Reading view
Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now
I walked 3,000 steps with my Apple Watch, Google Pixel, and Oura Ring - this tracker was most accurate
How I check, test, and charge my AA and AAA batteries - and sift out defective ones
GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
CPUID site hijacked to serve malware instead of HWMonitor downloads
Six-hour breach turned trusted links into a coin toss between legit tools and credential stealers
Visitors to the CPUID website were briefly exposed to malware this week after attackers hijacked part of its backend, turning trusted download links into a delivery mechanism for something far less welcome.…
AirDrop is coming to older Samsung phones - is yours supported? How to get it early
Project Glasswing and open source software: The good, the bad, and the ugly
Just what FOSS developers need – a flood of AI-discovered vulnerabilities
Opinion Anthropic describes Project Glasswing as a coalition of tech giants committing $100 million in AI resources to hunt down and fix long-hidden vulnerabilities in critical open source software that it's finding with its new Mythos AI program. Or as The Reg put it, "an AI model that can generate zero-day vulnerabilities."…
Britain seeks views before it drops the hammer on signal jammers
Four-week call for evidence intended to help shape laws aimed at devices linked to crime
The UK government is seeking views on radiofrequency jammers as it prepares legislation to ban the controversial devices.…
The best data removal services of 2026: Expert tested and reviewed
I'm no longer using Google Photos as just a cloud storage - 5 tools that elevate the app
Browser Extensions Are the New AI Consumption Channel That No One Is Talking About
Taiwanese Prosecutors Seize $6.6M in Assets from Incognito Market Admin "Pharoah" (Lin Rui-siang)
Taiwanese authorities have seized over NT$200 million ($6.67 million USD) in real estate and bank savings from 24-year-old Lin Rui-siang, the alleged mastermind behind the Incognito Market.
Lin, who operated under the alias "Pharoah," was arrested by the FBI at JFK Airport in May 2024 while in transit from Saint Lucia to Singapore. The seizure follows his December 2024 guilty plea in a U.S. court for narcotics conspiracy, money laundering, and selling adulterated medication.
[link] [comments]
Static analysis of iOS App Store binaries: common vulnerabilities I keep finding after 15 years in mobile security
I've been doing iOS security assessments professionally for about 15 years — banking apps, fintech, enterprise platforms. Over that time, certain patterns keep showing up in production App Store binaries. Figured it's worth sharing what I see most frequently, since many iOS developers seem genuinely unaware these issues exist.
What keeps showing up:
The most common finding is hardcoded secrets in the binary — API keys, backend URLs, authentication tokens sitting right there in plaintext strings. Developers assume compilation somehow obscures these. It doesn't. Extracting them is trivial with standard tooling.
Insecure local data storage is a close second. UserDefaults for sensitive data, unprotected Core Data databases, plist files with session tokens. On a jailbroken device (or via backup extraction on a non-jailbroken one), all of this is readable.
Weak or misconfigured encryption comes third. I regularly find apps that import CryptoKit or CommonCrypto but use ECB mode, hardcoded IVs, or derive keys from predictable inputs. The encryption is technically present but functionally useless.
Then there's the network layer: disabled ATS exceptions, certificate pinning that's implemented but trivially bypassable, and HTTP endpoints mixed with HTTPS.
Methodology:
Most of this comes from static analysis — no runtime instrumentation needed. Download the IPA, unpack, run string extraction, inspect the Mach-O binary, check plist configurations, review embedded frameworks. You'd be surprised how much is visible before you even launch the app.
I've built custom tooling for this over the years that automates the initial triage across ~47 check categories. Happy to discuss methodology or specific techniques in comments.
I've also been running a monthly live session ("iOS App Autopsy") where I walk through this process on real apps — follow the link if interested.
[link] [comments]
The best Samsung TVs of 2026: Expert tested and reviewed
The best mobile scanning apps of 2026: Expert tested and reviewed
The best HP laptops of 2026: Expert tested and reviewed
Unpacking AI security in 2026 from experimentation to the agentic era
Cut through the noise and understand the real risks, responsibilities, and responses shaping enterprise AI today.
Webinar Promo 2025 was the year of AI experimentation. In 2026, the bills are coming due. AI adoption has moved from isolated pilots to autonomous, enterprise wide deployment, bringing with it a sophisticated new generation of security challenges.…
Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows
Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure