit every kind of business, from hospitals to tech firms to major retailers. Now a leading government contractor has joined that list.Conduent, which manages critical public services across the United States, says hackers infiltrated its systems for nearly three months. The cyberattack exposed personal information linked to more than 10 million people.Conduent discovered the intrusion in January 2025 and said hackers had infiltrated its network as early as Oct. 21, 2024. During this period, attackers reportedly stole large amounts of data linked to state-level programs such as Medicaid, child support, food assistance and toll systems. Conduent claims that its investigation found no ongoing malicious activity and said operations were safely restored after the breach was contained.Conduent manages technology and payment systems for dozens of U.S. state governments, processing roughly $85 billion in annual disbursements and handling over 2 billion customer service interactions every year. According to its own estimates, it supports around 100 million residents through various government health and welfare programs.MAJOR DATA BROKER HACK IMPACTS 364,000 INDIVIDUALS’ DATAThe company reported that at least 400,000 people in Texas were affected, with compromised data including Social Security numbers, medical records and health insurance details. Other affected states include Washington, South Carolina, New Hampshire, Maine, Oregon, Massachusetts and California. Notifications are being sent to all impacted individuals, and a dedicated call center has been established to answer questions about the breach.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.In January, Conduent described the event as an "operational disruption caused by a third-party compromise." The breach led to several days of downtime, disrupting vital services in multiple states. In Wisconsin, for instance, parents and beneficiaries were unable to process payments due to system outages, leaving many struggling to meet obligations related to child support and welfare programs.The SafePay ransomware group later claimed responsibility for the attack, alleging it had stolen 8.5 terabytes of data. Conduent confirmed in a Securities and Exchange Commission (SEC) filing that hackers had indeed exfiltrated files belonging to a limited number of clients. The company says it hired cybersecurity experts to analyze the stolen data and recently confirmed that it contained significant amounts of personal information from end-users across multiple programs.Despite the massive theft, Conduent said there is currently no evidence that the stolen data has been published online or on dark web marketplaces.HACKERS TARGET ONLINE STORES WITH NEW ATTACKWe reached out to Conduent for a comment, and a rep for the company provided CyberGuy with the following statement:"As previously disclosed in its April 2025 Form 8-K filing with the SEC, in January 2025, Conduent discovered that it was the victim of a cybersecurity incident. With respect to that incident, Conduent has agreed to send notification letters, on behalf of its customers, to individuals whose personal information may have been affected by this incident. In addition, a dedicated call center has been set up to address consumer inquiries. At this time, Conduent has no evidence of any attempted or actual misuse of any information potentially affected by this incident."Upon discovery of the incident, Conduent acted quickly to secure its networks, restore its systems and operations, notify law enforcement and conduct an investigation with the assistance of third-party forensics experts. In addition, given the nature and complexity of the data involved, Conduent has been working diligently with a dedicated review team, including internal and external experts, to conduct a detailed analysis of the affected files to identify the personal information contained therein, which was a time-intensive process. Conduent takes this matter seriously and regrets any inconvenience this incident may have caused."If your information may have been exposed in the Conduent breach or any similar data leak, you're not without defenses. There are several steps you can take right now to reduce the risks.Data brokers collect and sell personal information such as your name, home address, phone number and relatives' names. This data can be used for scams or social engineering attacks. Personal data removal services find these records across dozens of sites and submit takedown requests on your behalf.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.HACKERS STEAL MEDICAL RECORDS AND FINANCIAL DATA FROM 1.2M PATIENTS IN MASSIVE HEALTHCARE BREACHAfter a major data breach, one of the most effective ways to protect yourself is to stay alert. Check your bank and credit card statements every few days for unusual transactions, even small ones. Watch your benefit accounts or tax filings for irregular activity. Early detection gives you time to freeze accounts or stop fraudulent charges before they escalate.Antivirus software is your first line of defense against cyber threats that often follow large breaches. Stolen data can be used to launch targeted phishing attacks or spread malware through fake links and emails. A reliable antivirus solution actively scans for malicious activity, blocks suspicious downloads and keeps your devices safe from newer online threats through automatic updates.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.OVER 8M PATIENT RECORDS LEAKED IN HEALTHCARE DATA BREACHEven if your login credentials are compromised, two-factor authentication (2FA) can stop attackers from getting in. It requires an additional code sent to your phone, email, or authentication app, making unauthorized access nearly impossible. Enable 2FA on your banking, email and government-related accounts, as these often hold the most sensitive information.Many breaches happen because people reuse the same password across multiple websites. A password manager eliminates that risk by creating and storing strong, unique passwords for every account.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.comIdentity theft protection services monitor your personal data across multiple sources, including the dark web and public records. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.Even though Conduent claims the stolen data hasn't surfaced online, that doesn't mean it's safe. Data exfiltration on this scale has long-term implications, from identity theft to potential fraud within public benefit systems. The real test will be how both Conduent and its government partners adapt their cybersecurity oversight to prevent similar breaches. Because at this point, the question isn't whether these systems will be targeted again, but whether they'll be any better prepared when it happens.Do you think government contractors handling sensitive information should face stricter cybersecurity regulations? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.

How AI is making IVF more predictable
Nov 17, 2025foxnews

How AI is making IVF more predictable

In-vitro fertilization (IVF) can take a serious toll on families, not only emotionally but financially, especially when every cycle comes with new bills and no clear sense of what the full journey might cost. Gaia Family aims to change that by removing the guesswork around pricing with a blend of tech and AI-driven forecasting. Instead of worrying about unpredictable costs, couples pay a fixed upfront price or monthly installments that cover their planned IVF treatment, medications, embryo transfers and built-in protections if cycles or transfers aren't successful. It gives families a clearer path forward and support that lasts through the entire process.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.ROBOTS POWER BREAKTHROUGH IN PREGNANCY RESEARCH, BOOSTING IVF SUCCESS RATESGaia Family was founded by Nader AlSalim, a former Goldman Sachs executive who knew the IVF struggle firsthand. After spending over $50,000 across five IVF rounds in multiple countries, he and his wife finally had a son. The experience left him frustrated by how little clarity the system offered and how emotionally draining the process could be.He saw that most fertility systems were built around procedures, not people. His goal with Gaia Family was to build something different, a program that uses data to empower families instead of leaving them to navigate uncertainty and mounting debt. That personal experience became the foundation of Gaia Family's mission to bring agency, transparency and compassion to fertility care.TRUMP ROLLS OUT PLAN TO SLASH IVF COSTS FOR AMERICAN FAMILIES THROUGH NEW PHARMA PARTNERSHIPIf a cycle doesn't result in viable embryos, Gaia's built-in protection covers another attempt, helping families try again without financial shock. Once you have viable embryos, your Gaia Plan allows you unlimited frozen embryo transfers (usually $5,000 each) at no extra cost until you have a baby. And, if none of those transfers result in a live birth, then Gaia will give you money toward another cycle. Plus, you have the option of including all of your PGT-A testing and your medication for a fixed cost, so you have even more protection throughout your journey. AlSalim, tells CyberGuy the company's mission goes beyond technology."At Gaia Family, we're using AI not to replace the human element of fertility care, but to bring more confidence to it," AlSalim said. "Fertility treatment can feel like a game of chance — our technology helps turn it into a guided, informed journey. By analyzing millions of data points, we can forecast the most effective and affordable pathway for each individual, so patients can make decisions grounded in data rather than uncertainty. Ultimately, it's about giving hopeful parents more agency, transparency and peace of mind in one of the most emotional experiences of their lives."SKIN DNA BREAKTHROUGH COULD LET 60-YEAR-OLD WOMEN HAVE GENETICALLY RELATED KIDSIVF in the United States can cost as much as $30,000 per cycle, and most couples need several tries. Each failed attempt adds more bills and stress. Gaia Family's fixed-cost model gives families financial predictability while keeping them emotionally supported. It also encourages clinics to focus on outcomes rather than repeated treatments.This approach is transforming how people view fertility care. Instead of relying on luck, families can benefit from AI insights to make better decisions. While it may not lower the medical costs yet, it changes how couples experience one of life's most emotional challenges, turning fear into informed planning and despair into hope. Gaia removes the spiraling costs, making couples' outcomes so much more cost-efficient.If you are thinking about IVF or egg freezing, Gaia Family's model could make your path more manageable. It provides upfront transparency about costs, protection against financial loss and a data-driven forecast of success. It helps you make decisions based on evidence rather than guesswork.Still, while AI can analyze data patterns, it cannot alter biology. Factors like age, health and genetics continue to shape outcomes. Even so, Gaia Family's system gives couples a sense of control that traditional fertility care rarely provides by serving everyone, with no eligibility criteria in terms of age or health factors. Knowing that your finances are protected can ease stress and allow you to focus on what matters most: building your family. Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.comGaia Family is blending AI and empathy to rewrite how fertility care works. It replaces uncertainty with insight and transforms risk into reassurance. For many, it's not just about technology, it's about restoring hope and fairness to one of life's most personal journeys.Would you trust artificial intelligence to guide your path to becoming a parent? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com. All rights reserved.

