LATEST ARTICLES

Spain permanently pulls ambassador to Israel over Iran strikes

0

NEWYou can now listen to Fox News articles!

Spain permanently pulled its ambassador to Israel on Tuesday over its opposition to the U.S.-Israeli strikes against Iran, ratcheting up an already tense diplomatic rift between the two countries.

The Spanish government formally terminated the ambassador’s post in its official gazette and said its embassy in Tel Aviv will now be led by a chargé d’affaires indefinitely.

Madrid had recalled its ambassador last September after Israel condemned Spain’s decision to block aircraft and ships carrying weapons to Israel from using Spanish ports or airspace. Israeli Foreign Minister Gideon Sa’ar called the move antisemitic at the time.

When a reporter on Wednesday asked whether Spain, in general, was cooperating with the U.S., President Donald Trump replied, “No, they’re not. I think they’re not cooperating at all.”

WORLD LEADERS SPLIT OVER MILITARY ACTION AS US-ISRAEL STRIKE IRAN IN COORDINATED OPERATION

People walk past damaged buildings

People walk past damaged buildings following a strike on a police station, amid the U.S.-Israeli conflict with Iran, in Tehran, Iran, March 4, 2026. (Majid Asgaripour/WANA (West Asia News Agency) via REUTERS)

“Spain, I think they’ve been very bad,” the president said. “Very bad. Not good at all. We may cut off trade with Spain.”

“I don’t know what Spain is doing,” Trump continued. “They’ve been very bad to NATO. They get protected, they don’t want to pay their fair share. And they’ve been that way for many years.”

Trump added that the people of Spain “are fantastic,” whereas the leadership is “not so good.”

TRUMP PRESSES NATO PARTNERS ON SUPPORT AS HEGSETH BLASTS HESITATION

President Donald Trump speaks to reporters

President Donald Trump speaks with reporters before departing on Marine One from the South Lawn of the White House, Wednesday, March 11, 2026, in Washington. (AP Photo/Alex Brandon)

Sen. Lindsey Graham, R-S.C., on Wednesday criticized Spain’s decision to recall its ambassador to Israel permanently as “hard for me to absorb.”

“Spain is a member of NATO, and the United States and Israel are in joint operations against the Iranian regime who openly calls for the destruction of the Jewish State, attacks against the West, and seeks to purify Islam in its own image,” Graham wrote on X.

Spanish and Israeli flags

Spain recalled its ambassador to Israel, the latest flare-up in the rocky diplomatic relationship between the two countries in recent years. (Reuters/Dado Ruvic/Illustration/File Photo)

“The religious Nazi regime in Iran is the problem, not the Jewish State,” the senator continued. “I hope Spain’s actions will not encourage the tyrannical, fanatical regime in Iran — that abuses its own people — to hang on.”

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Relations between Spain and Israel have deteriorated sharply since Israel launched its military campaign in Gaza in response to the Oct. 7, 2023, Hamas terror attacks.

Israel also downgraded its diplomatic presence in Spain last May after Spain recognized a Palestinian state, placing its own embassy in Madrid under a chargé d’affaires.



Source link

New PhantomRaven NPM attack wave steals dev data via 88 packages

0

New PhantomRaven NPM attack wave steals dev data via 88 packages

New attack waves from the ‘PhantomRaven’ supply-chain campaign are hitting the npm registry, with dozens of malicious packages that exfiltrate sensitive data from JavaScript developers.

The campaign was initially uncovered in October 2025 by researchers at cybersecurity company Koi, who said that it had been running since August and published 126 malicious packages on the npm platform.

Application security company Endor Labs found three additional waves of the PhantomRaven attack that occurred between November 2025 and February 2026 and distributed 88 packages via 50 disposable accounts.

In most cases, the threat actor used ‘slopsquatting’ to mimic established projects like Babel and GraphQL Codegen. They published malicious packages under names that appear suggested by large-language models (LLMs).

According to Endor Labs, 81 of the malicious PhantomRaven packages are still available in the npm registry.

PhantomRaven uses a detection evasion technique called Remote Dynamic Dependencies (RDD), where the metadata file ‘package.json’ specifies a dependency at an external URL. This way, the threat actor does not need to embed malicious code in the package, bypassing automated inspection.

