The Latest

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:

Week in review

United Airlines CISO on building resilience when disruption is inevitable
In this Help Net Security interview, Deneen DeFiore, VP and CISO at United Airlines, explains how the company approaches modernization without compromising safety-critical environments, why resilience and continuity matter as much as prevention, and how the airline manages risk across an interconnected ecosystem of vendors, partners, and infrastructure providers.

What happens when cybersecurity knowledge walks out the door
In this Help Net Security interview, Andrew Northern, Principal Security Researcher at Censys, explains why mentorship matters and what organizations risk losing when senior staff disengage. He argues that institutional memory and judgment under pressure are difficult to rebuild once they disappear.

Groupe Rocher CISO on strengthening a modern retail cybersecurity strategy
In this Help Net Security interview, Jérôme Etienne, Group CISO, Groupe Rocher shares practical insights on closing strategy gaps, managing third-party risk, and securing online and in-store environments. In the conversation, he also discusses why point-of-sale and in-store systems can no longer be treated as secondary security concerns, especially as attackers increasingly target overlooked technologies.

OpenClaw Scanner: Open-source tool detects autonomous AI agents
A new free, open source tool is available to help organizations detect where autonomous AI agents are operating across corporate environments. The OpenClaw Scanner identifies instances of OpenClaw, an autonomous AI assistant also known as MoltBot, that can execute tasks, access local files, and authenticate to internal systems without centralized oversight.

When security decisions come too late, and attackers know it
In this Help Net Security, Chris O’Ferrell, CEO at CodeHunter, talks about why malware keeps succeeding, where attackers insert malicious code in the SDLC, and how CI/CD pipelines can become a quiet entry point. He also breaks down the difference between behavioral detection and behavioral intent analysis, and why explainable results matter for security teams.

Edge computing’s biggest lie: “We’ll patch it later”
In this Help Net Security interview, Piotr Buliński, CTO of Qbee, digs into the edge equivalent of “snowflake servers,” why cloud habits break in the field, and what it takes to monitor and update fleets safely.

BeyondTrust fixes easy-to-exploit pre-auth RCE vulnerability in remote access tools (CVE-2026-1731)
BeyondTrust fixed a critical remote code execution vulnerability (CVE-2026-1731) in its Remote Support (RS) and Privileged Remote Access (PRA) solutions and is urging self-hosted customers to apply the patch as soon a possible. Unlike the Remote Support zero-day (CVE-2024-12356) that was flagged after having been exploited by China-nexus threat actors to breach the US Treasury Department in late 2024, this newest vulnerability was discovered and privately disclosed by a security researcher.

European Commission hit by cyberattackers targeting mobile management platform
The European Commission’s mobile device management platform was hacked but the incident was swiftly contained and no compromise of mobile devices was detected, EU’s executive branch announced on Friday. The intrusion was detected on January 30, 2026, by CERT-EU, the cybersecurity team protecting all European Union institutions, bodies, and agencies.

Ransomware group breached SmarterTools via flaw in its SmarterMail deployment
SmarterTools, the company behind the popular Microsoft Exchange alternative SmarterMail, has been breached by a ransomware-wielding group that leveraged a recently fixed vulnerability in that solution.

Unpatched SolarWinds WHD instances under active attack
Internet‑exposed and vulnerable SolarWinds Web Help Desk (WHD) instances are under attack by threat actors looking to gain an initial foothold into target organizations’ networks, Microsoft and Huntress researchers have warned.

Singapore telcos breached in China-linked cyber espionage campaign
Singapore’s four major telecommunications companies were hit by a coordinated cyber espionage campaign last year, the country’s Cyber Security Agency (CSA) has revealed. An advanced persistent threat group known as UNC3886 has probed deep into the networks of M1, SIMBA Telecom, Singtel, and StarHub, spurring Singapore’s security agencies to mount a large cyber defence operation.

Microsoft Patch Tuesday: 6 exploited zero-days fixed in February 2026
Microsoft has plugged 50+ security holes on February 2026 Patch Tuesday, including six zero-day vulnerabilities exploited by attackers in the wild. Among the zero-days fixed are three vulnerabilities that allow attackers to bypass a security feature.