Geek Squad scam email: How to spot and stop it
Nov 17, 2025foxnews

Geek Squad scam email: How to spot and stop it

You open your inbox and see a message titled "Payment order settled" with an official-looking invoice from Geek Squad. At first glance, it looks legitimate. It includes your email address and even a phone number for help. That is exactly what happened when I received one of these messages this week.This new Geek Squad scam email is designed to make you panic, call the fake number and share sensitive information before realizing it is a trap. Before you know it, your curiosity could turn into a costly mistake, so let's look at the red flags to watch for and how you can protect yourself.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.THE #1 GOOGLE SEARCH SCAM EVERYONE FALLS FORWhen I looked closer, several warning signs stood out:These details are meant to create urgency and push you to react before thinking.BEWARE OF FAKE CREDIT CARD ACCOUNT RESTRICTION SCAMSThe scam depends on fear and confusion. Once you call the number, the person on the line sounds polite and professional. They might say they need to verify your payment or reverse a charge. In reality, they are trying to get your credit card number or convince you to install software that gives them access to your computer.In some cases, they claim to refund too much money by accident and ask you to send part of it back. That is how victims lose hundreds or even thousands of dollars.SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKSScammers have refined their tactics. In this Geek Squad scam email I received, they copied the official logo, used clean layouts and included my actual email address to make it look legitimate. They often get this information from data leaks or security breaches found online.Artificial Intelligence (AI) now makes these scams even harder to spot. It helps scammers write natural messages, design fake invoices and create support scripts that sound real. With these tools, they can make almost anyone believe the email is genuine.Always pause before reacting. Read carefully, check the sender, and question anything that feels suspicious. If you want to stay one step ahead, here are some other things that can help keep you safe.Scam emails like the fake Geek Squad invoice are becoming more common and more convincing. They use fear and urgency to make you click or call before you think. Protecting yourself means slowing down, verifying every detail and strengthening your digital defenses. Here is how you can stay safe.The phone number or link in the message connects you directly to scammers, so don't click or call. Once you engage, they can pressure you into sharing personal details or even install harmful software on your device. The moment I saw that "Payment order settled" email, I realized something was off because I don't even have a Geek Squad account. That alone was a major red flag. If you ever get a message about a service you never signed up for, delete it right away. Instead of calling the number in the message, go to the official Best Buy or Geek Squad website to confirm if there is a real issue with your account. Also, sign up for strong antivirus software. Antivirus software acts as your digital guard. It scans downloads, detects malicious links and warns you before dangerous sites load. Choose a trusted program that updates automatically and includes email protection features. This extra layer of defense can prevent malware from taking hold if you accidentally click something suspicious.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.Scammers often use email addresses that look real but have slight differences, such as extra numbers, misspelled words, or unusual domains. A genuine Geek Squad or Best Buy email will come from @bestbuy.com. Always hover over the sender's name to see the actual address before responding.If someone contacts you claiming to be from Geek Squad or Best Buy, stay calm and skeptical. Real companies do not ask for banking details, gift card payments, or remote access to your computer over the phone. Hang up and contact the company directly through its verified website or customer service number.Many scams start with stolen or leaked personal data. A data removal service can help delete your information from data broker sites that sell contact lists to marketers and scammers. Reducing your digital footprint makes it harder for criminals to target you with fake invoices or phishing emails.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.Even with precautions, it is smart to monitor your accounts. Check your bank and credit card activity weekly for any charges you do not recognize. If you see something suspicious, contact your financial institution right away to report and dispute the charge.Two-factor authentication adds another barrier between you and scammers. Even if someone steals your password, they cannot log in without the secondary code sent to your phone or authentication app. Turn on 2FA for your email, online shopping and banking accounts.Weak or repeated passwords make you an easy target. Create long, unique passwords for each account. A password manager can securely store them and generate complex combinations that are hard to guess or crack.Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.Old software is one of the easiest ways for hackers to slip in. Keep your operating system, browser and security programs updated. Turn on automatic updates so you do not have to think about it. These patches often close known security holes that scammers exploit.Before reacting to any invoice or payment alert, go straight to the official account or service mentioned, such as Geek Squad, PayPal, Amazon or your bank. Log in directly through their website or app to verify the details. If nothing shows up there, the email is a scam. This quick step can save you from a costly mistake.Reporting suspicious emails helps stop scammers from targeting others. Most email services, including Gmail, Outlook and Yahoo, allow you to mark messages as phishing. You can also forward the email to reportphishing@apwg.org, which goes to the Anti-Phishing Working Group (APWG), or to abuse@bestbuy.com to alert the proper teams.Receiving one of these fake invoices can be stressful, but remember that many people get the same message every day. The goal is to recognize the signs, refuse to respond and report them to protect others.Have you ever received a convincing scam email like this? How did you handle it? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.

