Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Police in the UK have arrested a 21-year-old man in relation to the November hack of toy maker VTech. The hacker was able to obtain access to the records of over 11 million people, many being minors. → Read More
Windows Phone hacker Heathcliff, known for the WP7 root tools, has released a new tool dubbed 'Windows Phone Internals'. The new tool allows for modified boot loaders and custom ROMs. → Read More
Apple has announced that online ordering of the iPad Pro will be available starting November 11th, and will be available in store and through carriers later in the week. → Read More
After initial details of the 'Nintendo PlayStation' prototype emerged back in July, many were skeptical of it's authenticity. Now, the device has been demoed and it's definitely real and still works. → Read More
Apple has pulled a malicious third-party Instagram app from the App Store. The app 'InstaAgent' was harvesting user credentials by sending them off insecurely to a server owned by the developers. → Read More
Several weeks after the first iOS 9.2 beta, the latest iOS 9 update has been released to the public. The update includes a long list of bug fixes and improvements, along with some new features. → Read More
Lenovo, Dell and Toshiba have been found to be shipping vulnerable bundleware on their PCs. The software would allow attackers to execute code and commands with system level permissions. → Read More
Chinese toy maker, VTech suffered a data breach earlier in the month, resulting in the theft of data on more than 5 million parents and over 200,000 children. → Read More
The iPhone 6s and 6s Plus have been benchmarked in a variety of tests, revealing the power of these new devices. The latest-generation phones outpaced many of their competitors and set new records. → Read More
Facebook is rolling out new tools that will make it easier to block content from your previous relationships. The tools are currently rolling out in the US, with expanded availability coming soon. → Read More
After confirming earlier this year the development of an ad-free subscription, we may now have a launch date for the new option. The service is said to be launching in October at $10 a month. → Read More
Apple has released two update for its mobile platform, iOS, today. iOS 9.0.1 is the first update to iOS 9.0 and includes various bug fixes, while iOS 9.1 gets another update bringing it to beta 2. → Read More
Despite the successful rollout of iOS 9 over the past week, it seems the platform has hit some turbulence with a new Siri related flaw allowing access to contacts & photos without the need for a PIN. → Read More
After announcing an iOS 9 exploit bounty earlier this year, security firm Zerodium has announced that one team was able to create an exploit that was eligible for the full million dollar payout. → Read More
New security firm Zerodium is offering a million dollar payout for anyone who can provide a jailbreak for iOS 9. The initiative has been dubbed ‘The Million Dollar iOS 9 Bug Bounty'. → Read More
A malicious version of the Apple developer toolkit has been floating around in China. This has resulted in dozens of malicious apps making their way on to the App Store, bypassing Apple's reviewers. → Read More
A malicious version of the Apple developer toolkit has been floating around in China. This has resulted in dozens of malicious apps making their way on to the App Store, bypassing Apple's reviewers. → Read More
Google's Rachel Potvin has revealed internal code statistics during the @Scale conference. The Google code base spans across 2 billion lines of code and 1 billion files, consuming terabytes of space. → Read More
Security firm AVG has come under fire for recent updates to their privacy policy. The new policy explicitly gives the company the ability to sell browsing and search history to third parties. → Read More
A lock screen bypass vulnerability has been discovered in Android version 5.0-5.1.1. The bypass allows an attacker to gain full access to a locked device even when encrypted. → Read More