Author: admin

Ravie LakshmananMar 28, 2026Mobile Security / Email Security Proofpoint has disclosed details of a targeted email campaign in which threat actors with ties to Russia are leveraging the recently disclosed DarkSword exploit kit to target iOS devices. The activity has been attributed with high confidence to the Russian state-sponsored threat group known as TA446, which is also tracked by the broader cybersecurity community under the monikers Callisto, COLDRIVER, and Star Blizzard (formerly SEABORGIUM). It’s assessed to be affiliated with Russia’s Federal Security Service (FSB). The hacking group is known for spear-phishing campaigns aimed at harvesting credentials from targets of interest.…

Read More

Google’s entrance into AI was…interesting. Bard was, well, a mess and clearly a rushed response to ChatGPT. Now, I typically believe first impressions certainly can be the last impressions. I typically live by that in my personal life and it also extends to tech. However, and I don’t say this lightly, Google might be the single biggest exception to that rule. No, I’m not talking about how the company introduced AI overviews and killed publications and organic search. And no, I’m not referring to Gemini, which ended up being Bard’s replacement, even if it has a few genuinely impressive features.…

Read More

I write for a living, but I do it on my desktop. Well, mostly. I’ll admit that I still draft some parts of my work on Microsoft Word occasionally. I’m able to do it mostly because Google’s Gboard keyboard app still exists. It’s my default keyboard app on all my Android phones. I particularly love how Gboard gives me a second chance when I accidentally delete a line of text. A quick backspace swipe can erase more than what you wanted, but the undo option brings everything back, just like the Ctrl+z keyboard shortcut on my desktop. The swipe-and-undo setup…

Read More

The Alliance for Creativity and Entertainment (ACE) announced the shutdown of AnimePlay, a major anime streaming platform with over 5 million users. Backed by more than 50 major television networks and film studios, including Disney, Paramount, Sony Pictures, Warner Bros, Netflix, and Universal Pictures, ACE focuses on taking down illegal streaming services through civil litigation, criminal referrals, and cease-and-desist operations. In recent years, ACE targeted and dismantled a long string of other large-scale illegal streaming networks in joint operations with law enforcement. Most recently, in November 2025, it shut down Photocall, a massive TV piracy streaming platform with over 26…

Read More

Whether you’re planning a long day of travel or simply forgot to charge your phone overnight, there are situations where a portable power bank can be a game-changer. Most power banks solve the battery problem, but create a new one: bulk. Depending on the capacity you need, these can be heavy and inconvenient to carry around, and might not even be travel- or airline-friendly.That’s the concern INIU is addressing with its Pocket Rocket P50 power bank. It boasts a 10,000mAh capacity, weighs just 160 grams, and is small enough to comfortably slip into your pocket. And for its Spring Sale,…

Read More

One of the kernel exploits in the recently discovered iOS exploit kit Coruna is an updated version of an exploit used in Operation Triangulation over three years ago, Kaspersky reports. In mid-2023, Kaspersky revealed that the iOS devices of dozens of its senior employees had been compromised via zero-click iMessage attacks involving commercial spyware. Coruna, the nation-state-grade exploit kit detailed earlier this month, targets 23 vulnerabilities in iOS, including CVE-2023-32434 and CVE-2023-38606, two kernel bugs exploited in Operation Triangulation as zero-days. According to a fresh Kaspersky report, Coruna uses an updated version of the previously identified kernel exploit targeting these…

Read More

I find it satisfying to do a word puzzle (or three) each day. Wordle is great, but it’s not really exciting anymore. Crosswords are fun if you have the time (I love an NYT Thursday puzzle) but I don’t always bother. My sweet spot, lately, are games like Minute Cryptic and Parseword—which are entry points into the incredibly bizarre world of British “cryptic” crossword clues. What is a cryptic puzzle?Cryptics are a type of word puzzle unlike anything else. There exist whole crosswords full of them, but the daily puzzles I’m writing about are just one clue per day, so you…

Read More

Dealing with an older car’s infotainment system is incredibly frustrating. Whether it’s an ancient, basic stereo from the era of CDs or an early touchscreen setup, the lack of Android Auto severely limits what you can do with it. So, you’re probably thinking about upgrading to an aftermarket head unit, but you’ve heard mixed things about their quality and reliability. At the same time, you might not be able to justify spending hundreds of dollars on a brand-name Sony, Pioneer, or Kenwood unit. I had the same doubts, but after upgrading to a $100 Android model, it turned out to…

Read More

Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S. Federal Bureau of Investigation (FBI), and leaked a cache of photos and other documents to the internet. Handala Hack Team, which carried out the breach, said on its website that Patel “will now find his name among the list of successfully hacked victims.” In a statement shared with Reuters, the FBI confirmed Patel’s emails had been targeted, and noted necessary steps have been taken to “mitigate ​potential risks associated with this activity.” The agency also said the published data…

Read More

Tails 7.6 is out, and for users operating on networks that block Tor, the most consequential addition is built-in bridge retrieval. The Tor Connection assistant can now detect when a direct connection to Tor is restricted and automatically request bridges suited to the user’s region. The request goes through the Tor Project’s Moat API, and the connection to that API is disguised via domain fronting, making it appear as traffic to an ordinary website. Previously, users on censored networks had to obtain bridges manually and enter them by hand. The feature closes a long-standing gap in Tails’ censorship-circumvention capability. Users…

Read More