TikTok malware scam tricks you with fake activation guides
Nov 17, 2025foxnews

TikTok malware scam tricks you with fake activation guides

Cybercriminals are again turning TikTok into a trap for unsuspecting users. This time, they're disguising malicious downloads as free activation guides for popular software like Windows, Microsoft 365, Photoshop and even fake versions of Netflix and Spotify Premium.Security expert Xavier Mertens first spotted the campaign, confirming that the same kind of scheme was seen earlier this year. According to BleepingComputer, these fake TikTok videos show short PowerShell commands and instruct viewers to run them as administrators to "activate" or "fix" their programs.In reality, those commands connect to a malicious website and pull in malware known as Aura Stealer, which quietly siphons saved passwords, cookies, cryptocurrency wallets and authentication tokens from the victim's computer.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.3,000+ YOUTUBE VIDEOS DELIVER MALWARE DISGUISED AS FREE SOFTWAREThis campaign uses what experts call a ClickFix attack. It's a social engineering trick that makes victims feel they're following legitimate tech instructions. The instructions seem quick and simple: run one short command and get instant access to premium software.But instead of activating anything, the PowerShell command connects to a remote domain named slmgr[.]win, which downloads harmful executables from Cloudflare-hosted pages. The main file, updater.exe, is a variant of the Aura Stealer malware. Once inside the system, it hunts for your credentials and sends them back to the attacker.Another file, source.exe, uses Microsoft's C# compiler to launch code directly in memory, making it even harder to detect. The purpose of this extra payload isn't fully known yet, but the pattern follows previous malware used for crypto theft and ransomware delivery.META ACCOUNT SUSPENSION SCAM HIDES FILEFIX MALWAREEven though these scams look convincing, you can avoid becoming a victim with the right precautions.Never copy or run PowerShell commands from TikTok videos or random websites. If something promises free access to premium software, it's likely a trap.Always download or activate software directly from the official website or through legitimate app stores.Outdated antivirus or browsers can't detect the latest threats. Update your software regularly to stay protected.Install strong antivirus software that offers real-time scanning and protection against trojans, info-stealers and phishing attempts.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.comIf your personal data ends up on the dark web, a data removal or monitoring service can alert you and help remove sensitive information.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.comIf you've ever followed suspicious instructions or entered credentials after watching a "free activation" video, reset all your passwords immediately. If you've ever followed suspicious instructions or entered credentials after watching a "free activation" video, reset all your passwords immediately. Start with your email, financial and social media accounts. Use unique passwords for each site. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at Cyberguy.comAdd an extra layer of security by turning on multi-factor authentication wherever possible. Even if your passwords are stolen, attackers won't be able to log in without your verification. TikTok's global reach makes it a prime target for scams like this. What looks like a helpful hack could end up costing your security, your money and your peace of mind. Stay alert, trust only verified sources and remember that there's no such thing as a free activation shortcut.Is TikTok doing enough to protect its users from scams like this? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.

