Xiaomi has just announced the global launch of its flagship Xiaomi 17 series, but how does the premium 17 Ultra compare to its iPhone competitor?
Although we haven’t specifically reviewed the iPhone 17 Pro Max, we have reviewed the similarly specced iPhone 17 Pro, so we’ll draw on our experience there where applicable. However, you can see the differences between the two in our iPhone 17 Pro vs iPhone 17 Pro Max guide.
Otherwise, we’ve compared the specs of the Xiaomi 17 Ultra and iPhone 17 Pro Max and noted their key differences here. We’d also recommend that you take a look at our Android vs iOS guide which explains the fundamentals of the two operating systems, while our best smartphone list reveals our current favourites for 2026.
The iPhone 17 Pro Max is currently Apple’s most expensive handset, with a starting price of £1199/$1199 for the 256GB model. The smartphone also comes in a choice of three colours: Silver, Deep Blue and Cosmic Orange.
SQUIRREL_PLAYLIST_10207953
Qualcomm Snapdragon 8 Elite Gen 5 vs Apple A19 Pro
One of the biggest differences between the Xiaomi 17 Ultra and iPhone 17 Pro Max is with their respective processors. While the Xiaomi 17 Ultra runs on Qualcomm’s top-end Snapdragon 8 Elite Gen 5, which powers many of the best Android phones, the iPhone 17 Pro Max runs on Apple’s own A19 Pro chip instead.
Advertisement
We should disclaim that, although we have tried Snapdragon 8 Elite Gen 5 and A19 Pro, we haven’t yet tested the chips within the Xiaomi 17 Ultra or iPhone 17 Pro Max. Even so, we’ve seen high benchmark scores alongside seriously impressive everyday use when testing other phones running Snapdragon 8 Elite Gen 5. With this in mind, we expect the Xiaomi 17 Ultra to offer a similar performance.
As expected from a Pro Apple chip, A19 Pro is also seriously powerful. While reviewing the iPhone 17 Pro, which uses the same chip, we found the phone stayed cool during even intensive tasks like gaming, and achieves impressively high benchmark scores too. Again, like the Xiaomi 17 Ultra, we expect the iPhone 17 Pro Max to offer a similar performance too.
Xiaomi 17 Ultra iPhone 17 Pro (not the Max)
Advertisement
Advertisement
Xiaomi 17 Ultra features a 200MP telephoto lens
When it comes to photography ability, both the Xiaomi 17 Ultra and iPhone 17 Pro Max promise to excel. The Xiaomi 17 Ultra is fitted with a trio of rear lenses, including a 50MP main, 50MP ultrawide and mighty 200MP telephoto. In comparison, although the iPhone 17 Pro Max is also made up of a main, ultrawide and telephoto lens, all three are 48MP Fusion instead.
This is also the case with the iPhone 17 Pro, which we hailed as being one of the best camera phones. We especially praised the 8x telephoto lens, hailing it as offering the best zoom camera ever on an iPhone. This is especially noteworthy as the Xiaomi 17 Ultra boasts a mammoth 200MP telephoto which promises up to 17.2x optical zoom. Of course, we’ll have to wait until we review the Xiaomi 17 Ultra to see how it fares.
Xiaomi 17 Ultra. Image Credit (Xiaomi)
What also impressed us with the iPhone 17 Pro was the abundance of features that enhance images, such as Photographic Styles and Dual Camera mode too.
Both have 6.9-inch displays
Not only are the Xiaomi 17 Ultra and iPhone 17 Pro Max equipped with 6.9-inch displays, but so is the Samsung Galaxy S26 Ultra. It’s safe to say that if you prefer a larger phone, then you’re certainly not short of options.
Advertisement
Unsurprisingly, both the Xiaomi 17 Ultra and iPhone 17 Pro Max are equipped with plenty of premium screen technologies. With the Xiaomi 17 Ultra, you’ll benefit from a HyperRGB panel which Xiaomi explains “leverages independent red, green, and blue subpixels for 2K-level clarity”, an LTPO-enabled 1-120Hz refresh rate and Xiaomi Shield Glass 3.0 for up to 30% more drop resistance than the Xiaomi 15 Ultra.