Ivanti EPMM exploitation: Researchers warn of “sleeper” webshells
A massive wave of exploitation attempts has followed the disclosure of CVE-2026-1281, a critical pre-authentication Ivanti EPMM vulnerability, the Shadowserver Foundation has warned. Some of it is automated scanning for vulnerable systems, but according to Greynoise and Defused, a suspected initial access broker has been prepping unpatched instances with a “sleeper” webshell for follow-on exploitation by other threat actors.

Apple fixes zero-day flaw exploited in targeted attacks (CVE-2026-20700)
Apple has released fixes for a zero-day vulnerability (CVE-2026-20700) exploited in targeted attacks last year. CVE-2026-20700 is a memory corruption issue in dyld, the Dynamic Link Editor component of Apple’s operating systems, and may allow attackers with memory write capability to execute arbitrary code.

Windows Notepad Markdown feature opens door to RCE (CVE-2026-20841)
Among the many security fixes released by Microsoft on February 2026 Patch Tuesday is one for CVE-2026-20841, a command injection vulnerability in Notepad that could be exploited by attackers to achieve remote code execution on targets’ Windows system.

Hackers probe, exploit newly patched BeyondTrust RCE flaw (CVE-2026-1731)
Attackers are exploiting a recently patched critical vulnerability (CVE-2026-1731) in internet-facing BeyondTrust Remote Support and Privileged Remote Access instances.

How AI is reshaping attack path analysis
Attackers increasingly leverage AI to rapidly identify weaknesses and chain exploits, forcing defenders to keep pace by using AI to identify and stop those same weaknesses. However, security teams often struggle to determine what matters most, how it could realistically be exploited, and what to fix first.

Brutus: Open-source credential testing tool for offensive security
Brutus is an open-source, multi-protocol credential testing tool written in pure Go. Designed to replace legacy tools that have long frustrated penetration testers with dependency headaches and integration gaps, Brutus ships as a single binary with zero external dependencies and native support for the JSON-based reconnaissance pipelines that define offensive security.

AI-driven scams are eroding trust in calls, messages, and meetings
In this Help Net Security video, Miguel Fornés, Governance and Compliance Manager at Surfshark, discusses how AI is changing social engineering attacks. He describes how tasks that once took weeks, such as research and targeting, are now automated and cheap. This shift has lowered the skills and cost needed to run scams and phishing campaigns. Attackers use AI agents to gather open source data and hold live conversations with victims without human help.

Allama: Open-source AI security automation
Allama is an open-source security automation platform that lets teams build visual workflows for threat detection and response. It includes integrations with 80+ types of tools and services typical in security operations, including SIEM systems, endpoint detection and response products, identity providers, and ticketing systems.

TikTok under EU pressure to change its addictive algorithm
The European Commission has issued preliminary findings that say TikTok breaches the Digital Services Act due to its addictive design. The Commission opened a formal investigation into TikTok in February 2024. The probe examined whether the platform meets its obligations as a very large online platform under the Digital Services Act. These obligations include identifying risks linked to the service and taking steps to reduce them.

EU targets Meta over WhatsApp AI access restrictions
The European Commission believes Meta breached EU competition rules by blocking other AI assistants from accessing and interacting with users on WhatsApp.

Face scans and ID checks are coming to Discord
Discord users will soon see a change to how their accounts work. From early March 2026, access to some features will require age verification using an ID or a face scan. The changes follow earlier deployments in a small number of countries and will apply to both new and existing accounts.

DuckDuckGo enables AI voice chat without saving voice data
DuckDuckGo has added voice chat to Duck.ai, allowing users to speak to an AI assistant while keeping audio private, unrecorded, and excluded from AI training. Voice chat is available in the DuckDuckGo browser and most third-party browsers, with support for Mozilla listed as coming soon.

Trojanized 7-Zip downloads turn home computers into proxy nodes
A trojanized version of the popular 7-Zip software is quietly turning home computers into residential proxy nodes, Malwarebytes warns. Spurred by a Reddit post in which a user complained about getting infected with malware after downloading 7-Zip from 7zip[.]com instead of the legitimate 7-zip.org, Malwarebytes researchers looked into the matter and found that the malicious installer functions as 7-zip, but also silently drops additional payloads onto the system.