When an unsuspecting developer runs ‘npm install,’ the dependency containing the malware is automatically downloaded from the attacker’s server and executed.

Package.json contents
Package.json contents
Source: Endor Labs

According to Endor Labs’ research, the malware will collect various sensitive information from the compromised machine, like emails from .gitconfig, .npmrc, and environment variables.

CI/CD tokens from GitHub, GitLab, Jenkins, and CircleCI platforms are also targeted

The researchers say that the malware also harvests system information, such as IP, hostname, operating system, and Node version, to fingerprint the machine.

In the final stage, the malicious package exfiltrates the stolen data to the attacker’s command-and-control (C2) server. Usually, this action is done via an HTTP GET request, but HTTP POST and WebSocket are also used for redundancy.

Email harvesting function
Email harvesting function
Source: Endor Labs

Endor Labs has noticed that the infrastructure remains consistent across all four observed waves of the PhantomRaven campaign, with domains containing the word ‘artifact’ that are hosted on Amazon Elastic Compute Cloud (EC2) and lack a TLS certificate.

The payload was also nearly identical across all waves, with 257 of the 259 lines of code remaining unchanged.

However, the attackers evolved operationally, rotating npm and email accounts, changing npm package metadata, and modifying PHP endpoints. Also, they published more frequently in the more recent attacks, with four packages added in a single day, on February 18.

Despite lacking sophistication, the PhantomRaven campaign is ongoing and relying on the same technique, infrastructure patterns, and payload structure. With just minimum modifications for domains, endpoints, npm accounts, and dependency names, the threat actor managed to stay operational.

To protect against this threat, developers are recommended to verify the legitimacy of their building blocks, only use packages from reputable publishers, and avoid copy-pasting suggestions from AI chatbots or unvetted sources.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.



Source link

UN warns of widening crisis as Israeli attacks displace 750,000 in Lebanon | Israel attacks Lebanon News

0

Lebanon faces “a moment of grave peril” as Israel continues to launch deadly attacks across the country, forcibly displacing hundreds of thousands of people, the United Nations humanitarian chief has warned.

Speaking to the UN Security Council in New York on Wednesday, Tom Fletcher said “mass displacement is accelerating” across Lebanon as a result of the Israeli attacks, with more than 750,000 people now registered as displaced.

Recommended Stories

list of 3 itemsend of list

“We’re seeing large-scale movements into densely populated urban areas where shelter capacity is already overstretched,” Fletcher said.

“More than 120,000 people, including thousands of children, are now in 580 collective centres … These sites are overcrowded, with inadequate sanitation [and] insufficient essential supplies,” he told the council.

“These conditions heighten risk of harassment, sexual violence, exploitation, abuse [and] trafficking, particularly of course for women and girls.”

Israel began carrying out intensified attacks on Lebanon last week after Hezbollah launched rockets towards Israeli territory following the assassination of Iran’s Supreme Leader Ayatollah Ali Khamenei in US-Israeli attacks on February 28.

The Israeli military has launched a widespread aerial and ground assault against its northern neighbour, bombing areas across the country in what it says is a campaign against the Lebanese armed group.

Israel also has issued forced displacement orders for all of southern Lebanon, as well as the southern suburbs of the capital, Beirut, sowing chaos as thousands of families fled their homes under fear of attack.

At least 634 people have been killed and 1,586 others wounded in Israeli attacks so far, according to the latest figures from the Lebanese Ministry of Health. The death toll includes dozens of women, children and paramedics.

On Wednesday afternoon, the International Committee of the Red Cross (ICRC) said a volunteer named Youssef Assaf was killed in the southern city of Tyre while carrying out humanitarian work.

“It is deeply alarming that first responders in Lebanon continue to risk their lives while carrying out a humanitarian mission,” ICRC said in a statement shared on X.

“Healthcare workers, hospitals, and other medical units, as well as ambulances and other transports exclusively assigned to medical duties or purposes, must be respected and protected.”

‘Whole world on fire’

Meanwhile, concerns are growing about the fate of hundreds of thousands of Lebanese civilians, particularly children, who have been displaced in recent days.

“It sounded like thunder,” a 10-year-old boy named Adam said of the attacks that forced him and his family to seek safety at a shelter in Beirut.

“It felt like the whole world was on fire,” Adam said in a video shared online by the UN Children’s Fund (UNICEF). “My heart was pounding. I was crying in fear.”

