July 29, 2014 By Jay D
Security researchers have found yet another exploit on the Amazon cloud computing platform through the Elasticsearch distributed search engine tool. According to analysis, hackers are able to gain
In early June, Samsung Electronics unveiled its new flagship smartphone that is the first to run on the still fresh Tizen operating system – a bold move by the Korean phone maker to break away from
July 28, 2014 By Tuan Do
This is a post in my series of articles reviewing customer service from different companies/organizations.
A few days ago, I got a problem with my Philips Fidelio HTL7180 soundbar as it kept making
July 28, 2014 By Jay D
A security researcher has discovered several features on the iOS ecosystem that is responsible for circumventing the encrypted backup protection for sensitive data and metadata stored in iOS devices.
July 28, 2014 By Adeel Inam
Recovering data from a bricked or damaged iOS device is not as easy as recovering data from an Android device. Due to the strict iOS nature, you just cannot plug in your iOS device to your computer
For those who are not satisfied with what phone makers have built into their purchased devices, jailbreaking is the best resort. The full control that you would get over your phone by lifting the
July 27, 2014 By Jay D
Since rumors erupted that Apple is preparing to unveil two variants of the forthcoming iPhone 6 – a 4.7-inch and 5.5-inch models – questions began to linger around the impetus for such a move by the
Security researchers from AlienVault Labs have discovered a flaw in the Internet Explorer browser that hackers have been using to perform surveillance on computer networks and systems to find out the