Microsoft tightens Windows security with app transparency and user consent
Microsoft is strengthening default protections in Windows through two security initiatives, Windows Baseline Security Mode and User Transparency and Consent. User Transparency and Consent introduces a structured approach to how Windows presents security decisions to users. The operating system will prompt users when applications request access to sensitive resources such as files, cameras, or microphones, and when installers attempt to add additional software.

That “summarize with AI” button might be manipulating you
Microsoft security researchers discovered a growing trend of AI memory poisoning attacks used for promotional purposes, referred to as AI Recommendation Poisoning.

Picking an AI red teaming vendor is getting harder
Vendor noise is already a problem in traditional security testing. AI red teaming has added another layer of confusion, with providers offering everything from consulting engagements to automated testing platforms. Many buyers still struggle to tell whether a vendor can test real-world AI system behavior or only run a packaged set of jailbreak prompts.

OpenVPN releases version 2.7.0 with expanded protocol and platform updates
OpenVPN version 2.7.0 is now available. The update advances support for multi-address server configurations and updates client functionality across operating systems. The release includes enhancements in data channel handling and support for evolving kernel and cryptographic components.

1Password open sources a benchmark to stop AI agents from leaking credentials
Research has shown that some AI models can identify phishing websites with near-perfect accuracy when asked. When those same models are used as autonomous agents with access to tools like email, web browsers, and password vaults, they can still carry out the scam. That gap is the focus of a new open source benchmark from 1Password called the Security Comprehension and Awareness Measure, or SCAM.

Police arrests distributor of JokerOTP password-stealing bot
The Dutch National Police arrested a 21-year-old man from Dordrecht as part of a cybercrime investigation by Team Cybercrime Oost-Brabant. The suspect is believed to have distributed a tool known as JokerOTP, a bot used to intercept one-time passwords (OTPs) used to secure online accounts and financial transactions.

Bitcoin trading firm CEO gets 20 years for operating $200 million Ponzi scheme
The U.S. Department of Justice sentenced the CEO of a multi level marketing and bitcoin trading firm to 20 years in prison after a conviction for wire fraud and money laundering tied to a large scale Ponzi scheme.

AI agents behave like users, but don’t follow the same rules
Security and governance approaches to autonomous AI agents rely on static credentials, inconsistent controls, and limited visibility. Securing these agents requires the same rigor and traceability applied to human users, according to Cloud Security Alliance’s Securing Autonomous AI Agents report.

OpenAI updates Europe privacy policy, adding new data categories
OpenAI has updated its Europe-facing privacy policy following the November 2024 EU revision, clarifying scope, expanding coverage, and detailing user controls. The updated document is longer, with dedicated sections for data controls and practical resources. It explains key controls and settings within the text, making available choices easier to understand without moving between documents.

Linux kernel 6.19 reaches stable release, kernel 7.0 work is already underway
Development activity on the Linux kernel continues into early 2026 with the stable release of version 6.19. Kernel maintainers have completed the pre-release cycle and merged the final set of changes into the mainline tree. The release follows the ongoing weekly rhythm of code submission and testing that supports Linux’s widespread use across servers, desktops, and embedded systems.

Security teams are paying for sprawl in more ways than one
Most enterprises run security programs across sprawling environments that include mobile devices, SaaS applications, cloud infrastructure, and telecom networks. Spend control in these areas often sits outside the security organization, even when the operational consequences land directly on security teams. Tangoe’s 2026 Trends & Savings Recommendations Report connects these cost domains to recurring governance failures that create risk exposure across identity, endpoint management, and infrastructure visibility.

Product showcase: PCAPdroid analyzes Android app network activity
PCAPdroid is a free, open-source Android app that allows inspection of network traffic. Installation is straightforward and does not require creating an account. To begin capturing traffic, a VPN request must be accepted, which allows the app to monitor network activity. Once permission is granted, tapping the play button starts PCAPdroid, which then runs in the background until stopped.