Al Jazeera’s Bernard Smith, reporting from the Lebanese capital, noted that the vast majority of people who have been displaced are not in public shelters but are sleeping anywhere that can provide some protection.

That includes abandoned buildings and schools, as well as makeshift tent encampments along Beirut’s Corniche, Smith said. “For those displaced, [there is] no education for the children, no chance to go home, and no chance to get life back to normal.”

Othman Belbeisi, the Middle East and North Africa director at the International Organization for Migration (IOM), said resources are limited as humanitarian agencies and the Lebanese authorities try to respond to the crisis.

“What we are seeing is that safe areas are becoming less [safe] … and more people are displaced in the streets,” Belbeisi told Al Jazeera on Wednesday.

“Many of the displaced families left only with their clothes [on their backs],” he said. “They left everything at home; they ran out for their lives. There is fear and a high level of uncertainty.”



Source link

How to transfer photos from your phone to a hard drive

0

NEWYou can now listen to Fox News articles!

If you own a smartphone, this moment eventually arrives. A warning pops up saying your storage is almost full. Photos stop syncing. Apps slow down. Suddenly, you are deleting emails, clearing messages and searching for anything that will free up space.

Many people hit this problem because their photos automatically back up to services like Google Photos or iCloud. Those services include a limited amount of free storage. Once it fills up, the solution is usually the same. Pay for more space.

Janice from Alabama recently wrote to us about this exact situation.

“My Google storage of 15 GB is almost used up, according to Google. I need to get my photos off my phone. How can I do this and keep access to them? I don’t want to delete them. I continually empty trash, delete emails, etc. I understand that this is a common problem with Google users on Android phones. Their answer is to purchase more storage space. I don’t appreciate being held hostage by Google. Any suggestions?” 

— Janice in Sylacauga, Alabama

Janice is far from alone. Millions of smartphone users face the same choice every year. Either pay monthly for more storage or move their photos somewhere else. The good news is that you can store your photos on a hard drive you own, keep access to them anytime and avoid ongoing subscription fees. Let’s walk through the easiest ways to do it.

YOUR IPHONE HAS A HIDDEN FOLDER EATING UP STORAGE SPACE WITHOUT YOU EVEN KNOWING
 

An external hard drive is plugged into a MacBook with a camera lens sitting on the table next to it.

Smartphone users can free up storage by transferring photos to a computer and external hard drive instead of paying for more cloud space. (Yusuf Coskun via Getty Images)

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Method 1: Transfer photos from your phone to a computer

The simplest approach is to first copy your photos to a computer. After that, you can move them to an external hard drive.

For iPhones

Apple devices use a slightly different process. Instead of opening the phone like a storage device, you import photos through the Photos app on your computer.

On a Mac

  • Connect your iPhone to your Mac using a USB cable (Lightning or USB-C, depending on your iPhone model)
  • Unlock your iPhone if it is locked
  • If prompted, tap Trust This Computer on your iPhone
  • Open the Photos app on your Mac
  • Select your iPhone under Devices in the sidebar
  • Choose the photos or videos you want to transfer
  • Click Import Selected or Import All New Items

The photos will download to your Mac’s photo library.

Another option: Use iCloud Photos

If you are signed into iCloud and iCloud Photos is enabled on your iPhone, your photos may already be syncing automatically. In that case, you can simply open Photos on your Mac or visit iCloud Photos in a browser on your desktop to access and download them without connecting your phone.

HOW TO HIDE PHOTOS ON YOUR IPHONE AND ANDROID FROM SNOOPS
 

An external hard drive is plugged into a laptop with an SD card sticking out of its side.

With a USB cable and a hard drive, users can protect thousands of photos while reclaiming valuable phone storage. (Jun via Getty Images)

For Android phones

Settings may vary depending on your Android phone’s manufacturer

  • Connect your phone to your computer using a USB cable
  • On your phone, choose File Transfer when prompted
  • Open File Explorer on Windows or Finder on Mac
  • Locate your phone under connected devices
  • Open the DCIM or Pictures folder
  • Copy the photos you want to save

Once copied, paste the files into a folder on your computer. This step gives you a full backup before moving them to a drive.