The iPhone 17 Pro Max’s Super Retina XDR display also sports ProMotion technology (Apple’s term for an LTPO 1-120Hz refresh rate) and retains the Dynamic Island of its predecessors. Other than being bigger, its specs are the same as the iPhone 17 Pro, which we hailed as having one of the best screens around.
Xiaomi 17 Ultra promises faster charging
Annoyingly, one area where Apple seems to let itself down is with charging speeds. While the Xiaomi 17 Ultra boasts 90W HyperCharge wired and 50W HyperCharge wireless support, the iPhone 17 Pro Max supports 40W wired and 30W wireless.
Having said that, although it’s undoubtedly a shame that the iPhone series hasn’t quite matched the levels of its Android competitors, it’s still worth noting that generally battery life is solid and should comfortably see you through a full day.
Advertisement
HyperOS 3 vs iOS 26
Arguably the most influential difference between the Xiaomi 17 Ultra and iPhone 17 Pro Max is with their operating systems. The iPhone 17 Pro Max runs on iOS, specifically iOS 26 which saw the introduction of Liquid Glass, and remains one of the easiest to use interfaces in a smartphone.
In comparison, while Xiaomi’s HyperOS is an Android skin, it undoubtedly draws inspiration from iOS. With that in mind, if you want a raw Android experience then you’re better off elsewhere.
Although HyperOS is fairly intuitive and easy to run, it doesn’t offer the polished experience that an iPhone does. The main reason for this comes from the sheer amount of bloatware, which includes a second app store, AliExpress, Mi Store and many many more.
Xiaomi 17 Ultra. Image Credit (Trusted Reviews)
Otherwise, Xiaomi has sprinkled a decent amount of AI features across HyperOS with the inclusion of Circle to Search, Gemini access and useful photo editing tools that work well. It’s just enough to be useful, but not so much that it should be the sole reason you opt for a Xiaomi handset.
This brings us to Apple’s own AI kit, Apple Intelligence, which is found in the iPhone 17 Pro Max. Unfortunately, Apple Intelligence still feels like something of an afterthought and although some features such as Writing Assist and Clean Up for photos are useful, we still don’t think this should be the reason you opt for an iPhone.
Advertisement
Advertisement
For a deeper dive into the different operating systems, do make sure you visit our Android vs iOS guide, as our Mobile Editor has explained everything you need to know about the two.
Early Verdict
The Xiaomi 17 Ultra looks like a seriously promising Android smartphone, thanks to its mighty 200MP telephoto lens, powerful Qualcomm chip and speedy charging. With this in mind, if you’re leaning more towards an Android then the Xiaomi 17 Ultra seems like a great option.
However, the iPhone 17 Pro Max is a seriously high-specced phone. Considering we gave the iPhone 17 Pro a 4.5-star rating and a spot on our best smartphone list, the larger iPhone 17 Pro Max is a brilliant option for those in Apple’s ecosystem or anyone looking for a change.
When security teams talk about attack surface, the conversation usually starts in familiar places. Servers, identity systems, VPN access, cloud workloads, maybe browsers. Those are visible. They show up in diagrams and asset inventories.
What gets less attention are the everyday tools people use to actually get work done.
PDF readers. Compression utilities. Remote access clients. Word processors. Spreadsheet tools. Email clients. Browsers. Screen sharing software. Update managers. The background software that quietly powers normal business activity.
Most organizations do not spend much time debating whether to deploy these. They are simply part of operating in a digital economy. Contracts arrive as PDFs. Finance works in spreadsheets. HR reviews resumes. IT supports users remotely. Executives live in email and browsers. These tools become part of the environment almost by default.
Advertisement
At Action1, where visibility into third-party software exposure across endpoints is a daily focus, these background tools consistently emerge as a defining part of the real-world attack surface.
That commonness is what makes them attractive targets from a threat actor’s perspective.
The value of being ordinary
From the outside, modern enterprises look different. Networks vary. Architectures change. Security stacks evolve. But, inside most environments, the same classes of applications appear again and again, and more often than not, the same software titles dominate the majority of installations.
It is difficult to function in modern business without an email client, document processing software, a browser, and tools for packaging, previewing, and sharing files. Using similar products is less about preference and more about compatibility.
Advertisement
Business depends on exchanging information in formats everyone else can use. Without those standards, we go back to the days of file-format wars, “I cannot open that, we use something else,” and lost time just trying to make data usable. That friction is why the industry standardized, and why the same major names still dominate.