Zen-AI-Pentest: Open-source AI-powered penetration testing framework
Zen-AI-Pentest provides an open-source framework for scanning and exercising systems using a combination of autonomous agents and standard security utilities. The project aims to let users run an orchestrated sequence of reconnaissance, vulnerability scanning, exploitation, and reporting using AI guidance and industry tools like Nmap and Metasploit. It is written to support command line, API, and web interfaces.

Yubico previews passkey-enabled digital signatures in upcoming YubiKey 5.8 firmware
Yubico’s upcoming YubiKey 5.8 firmware introduces standardized APIs that integrate hardware-backed signatures with passkey authentication. To enable privacy-capable digital signatures using passkeys, expanded enterprise IdP support, and next-generation digital wallet use cases, the firmware adds support for FIDO CTAP 2.3 and preview WebAuthn signing extensions.

Google Search introduces new ways to remove sensitive personal information and explicit images
Google expanded its “Results about you” tool to give users more control over sensitive personal information and added a way to request removal of non-consensual explicit images from Search.

Microsoft begins Secure Boot certificate update for Windows devices
Microsoft has begun updating Secure Boot certificates originally issued in 2011 to ensure that Windows devices continue to verify boot software as older certificates reach the end of their lifecycle and begin expiring in June 2026.

Java security work is becoming a daily operational burden
Security teams in large enterprises already spend significant time tracking vulnerabilities across software supply chains, third-party libraries, and internal codebases. Java environments add another layer of exposure because so many mission-critical systems still run on the JVM.

Cloud teams are hitting maturity walls in governance, security, and AI use
Enterprise cloud programs have reached a point where most foundational services are already in place, and the daily work now centers on governance, security enforcement, and managing sprawl across environments. Hybrid and multi-cloud architectures have become routine in large organizations, bringing new operational pressures around consistency and control.

Microsoft Store updated with a new CLI, analytics, and Web Installer improvements
Microsoft has introduced new developer tools, updates to developer analytics, and a Web Installer in the Microsoft Store on Windows to help developers build and scale apps on the platform.

Attackers are moving at machine speed, defenders are still in meetings
Threat actors are using AI across the attack lifecycle, increasing speed, scale, and adaptability, according to the 2026 State of Cybersecurity report by Ivanti. The study compares perceived threat levels across common attack types with organizational readiness to respond and identifies persistent gaps between awareness and execution across security programs.

Cyber risk is becoming a hold-period problem for private equity firms
Private equity firms have spent years treating cybersecurity as an IT hygiene issue inside portfolio companies. That approach is getting harder to sustain as ransomware, data theft, and regulatory pressure interfere with value creation during the hold period.

Ubuntu 24.04.4 LTS arrives with cumulative security and bug fixes
Security teams running Ubuntu in production often delay major OS upgrades until the next point release arrives with accumulated patches and newer hardware support. Ubuntu 24.04.4 LTS is now available as refreshed installation media for Noble Numbat, bundling the latest updates and offering a current hardware enablement stack for new deployments.

Why secure OT protocols still struggle to catch on
Industrial control system networks continue to run on legacy communication protocols that were built for reliability and uptime, not authentication or data integrity. In many environments, malicious actors with access to the OT network can impersonate devices, issue unauthenticated commands, or modify messages in transit without detection.

OpenAI released GPT-5.3-Codex-Spark, a real-time coding model
OpenAI has released a research preview of GPT-5.3-Codex-Spark, an ultra-fast model for real-time coding in Codex. It is available to ChatGPT Pro users in the latest versions of the Codex app, the command-line interface, and the VS Code extension.

Cybersecurity jobs available right now: February 10, 2026
We’ve scoured the market to bring you a selection of roles that span various skill levels within the cybersecurity field. Check out this weekly selection of cybersecurity jobs available right now.

New infosec products of the week: February 13, 2026
Here’s a look at the most interesting products from the past week, featuring releases from Armis, Black Duck, Portnox, and SpecterOps.


from Help Net Security https://ift.tt/xE480jM

This is a current list of where and when I am scheduled to speak:

  • I’m speaking at Ontario Tech University in Oshawa, Ontario, Canada, at 2 PM ET on Thursday, February 26, 2026.
  • I’m speaking at the Personal AI Summit in Los Angeles, California, USA, on Thursday, March 5, 2026.
  • I’m speaking at Tech Live: Cybersecurity in New York City, USA, on Wednesday, March 11, 2026.
  • I’m giving the Ross Anderson Lecture at the University of Cambridge’s Churchill College at 5:30 PM GMT on Thursday, March 19, 2026.
  • I’m speaking at RSAC 2026 in San Francisco, California, USA, on Wednesday, March 25, 2026.