On Windows

  • Connect your iPhone with a USB cable
  • Unlock your phone and tap Trust This Computer
  • Open the Photos app on Windows
  • Choose Import from a USB device

Windows will copy your photos directly to your computer.

Method 2: Move the photos to an external hard drive

Once your photos are on your computer, transferring them to a hard drive is quick.

  • Plug your external hard drive into your computer
  • Open the drive in Finder or File Explorer
  • Drag your photo folder onto the drive
  • Wait for the files to finish copying

Now your photos are stored safely on a device you control. External drives can hold tens of thousands of photos, depending on the size of the drive. Check out our best external drives article at Cyberguy.com.

BEST WAYS TO SAVE YOUR PHONE’S PHOTOS BEFORE IT’S TOO LATE
 

Two phones are plugged into a laptop through a splitter.

Moving photos from an iPhone or Android device to a hard drive helps preserve memories without ongoing subscription fees. (Lea Suzuki/The San Francisco Chronicle via Getty Images)

Method 3: Transfer photos directly to a USB flash drive

If you prefer skipping the computer, some flash drives plug directly into smartphones. These drives typically include:

  • USB-C connectors for Android phones
  • Lightning connectors for older iPhones
  • USB-C connectors for iPhone 15 and newer models

After connecting the drive, open the companion app that comes with it. From there, you can move photos directly from your phone to the drive. This option works well when you need to free up space quickly. Be sure to explore our best flash drive recommendations at Cyberguy.com.

Method 4: Keep your photos organized

After transferring photos to a hard drive, spend a few minutes organizing them.

Create folders by:

Hard drives are reliable, but keeping a second backup ensures your memories stay protected if one drive ever fails. 

Why this approach saves money

Cloud storage can feel inexpensive at first. Over time, the monthly charges add up. An external hard drive often costs less than a year or two of cloud storage fees. After that, the storage is essentially free. Even better, your photos stay under your control rather than sitting only on a company server.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Janice asked a question many people quietly wonder about. Do we really need to keep paying companies just to store our own memories? Fortunately, the answer is no. With a simple cable and an affordable hard drive, you can free up phone storage, keep every photo you want and avoid ongoing storage fees. Once you try it, the process becomes fast and routine.

So here is something worth thinking about. If your phone holds years of photos and videos, should those memories live only on a company’s cloud server or somewhere you fully control? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com. All rights reserved.



Source link

Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes

0

Ravie LakshmananMar 11, 2026Artificial Intelligence / Browser Security

Agentic web browsers that leverage artificial intelligence (AI) capabilities to autonomously execute actions across multiple websites on behalf of a user could be trained and tricked into falling prey to phishing and scam traps.

The attack, at its core, takes advantage of AI browsers’ tendency to reason their actions and use it against the model itself to lower their security guardrails, Guardio said in a report shared with The Hacker News ahead of publication.

“The AI now operates in real time, inside messy and dynamic pages, while continuously requesting information, making decisions, and narrating its actions along the way. Well, ‘narrating’ is quite an understatement – It blabbers, and way too much!,” security researcher Shaked Chen said.

“This is what we call Agentic Blabbering: the AI Browser exposing what it sees, what it believes is happening, what it plans to do next, and what signals it considers suspicious or safe.”

By intercepting this traffic between the browser and the AI services running on the vendor’s servers and feeding it as input to a Generative Adversarial Network (GAN), Guardio said it was able to make Perplexity’s Comet AI browser fall victim to a phishing scam in under four minutes.

The research builds on prior techniques like VibeScamming and Scamlexity, which found that vibe-coding platforms and AI browsers could be coaxed into generating scam pages or carrying out malicious actions via hidden prompt injections. In other words, with the AI agent handling the tasks without constant human supervision, there arises a shift in the attack surface wherein a scam no longer has to deceive a user. Rather, it aims to trick the AI model itself.

“If you can observe what the agent flags as suspicious, hesitates on, and more importantly, what it thinks and blabbers about the page, you can use that as a training signal,” Chen explained. “The scam evolves until the AI Browser reliably walks into the trap another AI set for it.”

The idea, in a nutshell, is to build a “scamming machine” that iteratively optimizes and regenerates a phishing page until the agentic browser stops complaining and proceeds to carry out the threat actor’s bidding, such as entering a victim’s credentials on a bogus web page designed for carrying out a refund scam.