Attackers pay attention to that.
Rather than predicting every custom application an organization might run, they look for overlap. If a vulnerability appears in a widely used PDF engine, spreadsheet parser, email preview component, or remote access utility, the chances it connects with something real are high. The exploit is aimed less at unique architecture and more at familiarity.
Most successful exploitation does not rely on exotic techniques. It relies on muscle memory. Users open PDFs, Word files, spreadsheets, and links all day long. Attackers are betting those actions feel routine enough that nobody hesitates.
Advertisement
That familiarity shapes how campaigns are built, and it should influence how defense strategies are planned.
Good thing Action1 does it for you, now on Linux too—alongside Windows, macOS, and third-party apps.
One platform. Zero infrastructure. Real-time visibility. Finally, patching that just works.
Many attacks historically looked like guesswork. An attacker might send a crafted email for Outlook, hoping the recipient uses Outlook. Or attach a weaponized spreadsheet, hoping Excel is present. Or send a malicious PDF, hoping the reader is vulnerable.
Advertisement
There is uncertainty in that approach. The exploit launches before the attacker truly knows what exists on the other end. This increases chances the attack will be detected before being effective, and it risks valuable exploit code to failure, where it may be detected, profiled, then henceforth scanned and detected.
What changes with common utilities is the probability curve.
Email clients, browsers, word processors, spreadsheets, PDF readers, and archive tools appear in most business environments because the work itself requires them. An attacker does not need perfect information to expect something compatible nearby.
Instead of treating exploitation as a one-off guess, attackers think in likelihood. They invest effort where overlap is largest. The more widespread the tool, the more attractive it becomes as an entry point.
Advertisement
That is why vulnerabilities in these utilities move quickly through exploit ecosystems. Once something works in a familiar toolchain, it scales. If one user relies on Outlook, Word, and Adobe, there is a good chance coworkers and business relations do as well for interoperability reasons.
Figure 1: Automated detection and remediation of critical vulnerabilities in third-party applications.
The standard business footprint in practice
These tools also travel together.
If an email clearly originated from Outlook, it already hints at part of the environment. Email workflows connect to document workflows. If Outlook is present, Word and Excel are often nearby.
Each utility reinforces the presence of others.
For attackers, that enables paths rather than isolated exploits. An issue in an email client connects to attachment handling, preview engines, document renderers, shared libraries, and integrations that tend to coexist on the same system.
Advertisement
Instead of targeting a single application, the attack surface starts to resemble the business footprint itself, the collection of tools people rely on every day.
When vulnerabilities appear in that footprint, they attract more attention because they fit naturally into how people already work.
Quiet signals and small leaks
Another part of the story is information people do not realize they share.
Documents often contain metadata. PDFs reference the engine that produced them. Spreadsheets carry formatting behavior tied to specific suites. Email headers expose client details. Browser traffic advertises user agents. File structures reveal habits and versions.
Advertisement
A single attachment, email, or shared document can quietly describe parts of the software stack behind it.
In isolation it does not look sensitive. Often it is not even visible. Over time it builds a picture of what tools are common, what standards they follow, and how files are processed.
What created it, what version, how recently, so when old software details show in current workflows, the software processing it is old. And old software often means years of exploit potential bottled up in one package. That is often what turns speculation into precision.
Those breadcrumbs help attackers shape payloads that align with what exists on the other side, increasing effectiveness while reducing noisy experimentation.
Advertisement
Why third-party software drifts
Most enterprises put real effort into operating system patching. Update pipelines are understood. Browsers update often. Mobile devices follow management policies. Systems start with baselines and are monitored.
Third-party utilities live differently.
Vendors ship different installers. Some auto-update. Some rely on users. Some get disabled by packaging systems. Some stay frozen because workflows depend on a version.
Over time, multiple builds of the same tool spread across endpoints. Some become stale. Some live for years with known vulnerabilities simply because they fell off the radar.
Advertisement
In Action1’s analysis of enterprise environments, it is common to find multiple versions of the same third-party application coexisting, some lagging years behind current security fixes. This fragmentation quietly accumulates exploit potential without triggering obvious alerts.
From a security view, that drift matters because attackers do not need new exploits. They benefit from whatever version still exists somewhere in the footprint. A five-year-old PDF reader quietly carries five years of cumulative exploit potential.