The list is maintained on this page.


from Schneier on Security https://ift.tt/1WfcBuU

We may earn a commission from links on this page.

Who among us has not looked at a newly framed picture, then looked at their wall and thought, "Eh, surely I can eye-ball it this time." Hanging pictures should be an easy feat, but so often they end up uncentered or slightly crooked, causing us to add more holes the wall than intended or desired. The next time you hang pictures or artwork in your home, use one of these 10 hacks so they're level and evenly spaced on the first try.

Use a small ball as a makeshift level to hang pictures

A level is essential when hanging art—a frame that’s even slightly crooked will be an eyesore, and if you’re hanging multiple pieces in a group, it’s even more important that everything be level. If you forgot to grab your level, or you don’t have one, you can use a small ball, like a ping pong ball or a marble. Place it on top of the frame and adjust until the ball sits still, then mark it on the wall.

Use painter’s tape to accurately space two nails when hanging a picture

If your frame has two widely spaced hooks, knowing where to insert your nail, screw, or other fastener on the wall can be a mind-bending challenge. But if you have some painter’s tape on hand, it’s easy: Place a piece of tape across the back of the frame, with the top of the tape lined up with the top of the hooks. Mark the position of the hooks with a marker or pen, then remove the tape and place it on the wall at the desired height. Using a level, adjust the tape until it’s placed correctly. Then drive your nails right through the tape at the marked locations, remove the tape, and hang your picture. Here's a visual tutorial.

Use toothpaste to help you mark the spots where hooks or nails need to go

An alternative to the painter’s tape method is to use some toothpaste (or any gooey, sticky stuff that will wash off your wall easily). Mark the hooks on the back of the frame with a gob of toothpaste, check that it's level and at the desired height on your wall, then press the frame against the wall. The toothpaste will mark the precise spot where you need to drive your nails to hang the frame. Insert your fasteners, clean everything up, and hang that picture in the perfect spot. Here's a visual tutorial.

Make this quick DIY tool to mark the spot for a hook or nail when hanging a picture

If you have spare cardboard (a cereal box will do) and a pin or thumbtack, you can make a little DIY tool that will make marking the spot for a hook or nail easy. Cut out a rectangle of cardboard, then cut a tab at the bottom that’s narrow enough to fit through the hook on the back of the frame. Slide the tab through, and push a pin or tack through from the back. Then push the picture into the wall at the right spot, and the pin will create a tiny hole where your hook or nail needs to be. Here's a visual tutorial.

Use string to guide a hook onto a nail when hanging a picture

Got the nail in the wall, but can’t seem to catch the hook on the picture frame? Get a piece of string and loop it around the nail, then adjust so the ends are even. Take both ends together and run them through the hook, then pull the string tight as you bring the frame toward the wall. The string will guide the hook right onto the nail, no guesswork required. Here's a visual tutorial.

Use a fork to guide wire onto a nail when hanging a picture

If your frame uses a wire across the back to catch a nail or hook in the wall, you know that sometimes you question your own perception of reality as you repeatedly fail to catch the hook on the wire. There’s an easy hack: Grab a fork from the kitchen and place it on the nail or hook in the wall so it leans outward. Then hook the wire onto the stem of the fork and slide the frame down, letting the fork guide the wire down. When it’s hooked, remove the fork and admire your work. (And wash the fork, probably.) Here's a visual tutorial.

Hang pictures with Monkey Hooks if you don't want to use any tools

Hanging art on drywall and dread all the mess and trouble of drilling or nailing? Skip it by using Monkey Hooks instead. These are self-drilling pieces of wire—you just poke them through the wall with a tiny bit of elbow grease—that spin around and provide strong, secure hooks that can hold up to 50 pounds of weight, all without a single tool. Here's a visual tutorial.