What makes this attack interesting and dangerous is that once the fraudster iterates on a web page until it works against a specific AI browser, it works on all users who rely on the same agent. Put differently, the target has shifted from the human user to the AI browser.

“This reveals the unfortunate near future we are facing: scams will not just be launched and adjusted in the wild, they will be trained offline, against the exact model millions rely on, until they work flawlessly on first contact,” Guardio said. “Because when your AI Browser explains why it stopped, it teaches attackers how to bypass it.”

The disclosure comes as Trail of Bits demonstrated four prompt injection techniques against the Comet browser to extract users’ private information from services like Gmail by exploiting the browser’s AI assistant and exfiltrating the data to an attacker’s server when the user asks to summarize a web page under their control.

Last week, Zenity Labs also detailed two zero-click attacks affecting Perplexity’s Comet that use indirect prompt injection seeded within meeting invites to exfiltrate local files to an external server (aka PerplexedComet) or hijack a user’s 1Password account if the password manager extension is installed and unlocked. The issues, collectively codenamed PerplexedBrowser, have since been addressed by the AI company.

This is achieved by means of a prompt injection technique referred to as intent collision, which occurs “when the agent merges a benign user request with attacker-controlled instructions from untrusted web data into a single execution plan, without a reliable way to distinguish between the two,” security researcher Stav Cohen said.

Prompt injection attacks remain a fundamental security challenge for large language models (LLMs) and for integrating them into organizational workflows, largely because completely eliminating these vulnerabilities may not be feasible. In December 2025, OpenAI noted that such weaknesses are “unlikely to ever” be fully resolved in agentic browsers, although the associated risks could be reduced through automated attack discovery, adversarial training, and new system-level safeguards.



Source link

Bangladesh demolish Pakistan who suffer record low score in contest | Cricket News

0

Pakistan bowled out for the lowest total in a match against Bangladesh as the latter claim 8-wicket win to open series.

Bangladesh pace sensation Nahid Rana claimed his first five-wicket haul in one-day internationals to lead his team to a crushing eight-wicket win over Pakistan in the opening match of their bilateral series.

Rana returned figures of 5-24 to skittle out Pakistan for 114, a total Bangladesh overhauled in 15.1 overs of Wednesday’s 50-over contest in Mirpur to take a 1-0 lead in the three-match series.

Recommended Stories

list of 3 itemsend of list

Opener Tanzid Hasan hammered an unbeaten 67 off 42 balls and put on a second-wicket partnership of 82 with Najmul Hossain Shanto, who made 27, in a statement win.

Saif Hassan fell early for four, while Litton Das remained unbeaten on three with Tanzid.

Earlier, Nahid laid the platform for victory with his outstanding spell in his seven overs to bowl out Pakistan for their lowest ODI total against Bangladesh, eclipsing the previous 161 during the 1999 World Cup.

The 23-year-old Nahid ripped through Pakistan’s top order, becoming the first Bangladeshi bowler to dismiss the opposition’s top five batters in an ODI innings.

Nahid removed Sahibzada Farhan (27), Shamyl Hussain (4), Maaz Sadaqat (18), Mohammad Rizwan (10) and Salman Agha (5) as Pakistan slumped to 69-5.

He was ably supported by captain Mehidy Hasan Miraz, who took 3-29 with his off-spin.

Senior quicks Taskin Ahmed and Mustafizur Rahman took one wicket each.

Number eight Faheem Ashraf offered brief resistance with his 37 before being dismissed by Mustafizur as Pakistan were eventually bowled out in 30.4 overs.

The performance marked a breakthrough in Nahid’s young ODI career since his debut in 2024.

He had taken only five wickets in his first five matches before producing the five-wicket haul in his sixth appearance.

Nahid is now only the second Bangladeshi bowler to take a five-wicket haul against Pakistan in ODIs after Mustafizur’s 5-75 during the 2019 World Cup.



Source link

Maxx Crosby’s agent disputes medical concerns after Ravens trade falls through

0

NEWYou can now listen to Fox News articles!

The blockbuster trade for veteran NFL pass rusher Maxx Crosby unraveled almost as quickly as it materialized Tuesday, after reports surfaced that the Baltimore Ravens backed out when the Las Vegas Raiders star failed his physical.

But Crosby’s agent issued a statement after the Raiders’ confirmation suggesting otherwise. 