What feels like small technical debt widens the opportunity window for major exploitation.
Trust and everyday behavior
There is also a human side to these tools.
Advertisement
Email, documents, browsers, and archives feel like infrastructure. People trust them like desks and keyboards. Opening a PDF does not feel like running code. Previewing an email does not feel like execution. Extracting a file feels routine.
By the time behavior looks unusual, the initial interaction already happened in a place people rarely question. These actions occur thousands of times a day, which makes tracing a compromise back to a document, email, or user extremely difficult.
Figure 2: Secure, scalable patch management across Windows, macOS, and third-party apps, with compliance reporting and 200 forever-free endpoints.
Looking at the footprint, not just the platform
For leadership teams, the value here is perspective, not fear.
Security strategies often start with the platform layer, operating systems, networks, identity, cloud infrastructure. Those matter, but they do not tell the full story of how work actually happens.
Work happens in email clients, spreadsheets, PDFs, browsers, archive tools, and remote sessions. That is where files open, previews render, links get clicked, and data moves between people.
Advertisement
That makes them predictable.
That is why third-party patching often carries more risk weight than expected. The operating system may be tightly managed, while the tools on top quietly define real exposure.
Looking at the footprint is less about assuming weakness and more about understanding where everyday work intersects with real security concerns.
A quieter way to think about patching
Third-party patching often feels operational rather than strategic. Yet these utilities sit at the intersection of people, files, and execution.
Advertisement
They are ordinary, and that is exactly why they matter.
Not because every organization looks the same, but because they look similar enough that attackers design around that similarity.
When teams examine environments, the focus is usually infrastructure. There is also value in asking what the standard business suite looks like across endpoints, how it evolves, and how consistently it stays current.
Which tools are actually needed? Which are simply part of a default deploy? Which stay installed even when unused? Which stop getting updated because nobody notices them?
Advertisement
This is why, in practice, teams working with platforms like Action1 consistently see third-party patching deliver a greater reduction in real-world risk than many more visible security controls. Exploitation rarely hinges on a single overlooked vulnerability. It is enabled by years of accumulated drift across third-party applications that quietly fall out of date while remaining embedded in everyday workflows.
Those conditions exist long before an exploit is written or deployed. They shape the practical attack surface by defining which software actually executes, which files get opened, and which actions feel routine enough to avoid scrutiny.
Third-party software is not adjacent to the platform — it is part of how the platform operates, and it is often where exposure concentrates when everything else appears well-managed.
Action1is a founder-led company, brought to you by the original minds behind Netwrix. At the time of this writing, it is one of the fastest-growing private software companies in the US because organizations are recognizing that OS and third-party patching can no longer be treated as a secondary task.
Advertisement
Addressing modern risk requires continuous visibility into third-party software and the ability to remediate vulnerable applications across endpoints quickly and consistently. When teams evaluate modern patch management solutions, Action1 increasingly represents the option designed around that reality.
One of the problems with being a graffiti artist is that you have to carry around a different spray can for each color you intend to use. [Sandesh Manik] decided to solve this problem by building a rig that can produce a wider range of colors by mixing the paint from several cans at once. Check it out in the video below.
The project is called Spectrum. It uses four off-the-shelf spray paint cans—colored red, blue, yellow, and white—and mixes them to create a wider range of colors. All four cans are hooked up to a single output nozzle via a nest of tubing and a four-to-one tube manifold. Key to controlling the flow of paint is a custom device which [Sandesh] calls the “rotary pinch valve,” with one fitted to the feed line coming from each spray can. These valves use a motor-driven lever to pinch a plastic tube shut, allowing them to control the paint flow. This design keeps the mechanism and paint completely separate, which was important to stop paint from fouling the valves in short order. It also prevents backflow, which keeps the paint going towards the outlet and prevents ugly messes. By quickly actuating the valve, the paint flow from each can is modulated to mix various colors as desired.
The mixing valves are under the command of an Arduino Nano. The microcontroller reads a series of knobs to select the amount of each component color to mix, and displays relevant information on a screen. Then, when a pushbutton is pressed, the valves are actuated to spit out the right amount of each paint from the atomizer nozzle. [Sandesh] went so far as to include an advanced “gradient” mode, where a force-sensitive button allows the device to transition smoothly from one color to another depending on how hard the button is pushed.
