FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Today β€” February 18th 2026Your RSS feeds

Why your EV's battery will outlive your phone's battery - and by how much

Electric car batteries are surprisingly robust, and mileage is not a good indicator of battery wear, according to a new study.

Get the new Google Pixel 10a for $4/month at AT&T (plus free Pixel Buds)

The Google Pixel 10a is available for preorder now, and AT&T is offering savings plus a free gift if you order online.

Fraudster hacked hotel system, paid 1 cent for luxury rooms, Spanish cops say

'First time we have detected a crime using this method,' cops say

Spanish police arrested a hacker who allegedly manipulated a hotel booking website, allowing him to pay one cent for luxury hotel stays. He also raided the mini-bars and didn't settle some of those tabs, police say.…

Want to develop your Linux skills? I've found the perfect distro for you

Neither point-and-click simple like Mint nor grueling like Gentoo, NuTyx delivers the sweet spot for anyone who wants a better understanding of Linux systems.

How to FaceTime on Android or your PC - no app needed

Did you know that anyone can join a FaceTime call? It's as simple as clicking on a link.

This local AI quickly replaced Ollama on my Mac - here's why

If you're going to use AI, running it locally is the way to go, and GPT4All makes is surprisingly easy.

Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody

New research from the Citizen Lab has found signs that Kenyan authorities used a commercial forensic extraction tool manufactured by Israeli company Cellebrite to break into a prominent dissident's phone, making it the latest case of abuse of the technology targeting civil society. The interdisciplinary research unit at the University of Toronto's Munk School of Global Affairs & Public

Texas sues TP-Link over China links and security vulnerabilities

State disputes the company's claim that its routers are made in Vietnam

TP-Link is facing legal action from the state of Texas for allegedly misleading consumers with "Made in Vietnam" claims despite China-dominated manufacturing and supply chains, and for marketing its devices as secure despite reported firmware vulnerabilities exploited by Chinese state-sponsored actors.…

A Vast Trove of Exposed Social Security Numbers May Put Millions at Risk of Identity Theft

A database left accessible to anyone online contained billions of records, including sensitive personal data that criminals appear to have not yet exploited.

We ran battery tests on 17 phones - this model lasted the longest

For ZDNET's latest Lab Award, we tested the best phones to find out which one had the best battery life over time.

Deutsche Bahn back on track after DDoS yanks the brakes

National rail bookings and timetables disrupted for nearly 24 hours

If you wanted to book a train trip in Germany recently, you would have been out of luck. The country's national rail company says that its services were disrupted for hours because of a cyberattack.…

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

Cybersecurity researchers have disclosed a critical security flaw in the Grandstream GXP1600 series of VoIP phones that could allow an attacker to seize control of susceptible devices. The vulnerability, tracked as CVE-2026-2329, carries a CVSS score of 9.3 out of a maximum of 10.0. It has been described as a case of unauthenticated stack-based buffer overflow that could result in remote code

I can use this laser tape measure in places I didn't think possible (and it's on sale)

The Mileseey Xtape1 is a full-on laser-enabled measuring computer.

Inside Google's AI plan to end Android developer toil - and speed up innovation

I spoke with Sam Bright, VP and GM of Google Play and Developer Ecosystem, about how Gemini's expansion in Android Studio can help human devs do more faster - and better.

The Pixel 10a is the midrange phone to beat this year, starting at $499

The Pixel 10a arrives with a flatter design, new camera tricks, and satellite emergency support.

My 6 favorite DNS services - and why they're a must for security

I've tested many DNS services over the years. These are the ones I actually trust to help me stay private online.

Your AI-generated password isn't random, it just looks that way

Seemingly complex strings are actually highly predictable, crackable within hours

Generative AI tools are surprisingly poor at suggesting strong passwords, experts say.…

Audible's new Read & Listen tool can double the number of books you finish - here's how

In addition to listening to books, you can now also read them on the Audible app.

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

Cybersecurity researchers have disclosed multiple security vulnerabilities in four popular Microsoft Visual Studio Code (VS Code) extensions that, if successfully exploited, could allow threat actors to steal local files and execute code remotely. The extensions, which have been collectively installed more than 125 million times, are Live Server, Code Runner, Markdown Preview Enhanced, and

Notepad++ declares hardened update process 'effectively unexploitable'

Miscreants will need to find another avenue for malware shenanigans

Notepad++ has continued beefing up security with a release the project's author claims makes the "update process robust and effectively unexploitable."…

You can jailbreak an F-35 just like an iPhone, says Dutch defense chief

No worries if the US doesn't want to be friends with Europe anymore

Lockheed Martin's F-35 fighter aircraft can be jailbroken "just like an iPhone," the Netherlands' defense secretary has claimed.…

Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability

By: Unknown
In 2025, navigating the digital seas still felt like a matter of direction. Organizations charted routes, watched the horizon, and adjusted course to reach safe harbors of resilience, trust, and compliance. In 2026, the seas are no longer calm between storms. Cybersecurity now unfolds in a state ofΒ continuous atmospheric instability: AI-driven threats that adapt in real time, expanding

HackerOne 'updating' Ts&Cs after bug hunters question if they're training AI

CEO lauds security researchers, insists they're not 'inputs'

HackerOne has clarified its stance on GenAI after researchers fretted their submissions were being used to train its models.…

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

A maximum severity security vulnerability in Dell RecoverPoint for Virtual Machines has been exploited as a zero-day by a suspected China-nexus threat cluster dubbed UNC6201 since mid-2024, according to a new report from Google Mandiant and Google Threat Intelligence Group (GTIG). The activity involves the exploitation of CVE-2026-22769 (CVSS score: 10.0), a case of hard-coded credentials

3 Ways to Start Your Intelligent Workflow Program

By: Unknown
Security, IT, and engineering teams today are under relentless pressure to accelerate outcomes, cut operational drag, and unlock the full potential of AI and automation. But simply investing in tools isn’t enough. 88% of AI proofs-of-concept never make it to production, even though 70% of workers cite freeing time for high-value work as the primary AI automation motivation. Real impact comes

90% of AI projects fail - here are 3 ways to ensure yours doesn't

With AI spending forecast to reach $2.52 trillion in 2026, Gartner recommends focusing on building capacity, creating partnerships and avoiding random exploration.

Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism to selectively deliver malware to targets of interest. The version 8.9.2 update incorporates what maintainer Don Ho calls a "double lock" design that aims to make the update process "robust and effectively unexploitable." This includes verification

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows - CVE-2026-2441 (CVSS score: 8.8) - A use-after-free vulnerability in Google Chrome that could allow a remote attacker to potentially exploit heap

Palo Alto CEO says AI isn’t great for business, yet

Sees little enterprise AI adoption other than coding assistants, buys Koi for what comes next

If enterprises are implementing AI, they’re not showing it to Palo Alto Networks CEO Nikesh Arora, who on Tuesday said business adoption of the tech lags consumer take-up by at least a couple of years – except for coding assistants.…

These slick desktop speakers sound as good as they look (and the price is right)

The Edifier QR65 desktop speakers have some surprisingly immersive audio - made better by their approachable price point.

Is it OK to let your children post selfies online?

When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech.

This solar Bluetooth speaker solved my biggest issue with backyard entertaining

With 'infinite' battery life and booming audio, the Lodge Solar Speaker 4 Series 2 is my new favorite party guest.

Forget Apple's pricey Thunderbolt 5 cables - I found a quality one for $40

The Satechi Thunderbolt 5 Pro cable is a fantastic cable at a palatable price.

5 Android browsers I prefer over Chrome - and why they're worth trying

If you're tired of the default Android browser, here are five top picks I always recommend.

I let Chrome's AI agent shop, research, and email for me - here's how it went

With Auto Browse, Google is turning Chrome into an AI-agentic browser. I tested it to see how well it works.

What Aristotle and Socrates can teach us about using generative AI

A senior Google engineer reminds us that AI models should help us learn how to think, not what to think.

China-linked snoops have been exploiting Dell 0-day since mid-2024, using 'ghost NICs' to avoid detection

Full scale of infections remains 'unknown'

China-linked attackers exploited a maximum-severity hardcoded-credential bug in Dell RecoverPoint for Virtual Machines as a zero-day since at least mid-2024. It's all part of a long-running effort to backdoor infected machines for long-term access, according to Google's Mandiant incident response team.…

Why these budget headphones still have bomb ANC - nearly 3 years later

The Soundcore Space One headphones are great if you want premium features without spending a lot. Right now, they're on sale for $80.
Yesterday β€” February 17th 2026Your RSS feeds

China remains embedded in US energy networks 'for the purpose of taking it down'

Plus 3 new goon squads targeted critical infrastructure last year

Three new threat groups began targeting critical infrastructure last year, while a well-known Beijing-backed crew - Volt Typhoon - continued to compromise cellular gateways and routers, and then break into US electric, oil, and gas companies in 2025, according to Dragos' annual threat report published on Tuesday.…

Kraken Darknet Access via Clearnet Gateways – some observations

I’ve been looking at a clearnet CAPTCHA gated login surface that appears to act as an entry point into Kraken, a Russian language darknet marketplace that operates on Tor.