Las Vegas Raiders defensive end Maxx Crosby yelling on the field during a game.

Las Vegas Raiders defensive end Maxx Crosby yells during the second half of an NFL game against the Pittsburgh Steelers in Las Vegas on Oct. 13, 2024. (David Becker/AP)

CJ LaBoy, senior vice president at Wasserman, posted a statement on X stating that Crosby is “ahead of schedule” in his recovery process and is currently on track to return during the offseason. 

CLICK HERE FOR MORE SPORTS COVERAGE ON FOXNEWS.COM

“Maxx continues to be on track in his recovery and if anything is ahead of schedule according to his surgeon Dr Neal El Attrache,” LaBoy’s statement read.  “Maxx remains on track to return during the offseason program & will undoubtedly return as the dominant game wrecker he has been these past 7 seasons.” 

Crosby underwent surgery in January to repair a torn meniscus in his left knee, an injury that kept him sidelined during the final two games of the season. During an appearance on FOX Sports’ “The Herd with Colin Cowherd,” Crosby said he was “ahead of schedule,” a sentiment his agent echoed on Tuesday. 

Maxx Crosby on the sideline vs the Bears

Las Vegas Raiders defensive end Maxx Crosby (98) looks on from the sideline during the first quarter against the Chicago Bears at Allegiant Stadium on Sept. 28, 2025. (Kiyoshi Mio/Imagn Images)

RAVENS AGREE TO DEAL WITH STAR DEFENSIVE END TREY HENDRICKSON AFTER MAXX CROSBY DEAL COLLAPSES: REPORT

Crosby had posted a video on his Instagram story showing he was in Baltimore just hours before the news broke of the trade falling apart. The Raiders would have received two first-round picks from the Ravens, including the No. 14 overall pick in next month’s NFL Draft, one report said.

The collapse of the deal carries salary cap consequences for the Raiders, who are having a busy free agency season.

Trey Hendrickson looks on

Cincinnati Bengals defensive end Trey Hendrickson (91) watches a replay as the Detroit Lions celebrate a touchdown in the fourth quarter of the Week 5 NFL game between the Cincinnati Bengals and the Detroit Lions at Paycor Stadium. The Bengals continued a losing streak, falling 37-24 to the Lions in Cincinnati, Ohio, on Oct. 5, 2025. (Sam Greene/The Enquirer / USA TODAY NETWORK via Imagn Images)

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Meanwhile, the Ravens reportedly struck a deal with defensive end Trey Hendrickson hours after the news broke about the Crosby fallout. The deal is reportedly a four-year contract worth $112 million and will keep Hendrickson in the division. 

Follow Fox News Digital’s sports coverage on X, and subscribe to the Fox News Sports Huddle newsletter.



Source link

LIVE: Real Madrid vs Manchester City – Champions League last 16 | Football News

0



Source link

Tiffany Henyard runs for Georgia office as a Republican

0

NEWYou can now listen to Fox News articles!

The former embattled Democratic mayor of a Chicago suburb is running for a seat in Georgia as a Republican after relocating to the area following her scandal-plagued tenure in office. 

Tiffany Henyard, who once declared herself a “super mayor,” is the lone GOP candidate for South Fulton County’s District 5 on the Fulton County Commission, according to election records

She is facing off against four Democratic opponents. 

Henyard has a contentious political history. She made national headlines in 2024 after officials in her administration were served with subpoenas from the FBI in response to an alleged corruption investigation. 

‘SUPER MAYOR’ TIFFANY HENYARD SKIPS DOLTON MEETINGS AS CONTROVERSIAL TENURE NEARS QUIET END

Tiffany Henyard

Tiffany Henyard, the former “super mayor” of Dolton, Illinois, is running for a commissioner seat in Fulton County, Georgia as a Republican. (Fox 32)

She was never charged. 

While serving as the mayor of Dolton, Illinois, she came under fire over corruption allegations and financial mismanagement of village funds. 

A financial probe reportedly revealed that the village of Dolton’s bank account fell from its initial $5.6 million balance to a $3.6 million deficit.

While mayor, the village was delinquent in filing annual financial reports and audits with the state comptroller’s office.

Amid corruption allegations among officials, residents accused her of using village funds as her own piggy bank by billing taxpayers thousands of dollars for her hair and makeup team, as well as going on a lavish trip to Las Vegas.