Advertisement
It’s a neat concept which we’d love to see explored further, perhaps with a more traditional selection of CMYK paints rather than the more unusual red, yellow, blue, and white. We’ve also seen some fun spray paint projects before, like this neat wall-mount plotter. Video after the break.
The Bugatti W16 Mistral ‘La Perle Rare’, the last of a vanishing breed, marks the end of an era defined by raw mechanical power and an obsessive quest of perfection. There are only 99 of these Mistrals in total, and each starts at over €5 million. ‘La Perle Rare’, on the other hand, is a handmade unique that will cost a little more than $8-9 million.
It all began at the 2023 Pebble Beach Concours d’Elegance, when a client commissioned Bugatti to produce something absolutely special. Over time, the client and Jascha Straub, the guy in charge of Bugatti’s bespoke business, came up with proposals ranging from a silver tint to numerous shades of white before settling on something that seemed to capture the essence of light. The project began in August 2023, and we can safely assume that the designers in Berlin and engineers in Molsheim worked long hours on it.
HIGH SPEED THRILLS – Kids construct an authentic race car with the LEGO Technic Bugatti Chiron Pur Sport Hypercar (42222) building toy for boys and…
REALISTIC FEATURES & FUNCTIONS – Young builders can steer using the knob on top, explore the W16 engine, and open the doors and hood to discover…
VIBRANT BUGATTI DESIGN – This hypercar model features the eye-catching orange bodywork and black design inspired by the real Bugatti Chiron Pur…
The exterior of ‘La Perle Rare’ is a true show-stopper, with a two-tone color scheme that separates the vehicle into two distinct areas. The top area is a warm color tinged with gold and iridescence, as well as a sprinkle of metallic particles that sparkle beautifully. The second part is a sophisticated, warm white color. Getting the separating lines between the colors just right required a lot of precision. Even the wheels received special treatment, resulting in stunning diamond-cut rims painted in the interior color of the vehicle, which is an understatement given that the wheels are coated in a custom paint combination that matches the exact colors of gold and white. The end result is a car that shines like a rare gem while maintaining the original Mistral design.
Rembrandt Bugatti’s famed Dancing Elephant sculpture is featured in a few of the car’s more subtle details, like the gear selector, body panels behind the front wheels, and even the headrests. To add a personal touch, the name ‘La Perle Rare’ is stitched in the center tunnel, stamped on the engine cover, and painted on the active rear wing. These little details return the automobile to Bugatti’s artistic roots.
Inside ‘La Perle Rare,’ the cabin takes on an entirely new level of brightness, a luminous continuation of the outer motif that is difficult to describe. Every visible piece of carbon fibre has been coated white to give it a jewel-like appearance. Door panels feature alternating white and warm gold lines that look lovely on their sculpted, concave surfaces. The ambient lighting has just the right amount of warmth to it, highlighting the interplay between light and material. The steering wheel, center console clocks, and door handles are all machined and polished aluminum, with each meant to catch reflections in a particularly stunning way.
The power comes from the same quad-turbocharged 8.0-litre W16 engine found in all Mistrals. It’s not exactly small in any way, with 1,579 horsepower and 1,600 Nm of torque, it can go from 0 to 62 in 2.4 seconds, 0 to 124 in 5.6 seconds, and 0 to 186 in 12.1 seconds, and all of that power is sent to all four wheels via a seven-speed dual clutch transmission. Top speed? The record for the fastest open-top production car is already in the records, 282 mph and all, thanks to this car, but, for obvious reasons, you won’t be able to get it up to that sort of speed on the road, closer to 236 mph if you want to play it safe. [Source]
In the time it takes you to read this sentence, the Large Hadron Collider (LHC) will have smashed billions of particles together. In all likelihood, it will have found exactly what it found yesterday: more evidence to support the Standard Model of particle physics.
For the engineers who built this 27-kilometer-long ring, this consistency is a triumph. But for theoretical physicists, it has been rather frustrating. As Matthew Hutson reports in “AI Hunts for the Next Big Thing in Physics,” the field is currently gripped by a quiet crisis. In an email discussing his reporting, Hutson explains that the Standard Model, which describes the known elementary particles and forces, is not a complete picture. “So theorists have proposed new ideas, and experimentalists have built giant facilities to test them, but despite the gobs of data, there have been no big breakthroughs,” Hutson says. “There are key components of reality we’re completely missing.”