Visually, the clearnet and onion login pages are nearly identical, but the interesting part is the backend behavior. Credentials are submitted to clearnet endpoints first, followed by background requests that appear to handle routing and session binding to specific onion backends. Cookie telemetry includes Tor aware parameters (onion server IDs, routing identifiers, proxy session values), which suggests the clearnet layer is doing more than just static redirection.

submitted by /u/anuraggawande
[link] [comments]

Samsung Weather widget ships hardcoded shared IBM API keys + persistent user ID, sends precise GPS every 15-30 min

While analyzing network traffic from Samsung devices, I found the built-in Weather widget silently sending precise GPS coordinates to IBM’s api.weather.com β€” with a persistent user identifier and a hardcoded API key baked into the app.

Findings from 34 Samsung devices observed over 3 days:

- 2 hardcoded IBM Weather Company API keys shared across all devices (~6,000 requests captured)

- Precise lat/long (~100m accuracy) sent as URL parameters every 15-30 min

- Persistent device ID sent with every request β€” IBM can build longitudinal location profiles across sessions, days, weeks

- 4 Samsung services involved: `par=samsung_widget`, `par=samsung_pn`, `par=samsung_radar`, `par=samsung_notifications`

- One device made 1,740 requests in 3 days β€” enough for IBM to reconstruct where the user sleeps, works, and travels

Two real problems: Samsung sends a persistent device ID, letting IBM build your location profile over time. And you never opted in β€” it’s a pre-installed system app most users don’t know is running and can’t easily remove.

Verify the key is live yourself:

curl "https://api.weather.com/v3/wx/observations/current?geocode=40.71,-74.01&language=en-US&units=e&format=json&apiKey=793db2b6128c4bc2bdb2b6128c0bc230"

For context β€” in 2019, LA sued The Weather Channel app for secretly mining user geolocation for advertising. IBM settled. Samsung is now funneling the same type of data into the same IBM infrastructure via a pre-installed system app on ~260M devices shipped per year.

submitted by /u/AdTemporary2475
[link] [comments]

Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can be turned into stealthy command-and-control (C2) relays, a technique that could allow attackers to blend into legitimate enterprise communications and evade detection. The attack method, which has been demonstrated against Microsoft Copilot and xAI Grok

Claude Sonnet 4.6 delivers frontier-level AI for free and cheap-seat users

Anthropic is positioning Sonnet 4.6 as a practical daily driver. In many cases, it's even faster than Opus 4.6.

ChatGPT's new Lockdown Mode can stop prompt injection - here's how it works

OpenAI will now also display an Elevated Risk label when you access certain features that could be risky.

3 ways to switch Linux distros without losing all your data

If you're thinking about distro-hopping, and you're wanting to retain your data, here's how you can do it.

Looking for an Apple Watch charging solution? This keychain gadget saved me

The Scosche WatchIt keychain is perfect for those wanting to make sure their Apple Watch and AirPods are always charged.

Oura Ring vs. Apple Watch: Here's which health tracker is right for you

Still deciding whether to go with Oura's smart ring or an Apple Watch? I've tested them both - here's which you should buy.

How Nothing plans to crash Apple's March launch party

The company is set to unveil its Phone 4a one day after Apple's iPhone 17e event. Here's how to tune in.

These touchscreen gloves handle rain and cold - and fix my biggest issue with winter hikes

These Cross Point Gear Sports gloves are the best outdoor gloves with touchscreen support that I've used. I just wish I found them sooner.

Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates

A new Android backdoor that's embedded deep into the device firmware can silently harvest data and remotely control its behavior, according to new findings from Kaspersky. The Russian cybersecurity vendor said it discovered the backdoor, dubbed Keenadu, in the firmware of devices associated with various brands, including Alldocube, with the compromise occurring during the firmware build phase.

Apple's March event: Every Mac and iPad expected - and the biggest rumor you can ignore

Here's what the rumor mill says Apple will and won't reveal during its March 4 event.

This TCL mini-LED TV competes with pricey OLEDs - and the lab results back it up

We tested the TCL QM9K in the ZDNET lab, and found it to shine best after some out-of-the-box adjustments. Here's what we recommend.

5 custom ChatGPT instructions I use to get better AI results - faster

Want better ChatGPT responses? I use custom instructions to keep its answers tight and helpful. Here's how.

5 atomic Linux distros I trust for stress-free OS updates - and why

Atomic Linux distros keep updates from breaking your system. Here's how, and which ones I prefer.

US lawyers fire up privacy class action accusing Lenovo of bulk data transfers to China

Keep behavioral tracking American? PC giant says the claim is 'false'

A US law firm has accused Lenovo of violating Justice Department strictures about the bulk transfer of data to foreign adversaries, namely China.…

Polish cops nab 47-year-old man in Phobos ransomware raid

Police say seized kit contained logins, passwords, and server IP addresses

Polish police have arrested and charged a man over ties to the Phobos ransomware group following a property raid.…

❌