Pennsylvania bill seeks to legalize flying cars
Nov 17, 2025foxnews

Pennsylvania bill seeks to legalize flying cars

Pennsylvania may soon join the few states ready to welcome flying cars. State Sen. Marty Flynn from the 22nd District has reintroduced Senate Bill 1077, also known as the Jetsons Act, during the 2025-2026 Regular Session.The proposal amends Title 75 of the Pennsylvania Consolidated Statutes, creating a new legal category for roadable aircraft. These vehicles would have the unique ability to operate both on public roads as motor vehicles and in the air as aircraft.The legislation was referred to the Senate Transportation Committee Nov. 5, 2025. Although a similar version failed to pass last session, Flynn remains committed to positioning Pennsylvania as a leader in advanced transportation technology. He believes that laying the groundwork now will allow the state to adapt quickly when these vehicles become commercially viable.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.THE WORLD'S FIRST FLYING CAR IS READY FOR TAKEOFFTechnology is advancing faster than most laws can keep up. The rise of advanced air mobility is blurring the line between cars and aircraft.Several companies, including Alef Aeronautics, Samson Sky and CycloTech are developing vehicles that can take off vertically or transform from cars to small aircraft within minutes.Some states are already laying the groundwork for this new era. Minnesota and New Hampshire have passed legislation formally recognizing "roadable aircraft," making them the first states to treat flying cars as both vehicles and aircraft under state law. Pennsylvania now hopes to follow their lead with its own version through Sen. Marty Flynn's Jetsons Act.At the same time, the Federal Aviation Administration (FAA) has begun approving real-world tests. In 2023, the FAA granted a special airworthiness certificate to SpaceX-backed Alef Aeronautics for its Model A prototype, allowing it to operate on roads and in the air for research and development. That approval marked the first time a flying car received official clearance for combined ground and flight testing in the United States.Sen. Flynn wants Pennsylvania to be part of this growing national conversation. In his co-sponsorship memo, he explained that proactive legislation will help the state prepare for the next wave of innovation.WOULD YOU BUY THE WORLD'S FIRST PERSONAL ROBOCAR?Under Senate Bill 1077, Pennsylvania would officially define a "roadable aircraft" as a hybrid vehicle capable of both driving and flying. These vehicles would need to register with the state, display a unique registration plate and meet standard inspection requirements. When operated on highways or city streets, they would be subject to the same rules as other vehicles. When used in flight, they would remain under federal aviation oversight.The bill also clarifies how drivers and pilots must transition between ground and air operations safely. It allows take-offs and landings only in approved areas, except during emergencies. Flynn emphasizes that clear definitions and consistent oversight will prevent confusion for both motorists and law enforcement. He hopes this clarity will also encourage manufacturers to consider Pennsylvania a test site for future flying car technologies.CHINESE AUTO GIANT WANTS TO MAKE FLYING CARS YOUR NEXT COMMUTE OPTIONIf you live in Pennsylvania, this bill could one day change how you think about personal transportation. While flying cars remain in development, legislation like this sets the stage for their eventual arrival. Drivers may one day register, inspect and insure a flying car just like a regular vehicle. Pilots could use the same roadways to reach take-off zones before switching to flight mode.Even for residents who never plan to own a flying car, the ripple effects could be significant. New rules may influence local zoning, airspace management and infrastructure planning. Communities might see new vertiports or designated landing pads as part of urban development. Insurance companies and safety regulators will need to rethink how they handle this new class of hybrid travel.The bill also signals a broader change in how states approach innovation. Rather than waiting for federal action, Pennsylvania wants to establish a framework that welcomes new technologies while protecting public safety.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.Sen. Flynn's Jetsons Act might sound futuristic, but it reflects a growing reality in transportation. As autonomous vehicles, drones and hybrid aircraft evolve, state governments must adapt to keep up. This legislation shows Pennsylvania's willingness to lead rather than follow. While it may take years before you see a flying car parked in your driveway, the groundwork is already being laid. Lawmakers are thinking ahead about licensing, safety and how to integrate flying cars into existing traffic systems. That forward-thinking approach could one day make Pennsylvania one of the first states to see cars take to the sky.Do you think flying cars will ever be for everyday folks, or will they stay a luxury reserved for the wealthy? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com. All rights reserved.