Make this paper template when you're hanging multiple pictures in one area

If you’re going to be hanging multiple frames on the wall, grab some paper and create a template first. You can use wrapping paper, butcher paper or any kind of paper you have lying around or can get your hands on cheap (you can also use cardboard if that’s what you have on hand). Lay your frames out on the paper and trace them carefully. Then use the toothpaste or cardboard/nail hacks described above to mark where the nails need to be placed. Hang the template on the wall (ensuring it’s level), hammer in your nails, remove the template, and hang your frames. Here's a visual tutorial.

Use an envelope to catch dust when drilling to hang a picture

If you’re going to drill or nail into your walls to hang pictures, you’re going to get a lot of annoying dust all over the place, unless you use a very simple hack: Tape an envelope to the wall underneath where you’ll be drilling. It will catch all that dust and save you the extra step of vacuuming afterward. If you don’t have any envelopes (or tape), some Post-it Notes will do in a pinch—just fold one in half and stick it to the wall under the spot where you’ll be drilling, and it will catch that dust. You can combine more than one Post-it if you need to. Here's a visual tutorial.

Use your own saliva to mark the spot where you need to hang a picture

If all else fails, and you need to hang a framed picture but you are short on time or patience, there’s a simple solution: Lick the back of your finger, curl it over the hanging hook on the back of the frame, and place it against the wall at the desired height (typically around 57-60 inches from the floor). Your own saliva will leave a faint, temporary mark on the wall where you can confidently place your hook without fuss or delay.


from Lifehacker https://ift.tt/23Dxtzm

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of publication.

The Sony HT-Z9F is down to $419.99 on Woot, a steep drop from its original price of $899.99. At this price, it becomes a far more accessible way to upgrade your TV audio without committing to a full AV receiver and multi-speaker setup. The deal is available for the next 16 days or until it sells out, whichever happens first. Prime members receive free standard shipping, while non-Prime customers pay $6. That said, shipping is not available to Alaska, Hawaii, APO addresses, or PO Boxes, and the purchase includes a 90-day Woot limited warranty. Discover more President's Day Sale deals and the best Tech deals during the early President's Day Sale here.

It’s a 3.1-channel soundbar, meaning it has left, right, and center speakers built in, plus a wireless subwoofer. That dedicated center channel is especially helpful for dialogue—it keeps voices clear and easy to follow, even during action scenes or loud background scores (meaning you do not need to ride the volume during conversations, then scramble to lower it when explosions hit). And then, there’s the wireless sub, which adds weight to action movies and bass-heavy playlists. It is not room-shaking, but it gives enough low-end punch to feel cinematic in a living room setting.

Sony markets the HT-Z9F as Dolby Atmos-enabled, but it does not have upward-firing drivers or rear satellite speakers. Instead, it relies on Sony’s S-Force Pro Front Surround and Vertical Surround Engine to simulate height and surround effects. That processing does create a wider sound field than basic stereo, but everything still feels anchored to the front of the room. Overhead effects lack the distinct placement you would get from true Atmos speakers bouncing sound off the ceiling. If you are upgrading from built-in TV speakers, the improvement will be obvious. But if you expect a fully immersive surround with objects flying above and behind you, this will not deliver that experience.

As for its connectivity, you get two full HDMI inputs that handle all major audio formats, plus HDMI ARC for TV connection. You also get Bluetooth, wifi, and built-in Chromecast for streaming music directly from your phone or apps. The design looks premium and feels sturdy, which helps it blend into a midrange or high-end setup. The tradeoff is limited sound customization. There are preset EQ modes, but no detailed treble or bass adjustments. At $419.99, the HT-Z9F makes sense for someone who values clear dialogue and solid bass, with wide-format support. Those chasing a true Atmos surround setup with discrete height channels may want to look elsewhere.