That’s why researchers are turning artificial intelligence loose on particle physics. They aren’t simply asking AI to comb through accelerator data to confirm existing theories, Hutson explains. They’re asking AI to point the way toward theories that they’ve never imagined. “Instead of looking to support theories that humans have generated,” he says, “unsupervised AI can highlight anything out of the ordinary, expanding our reach into unknown unknowns.” By asking AI to flag anomalies in the data, researchers hope to find their way to “new physics” that extends the Standard Model.
On the surface, this article might sound like another “AI for X” story. As IEEESpectrum’s AI editor, I get a steady stream of pitches for such stories: AI for drug discovery, AI for farming, AI for wildlife tracking. Often what that really means is faster data processing or automation around the edges. Useful, sure, but incremental.
Advertisement
What struck me in Hutson’s reporting is that this effort feels different. Instead of analyzing experimental data after the fact, the AI essentially becomes part of the instrument, scanning for subtle patterns and deciding in real time what’s interesting. At the LHC, detectors record 40 million collisions per second. There’s simply no way to preserve all that data, so engineers have always had to build filters to decide which events get saved for analysis and which are discarded; nearly everything is thrown away.
Now those split-second decisions are increasingly handed to machine learning systems running on field-programmable gate arrays (FPGAs) connected to the detectors. The code must run on the chip’s limited logic and memory, and compressing a neural network into that hardware isn’t easy. Hutson describes one theorist pleading with an engineer, “Which of my algorithms fits on your bloody FPGA?”
This moment is part of a much older pattern. As Hutson writes in the article, new instruments have opened doors to the unexpected throughout the history of science. Galileo’s telescoperevealed moons circling Jupiter. Early microscopes exposed entire worlds of “animalcules” swimming around. These better tools didn’t just answer existing questions; they made it possible to ask new ones.
If there’s a crisis in particle physics, in other words, it may not just be about missing particles. It’s about how to look beyond the limits of the human imagination. Hutson’s story suggests that AI might not solve the mysteries of the universe outright, but it could change how we search for answers.
For a late-1990s engineer with good soldering skills, many a free pint of beer could be earned by installing modchips on the game consoles of the day. Modchips were usually a small microcontroller connected with a few wires to selected pins on the chips or pads on the board that masked or overrode the copy protection and region locking. This scene was brought back for us by a recent [Modern vintage gamer] video looking at the history of console hardware mods, and it’s worth a watch (see the video, below).
The story starts in 1996 with the original PlayStation, largely the source of those free pints for a nascent Hackaday scribe back in the day. Along the way, as he expands the story, we find other memories, for example, the LPC bus-based hijacks of the first XBox console, and the huge modding scenes on both that machine and Sony’s PS2. The conclusion is that this community left its mark on today’s consoles even though the easy hardware hacks may be a thing of the past on the latest hardware, and as past Hackaday articles can attest, jailbreaking older consoles still has a way to go.
In the early days, our recollection is that the PlayStation modchips were driven by the region locking rather than piracy, for the simple reason that Sony used 80-minute ISOs which wouldn’t fit on the then-available consumer 74-minute CD-R. We also remember them being used by people who couldn’t afford a blue debuugging PlayStation,. or the rare black developer model.
Consumers can expect a long wait for the next version of the iPad Pro, but the 2027 refresh will get vapor chamber cooling, not a major revamp in design.
iPad Pro
While Apple is set to make a number of product announcements within days, the iPad Pro won’t be among them. Instead, you’re going to be waiting until early 2027 for the next iteration. Writing in Bloomberg’s “Power On” newsletter on Sunday, Mark Gurman answers a query about the next iPad Pro and when it will launch. In his response, he tempers expectations of an imminent update, providing a more realistic outlook for the tablet line. Rumor Score: 🤔 Possible Continue Reading on AppleInsider | Discuss on our Forums
Samsung and the State of Texas have reached a settlement agreement over the alleged unlawful collection of content-viewing information through its smart TVs
As part of the agreement, the TV manufacturer will revise its privacy disclosures to clearly explain its data collection and processing practices to consumers.
Last December, Texas Attorney General Ken Paxton filed a lawsuit against several TV manufacturers, including Samsung, alleging that they use Automated Content Recognition (ACR) technology to collect and process viewing data without first obtaining their express, informed consent.