FEDS SUBPOENA DOLTON, ILLINOIS RECORDS TIED TO OUSTED ‘SUPER MAYOR’ TIFFANY HENYARD’S BOYFRIEND

Tiffany Henyard speaks to her constituents.

Tiffany Henyard speaks at a meeting during her time as mayor. (Fox 32 Chicago)

After losing her re-election bid, she was ordered to pay $10,000 stemming from a case in which her landlord accused Henyard and her former boyfriend of failing to pay rent for a home she lived in while serving as mayor. 

In 2025, she was ordered to appear in court after failing to turn over public records from her time in office. 

Critics dubbed Henyard the “worst mayor in America.” She was heavily criticized over allegations related to an alleged sexual assault by one of her allies during the Las Vegas trip. The alleged victim claimed to have been fired after speaking out. 

Henyard also served as supervisor for Thornton Township, one of the 29 townships in Cook County, Illinois. She was defeated in her re-election bid by Illinois state Senator Napoleon Harris.

CLICK HERE TO GET THE FOX NEWS APP

In January 2025, Henyard was seen on video jumping into a chaotic brawl that broke out between her boyfriend and an activist who called her a “b—-” during a heated Thornton Township Board of Trustees meeting.

Fox News Digital has reached out to Henyard for comment. 

Fox News Digital’s Michael Dorgan and Julia Bonavita contributed to this report. 



Source link

Meta, cops deploy AI and handcuffs in scam crackdown • The Register

0

Not every scam starts with malware or a compromised account. Sometimes all it takes is a friend request or a link shared via chat.

Meta, in an effort to protect people from fraudsters, added anti-scam tools to WhatsApp, Facebook, and Messenger, including device linking warnings on WhatsApp and alerts for suspicious friend requests on Facebook, the social media giant said on Wednesday.

Plus, in a joint effort with law enforcement, international cops disrupted major scam centers targeting victims around the globe and arrested 21 alleged fraudsters, while Meta disabled more than 150,000 social media accounts linked to scam center networks.

As part of the tech company’s fraud crackdown, WhatsApp, we’re told, will now alert users when behavioral signals suggest a device-linking request may be an attempt to link a scammer’s device to the user’s account.

“For example, they may urge you to share your phone number, followed by a device linking code on your WhatsApp or try to trick you into scanning a QR code under false pretenses, which would then link the scammer’s device to your account,” Meta said in announcing the new feature.

Access to a user’s WhatsApp account allows miscreants to read victims’ messages, reply to them – and start new chats – while posing as the legitimate user, view contacts and photos, and in some cases, compromise other services such as Facebook or Instagram.

Facebook is also testing an alert system that warns users when a friend request shows signs of suspicious activity – for example, you don’t have any mutual friends, they just joined the platform days before sending a friend request, or their posts indicate a different country location than their profile info.

Messenger will also add advanced scam detection to users in more countries this month. This includes a feature that detects scam patterns in chats – such as celebrity impersonation images or links leading to spoofed webpages – and then asks users if they’d like to have a scam-detecting AI review the messages.

“Our experts and specialists in combating scams built advanced AI systems that can analyze multiple signals – such as text, images, and the surrounding context; consequently this assists us in spotting a broader range of more sophisticated scam patterns faster and at scale,” according to Meta.

These anti-scam features are part of the company’s ongoing efforts to disrupt fraud, and in a related announcement on Wednesday, the social media behemoth said that it partnered with the FBI, the US Department of Justice’s Scam Center Strike Force, the Royal Thai Police, and other international law enforcement agencies to take down scam centers in Southeast Asia targeting users in the US, UK, and countries across Asia and the Pacific region.

“This operation is a testament to how sharing information and coordinating our efforts can make real progress in disrupting this criminal activity at its source,” Chris Sonderby, Meta VP and deputy general counsel, said in announcing the disruption.

A similar operation in December resulted in the removal of 59,000 accounts, pages, and groups from Meta’s platforms and six arrest warrants.

Earlier this month, the Netherlands’ intelligence and military security agencies warned that Russian-linked hackers were actively targeting WhatsApp and Signal accounts used by government officials, journalists, and military personnel worldwide by tricking users into linking attackers’ devices to their accounts and persuading targets to share security verification codes or PINs. ®



Source link