Razer unveils 'Wolverine Ultimate' wired pro gaming controller for Xbox One and PC

Rzr_WolverineUlt_V01

Video games are big business nowadays. Not only are consoles and gaming PCs quite expensive, but so too are the games -- especially when you factor in DLC. Not only that, but hardcore gamers are even spending big bucks on "professional" accessories too, such as mice, keyboards, headsets, and more.

Today, Razer unveils what it calls a professional grade controller for Xbox One and PC. The "Wolverine Ultimate," as it is called, is a wired affair -- there is no wireless to be found. Since it is a gaming product, it even features customizable RGB lighting -- we must put lights in all the things! Of course, as you can expect, the controller is quite expensive. Believe it or not, Wolverine Ultimate costs more than Microsoft's "Wireless Elite" controller.

Continue reading

Did a company just accidentally confirm that iPhone 8 supports Qi wireless charging?

RAVPower Wireless Charging Pad - Side View

The iPhone 8 should be arriving next month, and speculation and rumors about the device are coming fast and furiously. Heck, I found myself staring at Apple CEO Tim Cook's crotch on Twitter today. Don't judge me, please.

One of the rumored features of Apple's next flagship is wireless charging. Yes, I know, that is something that has been on both Android and Windows Phones for years. As is typical with Apple, however, the company often waits until a feature is perfected -- being first be damned. A popular accessory maker may have just accidentally confirmed that the iPhone 8 will not only support wireless charging, but more specifically, it will use Qi technology and not something proprietary. Whoops!

Continue reading

Estonia wants to launch ESTCoin to complement e-residency program

Aerial panorama of Tallinn, Estonia

Estonia is set to emphasize its digital technology prowess with the proposed launch of a new national digital currency.

The Baltic state is considering an initial coin offering (ICO) for the launch of ESTCoin, its very own cryptocurrency,

Continue reading

Google Play apps spread malware through advertising SDK

Android smartphone malware

Through the use of an advertising software development kit contained in 500 apps on the Google Play Store, cybercriminals were able to spy on users and even infect their mobile devices with malware.

That's according to security firm Lookout, which discovered that the Android apps in question all had the lgexin ad SDK built into them which gave unauthorized third parties access to user devices.

Continue reading

There's a bulge in Tim Cook's pants that has aroused my curiosity -- is it Apple iPhone 8?

timcookpocketzoom8

Next month, Apple is expected to introduce a new smartphone -- probably a few new models, actually. What most folks are excited about, however, is the rumored "iPhone 8." There has been some speculation that it will be an extremely premium -- and expensive -- smartphone. Some leaked designs imply that it will have almost no bezels, while ditching the bottom physical home button and extending the screen to the very top, wrapping around the front camera and ear piece -- similar to the Essential Phone.

Based on the rumors, the iPhone 8 -- if that is even what it will be called -- could be narrower and taller than existing models, such as the iPhone 7 and 7 Plus. That's why I found myself quite excited while looking at a Tweeted picture of Tim Cook's pants today. In a Tweet Cook sent from a manufacturing plant, there is a bulge in his right pocket that is clearly an iPhone. But which model is it?

Continue reading

How to unlock your Samsung Galaxy Note8

Samsung Galaxy Note 8

Ladies and gentlemen, it finally happened! Samsung unveiled the Galaxy Note8, one of the most expected smartphones of the year and, most likely, the device that should help the manufacturer fully regain users’ trust, after the entire Galaxy Note7 story.

At first look, it’s an amazing device and, like expected, it also comes with an amazing price. And not in a good way, so we won’t be surprised if a lot of people want to get it with a carrier contract and then unlock it. The good news is that you can easily unlock your Galaxy Note8 now, using a simple and quick method.

Continue reading

How to add Google Maps search engines to Chrome

google-maps-laptop

To make it quicker to perform searches using Google Maps, you might want to consider adding the site as a search engine in Chrome. This will save you having to manually visit the site before you start a search, and it's a pretty neat option.

In fact, we’re going to show you how to add Google Maps to Chrome as a search engine in a couple of ways. The first is a simple option to look for a place on Google Maps. The second enables you to search for directions from your home address to your desired destination. Here's what you need to do.