In January, Texas obtained a short-lived temporary restraining order (TRO) against Samsung to stop the unlawful collection of consumer data in the state, confirming a violation of the Texas Deceptive Trade Practices Act (DTPA).
Advertisement
Although the order was vacated on the following day, the lawsuit remained active.
The allegations against Samsung were that it uses ACR technology to capture screenshots of consumers’ TVs to determine what they’re watching. The South Korean tech giant would use this information for targeted advertising.
In support of the TRO, the Court found that there was “good cause to believe” that Samsung automatically enrolled customers in this system using “dark patterns” that included “over 200 clicks spread across four or more menus for a consumer to read the privacy statements and disclosures.”
In a statement to BleepingComputer, Samsung stated that, while it does not agree that its Viewing Information Services (VIS) system violated any regulations, it has agreed to “make enhancements to further strengthen our privacy disclosures.”
Advertisement
“While we maintain our original television privacy policy and notices followed existing Texas state regulations, as a trusted brand, Samsung is proud to be at the forefront of protecting consumer privacy and security,” stated a spokesperson of Samsung Electronics America.
“The settlement affirms what Samsung has said since this lawsuit was filed – Samsung TVs do not spy on consumers. In fact, Samsung allows you to control your privacy – and change your privacy settings at any time.”
“As part of the agreement, Samsung must halt any collection or processing of ACR viewing data without obtaining Texas consumers’ express consent,” announced Texas AG Ken Paxton.
“Additionally, it compels Samsung to promptly update its smart TVs and implement disclosures and consent screens that are clear and conspicuous to ensure that Texans can make an informed decision regarding whether their data is collected and how it’s used.”
Advertisement
Paxton commended Samsung for agreeing to implement consumer safeguards, while he underlined that others haven’t moved with a similar fervor as of yet.
Smart TV manufacturers, including Sony, LG, Hisense, and TCL Technologies, have not made any changes in response to the lawsuits yet.
Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.
Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282 to breach Ivanti Connect Secure devices.
The update focuses on the implant’s undetected latency on the appliances and its “sophisticated network-level evasion and authentication techniques” that enable covert communication with the attacker.
CISA originally documented the malware on March 28 last year, saying that it can survive reboots, create webshells for stealing credentials, create accounts, reset passwords, and escalate privileges.
According to researchers at incident response company Mandiant, the critical CVE-2025-0282 vulnerability was exploited as a zero-day since mid-December 2024 by a threat actor linked to China, tracked internally as UNC5221.
Advertisement
Network-level evasion
CISA’s updated bulletin provides additional technical information on RESURGE, a malicious 32-bit Linux Shared Object file named libdsupgrade.so that was extracted from a compromised device.
The implant is described as a passive command-and-control (C2) implant with rootkit, bootkit, backdoor, dropper, proxying, and tunneling capabilities.
Instead of beaconing to the C2, it waits indefinitely for a particular inbound TLS connection, evading network monitoring, CISA says in the updated document.
When loaded under the ‘web’ process, it hooks the ‘accept()’ function to inspect incoming TLS packets before they reach the web server, looking for specific connection attempts from a remote attacker that are identified using the CRC32 TLS fingerprint hashing scheme.
Advertisement
If the fingerprint does not match, traffic is directed to the legitimate Ivanti server. CISA further details Rusrge’s authentication mechanism saying that the threat actor also uses a fake Ivanti certificate to ensure that they are interacting with the implant and not the Ivanti web server.
The agency highlights that the certificate’s purpose is just to for authentication and verification purposes, as it is not used to encrypt communication. Furthermore, the fake certificate also helps the actor evade detection by impersonating the legitimate server.
Because the forged certificate is sent unencrypted over the internet, CISA says that defenders could use it as a network signature to detect an active compromise.
After fingerprint validation and authentication with the malware, the threat actor establishes secure remote access to the implant using a Mutual TLS session encrypted with the Elliptic Curve protocol.
Advertisement
“Static analysis indicates the RESURGE implant will request the remote actors’ EC key to utilize for encryption, and will also verify it with a hard-coded EC Certificate Authority (CA) key,” CISA says.
By mimicking legitimate TLS/SSH traffic, the implant achieves stealth and persistence, the American cybersecurity agency says.