Power on the move: Is pilot program the future of EV charging?
Nov 14, 2025foxnews

Power on the move: Is pilot program the future of EV charging?

Driving an electric vehicle could soon mean charging as you go. A new wireless charging pilot in France is showing how coils built into the road can transfer more than 300 kilowatts of power to moving EVs. This breakthrough could make long trips possible without stopping at a charging station.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. RESEARCHERS CREATE REVOLUTIONARY AI FABRIC THAT PREDICTS ROAD DAMAGE BEFORE IT HAPPENSThe technology comes from Electreon Wireless, working with Vinci Construction, Gustave Eiffel University and Hutchinson. Together, they've installed about a one-mile stretch of road near Paris that can transfer energy to EVs in motion.So far, the system has powered a truck, van, car and bus — all equipped with special pickup coils. Early tests show the system can deliver peak power over 300 kW and more than 200 kW under steady conditions. That's strong enough to keep large cargo trucks rolling for miles without a pit stop.If widely adopted, dynamic wireless charging could change how America powers transportation. Heavy-duty trucks could use smaller, cheaper batteries. Delivery vehicles and buses could stay on the road longer with less downtime.For drivers, it could mean never having to worry about range anxiety again. Instead of hunting for the nearest charger, the highway itself could be your power source.WOULD YOU BUY THE WORLD'S FIRST PERSONAL ROBOCAR?The big questions now are about cost and control. Who pays to install these power roads? How much will it cost to use them? Public-private partnerships may hold the key, but until those details are ironed out, large-scale rollout remains a challenge.Still, with global momentum building, it's only a matter of time before dynamic wireless charging becomes part of everyday driving.This innovation is not limited to Europe. In Detroit, Michigan, a public road on 14th Street already uses embedded charging coils that can send power to EVs as they move. In Indiana, Purdue University and the Indiana Department of Transportation are building a quarter-mile highway section designed to charge electric vehicles, including heavy trucks, while they travel.For drivers, this technology could make owning an EV easier and more practical. Your vehicle could recharge during normal trips without the need to stop, plug in or wait. That level of convenience could help expand EV adoption across the United States, lowering emissions and fuel costs for millions.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.comTHE ROAD TO PROSPERITY WILL BE PAVED BY AUTONOMOUS TRUCKINGWireless charging roads are moving from concept to construction and showing real promise for a new era of electric travel. The idea that vehicles could charge while driving has the potential to transform how we move goods, commute and use energy. There are still big questions about who will fund widespread installation and how well the system will perform under real traffic and weather conditions. The technology is advancing fast, but scaling it will take time, collaboration and investment. If these challenges can be overcome, dynamic wireless charging could redefine the way we think about mobility and sustainability.Do you think this is really a viable way to power the future of transportation? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.