Our Best Editor-Vetted Presidents' Day Deals Right Now
Apple iPad 11" 128GB A16 WiFi Tablet (Blue, 2025) $299.00 (List Price $349.00)
HP Omen 35L (Intel Core Ultra 9 285K, RTX 5080, 2TB SSD, 64GB RAM) (List Price $3,099.99 With Code "PRESDAYPC100")
Deals are selected by our commerce team

from Lifehacker https://ift.tt/Wf2ursJ

Samsung has officially revealed when its next Galaxy Unpacked event, which is where everyone's expecting the Galaxy S26 series to be announced, will take place. But before it airs on Feb. 25 at 1 p.m. EST, the company's offering the chance to get ahead of the game by trading in your current phone for a little extra moolah. Right now, you can sign up on Samsung's website to trade in your phone for up to $900 while pre-ordering a Galaxy S26 phone (or, on the very unlikely chance the S26 isn't announced at the event, whatever is announced in its place).

How to get $900 on Samsung Galaxy S26 trade-in

That's $200 more than Samsung currently offers on trade-ins for its other phones, which top out at $700 when trading in a Galaxy S24 Ultra for a Galaxy S25 phone. And while you're signing up, you'll also get $30 to spend on accessories during (but not before or after) your pre-order. You can also choose to be entered in a $5,000 sweepstakes for general Samsung online store credit, if you'd like.

The catch? The pre-order window doesn't seem to be open quiet yet. Usually, that happens within a week of Galaxy Unpacked airing, but you can still get the process started now. Just head to Samsung's Galaxy Unpacked reservation website, enter your name and at least an email address (you can also toss in your phone number, if you'd like), and you'll be taken to the form you need. If you want to enter the sweepstakes, also check the box saying you want to enter.

From there, you can pick your current phone manufacturer and your phone model from a drop-down menu. Note that the manufacturer options include Samsung, Apple, Google, and "Other," so it seems like Samsung is willing to let you trade in phones it doesn't make, too. As for the model picker, you can pick models going back around five years for each of the manufacturer options, although if you don't see your model on the list, you can also pick "Other" here, too.

How much will Samsung give me for my phone?

I can't promise how much Samsung will give you for each specific phone model, although it stands to reason that newer and higher spec phones will earn you more. I'm also willing to wager that Samsung might give you more credit if you trade in one of its own phones, but that's just speculation. To get the full $900, I'm guessing you'll need to trade in a Galaxy S25 Ultra.

Once you've made your selection, hit Submit, then scroll down a bit and click what you're interested in getting offers from Samsung on. Make sure you at least select "Trade In," and then click Submit here, too.

And that's it for now. Samsung will now know what type of phone you have and that you're interested in a trade-in, and should email you with an appropriate trade-in offer once it's available. Again, this should happen closer to Unpacked, likely within a week of Feb 25.

What will the Galaxy S26 look like?

All in all, it's a good opportunity for a deal, but it does continue an unfortunate trend of Samsung's—asking you to pre-order a device before it's officially been revealed, and before you know its full specs list. Luckily, a number of rumors for the Galaxy S26 has made it easy to guess at what we're likely to see, including a similar look to the S25, no ultra thin S26 Edge model, a Snapdragon 8 Elite processor, and a new 10MP telephoto lens on the Ultra model. For confirmation, though, we have no choice but to wait.


from Lifehacker https://ift.tt/YT5oNtE

We may earn a commission from links on this page.

If you're a PC gamer who's been looking into getting a Steam Deck to help you play your games on the go, then I've got some bad news for you: On Valve's official Steam Deck store page—the only place to buy new Steam Decks in the United States—every single model is sold out right now. That includes the discontinued LCD model, both versions of the Steam Deck OLED, and even refurbished options.

The shortage was first spotted last night by deals hunter Wario64, who at the time noted that the Steam Deck was sold out in the U.S., but still available in other countries. Unfortunately, since then, both Tom's Hardware and Windows Central have reported that the handheld isn't available in some Asian countries either. There does still seems to be some hope for gamers in Europe, as Windows Central's Adam Hales said he could still see available stock in his native U.K., including the discontinued Steam Deck LCD.

Valve has yet to comment on the sudden disappearance of the Steam Deck from its site, although I've reached out and will update this post if I hear back.

Why is the Steam Deck out of stock?

While Valve hasn't provided an official reason for the Steam Deck shortage, an obvious culprit is the ongoing RAM crisis, which has seen the cost for consumer memory components double or even triple as AI data centers eat up the available supply. It's possible this shortage is finally affecting the Steam Deck, although that's just speculation until Valve officially confirms it.