Another file analyzed is a variant of the SpawnSloth malware using the name liblogblock.so and contained by the RESURGE implant. Its main purpose is log tampering to hide malicious activity on compromised devices.
A third file that CISA analyzed is dsmain, a kernel extraction script that embeds the open-source script ‘extract_vmlinux.sh’ and the BusyBox collection of Unix/Linux utilities.
It allows RESURGE to decrypt, modify, and re-encrypt coreboot firmware images and manipulate filesystem contents for boot-level persistence.
“CISA’s updated analysis shows that RESURGE can remain latent on systems until a remote actor attempts to connect to the compromised device,” the agency notes. Because of this, the malicious implant “may be dormant and undetected on Ivanti Connect Secure devices and remains an active threat.”
CISA suggests that system administrators use the updated indicators of compromise (IoCs) to discover dormant RESURGE infections and remove them from Ivanti devices.
Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.
Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.
Anthropic’s chatbot Claude seems to have benefited from the attention around the company’s fraught negotiations with the Pentagon.
As first reported by CNBC, Claude has been rising to the top of the free app rankings in Apple’s US App Store. On Saturday evening, it overtook OpenAI’s ChatGPT to claim the number one spot, a position that it still held on Sunday morning.
According to data from SensorTower, Claude was just outside the top 100 at the end of January, and has spent most of February somewhere in the top 20. It’s climbed rapidly in the past few days, from sixth on Wednesday, then fourth on Thursday, then first on Saturday.
A company spokesperson said that daily signups have broken the all-time record every day this week, free users have increased more than 60% since January, and paid subscribers have more than doubled this year.
Advertisement
After Anthropic attempted to negotiate for safeguards preventing the Department of Defense from using its AI models for mass domestic surveillance or fully autonomous weapons, President Donald Trump directed federal agencies to stop using all Anthropic products and Secretary of Defense Pete Hegseth said he’s designating the company a supply-chain threat.
This post was first published on February 28, 2026. It has been updated to reflect Anthropic reaching No. 1, and to include growth numbers from the company.
In the not-so-distant past, cars weren’t as commonplace as they are today. Naturally, this also means that the now-essential elements of widespread car travel, like highways and mechanics, weren’t around yet. The gas station, which is a building on just about every corner in the modern era, was no exception. Way back in the late 1800s, early drivers had to pay a visit to their local pharmacy to purchase cans of fuel. One had to pour the fuel from the cans into their vehicle to get it running.
The most famous instance of filling up a vehicle using pharmacy supplies was in 1888, when Bertha Benz, the wife of automobile pioneer Carl Benz, drove from Mannheim to Pforzheim, Germany, in the Benz Patent-Motorwagen, the first car ever invented. Early on in her trip, she made her first benzene refueling stop at the Stadt-Apotheke pharmacy in Wiesloch, giving it the historical distinction of being the world’s first filling station. So began the trend of pharmacies providing drivers with their much-needed vehicle fuel.
Of course, in the over a century since Bertha’s historic trip, car refueling has changed. In fact, it didn’t take long after her landmark drive for the first thing we recognize as a gas station to be established, making pharmacy refueling nothing more than a historical footnote.
Advertisement
It didn’t take long for true gas stations to appear
Ej_rodriquez/Getty Images
In the years following Bertha Benz’s drive, cars became more and more popular. Thus, a better way to fuel up was needed, and in the United States, the answer came in the year 1905. That year saw the establishment of the world’s first designated filling station, which opened for business in St. Louis, Missouri, and allowed folks to drive up and purchase fuel without having to get it by the canister. At the same time, it has also been claimed by Standard Oil that the real first gas station was opened two years later in 1907. This station pumped gasoline directly into cars from a massive tank.
These systems worked well enough, but there was still some evolution to be done to get use to the gas stations we know today. Less than a decade later, in 1913, Gulf Refining Company opened the doors to its first drive-up gas station. Located in Pittsburgh, Pennsylvania, on the corner of Baum Boulevard and St. Clair Street, this station also offered free air, water, crankcase service, and tire and tube installation. This extensive service is just one of the many reasons why the gas stations of yesteryear are considered better than those in operation today.
Advertisement
Over the past century-plus, gas stations have come a long way. Even with their flaws, and the comparatively high price of modern gas, the current setup is certainly a far and away improvement on the old pharmacies that early drivers had to work with.