Continue reading

You can help Purism build the secure open source Linux-based 'Librem 5' smartphone

Phone From All Angles

It used to be that very privacy conscious people were viewed as being a bit paranoid. Some of these evangelists for security and privacy would speak of conspiracy theories about governments and hackers accessing your email, private data, webcam feeds, and more. Well, it turns out many of these folks weren't crazy, and their conspiracy theories were actual fact. As Edward Snowden highlighted, some governments and other organizations are out to spy on you -- both for control and profit.

Thankfully, consumers are starting to wake up and become more aware, and some companies, such as Purism, are designing products to safeguard users. The company's laptops, for instance, run an open source Linux-based operating system, called "PureOS" with a focus on privacy. These machines even have hardware "kill switches" so you can physically disconnect a webcam or Wi-Fi card. Today, Purism announces that it is taking those same design philosophies and using them to build a new $599 smartphone called Librem 5. The planned phone will use the GNOME desktop environment and PureOS by default, but users can install different distros too. Sound good? Well you can help the company build it through crowdfunding.

Continue reading

Government organizations lag behind in implementing latest security practices

Security man expert suit

Cyber attacks are becoming more complex and intense. In addition, many hackers are interested in the types of sensitive data held by government bodies. Yet a new study shows that these organizations are lagging behind in dealing with IT risks.

The study by data visibility platform Netwrix reveals that while 57 percent of government entities focus on endpoint protection, 72 percent experienced security incidents in 2016, the most common reasons being human errors and insider misuse.

Continue reading

When will Google launch the Pixel 2 and Pixel XL 2?

Google Pixel

With the Pixel and Pixel XL on the market for nearly a year and Android 8.0 Oreo launched this week, it will not be long until Google takes the wraps off the second-generation Pixel smartphones. Question is, when can we expect the big announcement to be made?

Considering that Android 8.0 Oreo arrived one year after its predecessor, it is likely that Google will wait until early-October to unveil the Pixel 2 and Pixel XL 2. Last year, that's when it announced the first-generation. And a tweet from famous leaker Evan Blass lends credence to this theory.

Continue reading

Non-Windows platforms increasingly at risk from malware

Malware magnifier

Where it was once the case that damaging malware attacks were aimed solely at Windows devices, a new study shows that strategic attacks on both Mac and Android devices are rapidly rising.

The report by Malwarebytes reveals that Android ransomware was up by more than 100 percent in the second quarter of 2017. In addition, Mac malware
this year is already at the highest it has ever been.

Continue reading

How Neurostimulation can help with stroke rehabilitation and create super-soldiers of the future [Q&A]

Neuro thumb

My dad had a stroke in his early 60s that left him partially paralyzed. He later had another stroke that killed him. That had a big impact on my life, and since then I’ve been interested in stroke research, and medical advancements in that field.

Neurostimulation in particular is proving beneficial to stroke victims, and I spoke to Nexeon CEO and neurotechnology expert Will Rosellini and Director of Clinical Research Navid Khodaparast about how it’s helping enhance stroke rehabilitation, and its future potential for augmenting healthy brains.

Continue reading

Remove stubborn apps, plugins and bundleware using IObit Uninstaller 7

iobit_uninstaller7

Whilst dealing with malicious software is an ongoing issue, people overlook problematic software, downright stubborn applications and unwanted bundleware that can be difficult to fully remove from your system.

We can’t tell you how many people install security software, uninstall using Add/Remove Programs only to find new security won’t install as the previous suite wasn’t fully removed.

Continue reading

With Android Oreo, Google is stepping up app security

oreo-app-security

App security is undeniably an issue for Android users, particularly those who choose to install apps from outside of Google Play. Even apps that are housed in the main store are not immune to security issues, but those from other sources are rather more risky.

With Android O, Google has ditched "Allow unknown sources" -- the setting that could be toggled to allow for the installation of non-Play apps. Instead, there is a new "Install unknown apps" permission, and Google thinks this offers more control and greater security.

Continue reading

Google to reveal Titan security chip for cloud services

google-mountain-view

In an effort to better compete against Amazon and Microsoft in the cloud computing space, Google will this week reveal the technical details of its new Titan computer chip designed to protected the data centers powering its cloud services.

Apparently the chip is the size of a small stud earring and the search company has already installed it in many of the servers and network cards that comprise its own massive data centers. Titan scans network hardware to detect if any unauthorized changes have been made and if so the chip will prevent it from booting up.

Continue reading

Load More Articles