That said, the explanation would align with a post Valve made to its blog last week, in which the company said its upcoming Steam Machine and Steam Frame hardware are being impacted by "memory and storage shortages." While the company didn't outright announce a delay for these devices, saying it still plans to ship them "in the first half of the year," it also noted "we must revisit our exact shipping schedule and pricing."

It's possible the situation with "limited availability and growing prices of these critical components," as Valve put it it that post, is now affecting the Steam Deck too, though there are other possible explanations. The simplest, and most hopeful, is that this is simply a minor hiccup in availability, and it will be corrected by the end of the week. Alternatively, it's possible the shortage could be related to tariffs, as while whole smartphones and computers are exempt from increased tariffs, it's unclear whether that applies to gaming devices, or to any individual components Valve might purchase to construct new Steam Decks.

At any rate, we can't know for sure until we hear back from the Half-Life company itself. Perhaps slim pickings or higher prices are in the Steam Deck's future, but there's no way to know right now.

What to buy instead during the Steam Deck shortage

While we don't yet know how long the Steam Deck will stay sold out, it might be worth looking into getting a different handheld gaming PC if the situation drags on. While you can buy Steam Decks from unofficial sellers, I wouldn't advise it, as these would all be from the secondhand market. Most come with heavily marked up prices, and it's impossible to know what kind of condition your device will be in when it arrives. A more trustworthy alternative could be GameStop, as the retailer does sell its own certified refurbished Steam Decks, which are cleaned up in a separate process from Valve's. Unfortunately, these are also out of stock at the moment.

Instead, I would suggest looking at alternatives like the Lenovo Legion Go S, which starts at $600, is slightly more powerful than the Steam Deck, has a higher resolution screen, and in an official partnership with Valve, comes equipped with the same operating system as the Steam Deck. (I actually prefer the Legion Go S to the Steam Deck myself.)

If you've got cash to burn, you could look at a premium upgrade. The obvious ones here are the Lenovo Legion Go 2, which ups the power and packs a gorgeous OLED screen; and the Asus ROG Xbox Ally X, which may be more welcoming to console gamers. (That said, the Xbox handheld's software wasn't quite there yet, at least when I reviewed it).

Whatever your choice, you have no shortage of options for PC gaming handhelds to keep you occupied while you wait for the Steam Deck to come back in stock. Gamers will always find a way to play.


from Lifehacker https://ift.tt/j2DX3L0

It's once again time to update your Apple devices. The company just released a whole host of security patches, including a fix for an actively exploited zero-day affecting iOS 26, iPadOS 26, and macOS Tahoe. These updates arrived alongside the official release of iOS 26.3, which includes features like more seamless data transfer between iPhone and Android. Other security patches address bugs in Photos, VoiceOver, and Screenshots, to name a few.

iOS 26.3 patches a zero-day affecting dyld

According to Apple's latest security bulletin, the zero-day—tracked as CVE-2026-20700—is a memory corruption issue in dyld, Apple's "Dynamic Link Editor." The flaw could allow attackers with memory write capability to execute arbitrary code—or, in other words, run their own code on your device.

Apple says that the vulnerability may have been exploited in an "extremely sophisticated attack against specific targeted individuals" in earlier versions of iOS alongside CVE-2025-14174 and CVE-2025-43529. Those at greatest risk with this bug are likely high-profile users with access to sensitive data—users who might be inclined to use Apple's Lockdown Mode—but everyone should install the update to patch the issue.

The patch for this flaw is available for the following iOS and iPadOS devices, in addition to all Macs that run macOS Tahoe:

  • iPhone 11 and later

  • iPad Pro 12.9-inch 3rd generation and later

  • iPad Pro 11-inch 1st generation and later

  • iPad Air 3rd generation and later

  • iPad 8th generation and later

  • iPad mini 5th generation and later

How to install the latest security update for iPhone

You should have automatic updates enabled to ensure you receive critical security patches ASAP, but you can confirm that you're on the latest OS version under Settings > General > Software Update. As a reminder, Apple won't message you urging you to click links, download attachments, or install apps related to security updates. Always go through your device settings to receive official fixes.


from Lifehacker https://ift.tt/k7fcdHq