By Don Reisinger The phone comes with a Qualcomm Snapdragon 400 processor and features everything from 4G LTE to NFC support.
Author Archives: admin
Apple updates Macs without asking, but it’s to foil hackers
By Rich Trenholm Apple is pushing out its first automatic security update to protect your computer from being taken over by wrong’uns.
North Korea’s Internet starts to return after total shutdown
By Rich Trenholm The totalitarian regime may have been hit by a cyberattack in the midst of a war of words with the US over the Sony hack and the movie “The Interview”.
North Korea’s Internet starts to return after total shutdown
By Rich Trenholm The totalitarian regime may have been hit by a cyberattack in the midst of a war of words with the US over the Sony hack and the movie “The Interview”.
Android One set to roll out to Sri Lanka, Bangladesh, Nepal
By Don Reisinger The platform, first launched in India, is heading to other parts of Asia as part of Google’s effort to bring affordable smartphones to emerging markets.
Google wants auto industry help for self-driving cars
By Charlie Osborne The tech giant is going full throttle with the project, but could do with the expertise of car manufacturers.
Infrared shows us the Horsehead Nebula as never seen before
By Michelle Starr The famous Horsehead Nebula has been literally seen in an entirely different light, as NASA’s Spitzer captures it in infrared.
Gamer pleads guilty to making emergency call to report Grand Theft Auto shooting
By Chris Matyszczyk An allegedly “confused” gamer calls emergency services and says there’s been a shooting at his house. He was actually describing the action in his “Grand Theft Auto” game.
The peculiar star of the Sony hack: Email
By Richard Nieva The massive hack has raised questions about First Amendment rights, privacy and cyberwarfare. But there’s a subtler issue at play when we look at all the news stories that have come from hacked inboxes: Why do we put this stuff in email?
Staples: Hack may have affected more than a million payment cards
By Edward Moyer The office supply chain says a breach that took place earlier this year gave attackers access to cardholder names, card numbers, expiration dates and card verification codes.