Notebookcheck Logo

Security

    settings restrict
Page Type
Restrict articles to display by Page Type. Each article only falls under one Page Type category.
, , , , , , ,
, , , , , , , , , , , , , , , , , , , , , , , , , , ,    
Tags
Restrict articles to display by their associated tags. Articles can have multiple tags and can be further restricted with the "and" or search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,    
Search
Search by article title: 
additional restrictions: Security
The wolf in sheep's clothing which snuck into thousands of unsuspecting digital pens. (Source: SwiftOnSecurity)

A fake Adblock Plus extension has infected about 37,000 Google Chrome users

Posing as the world's most popular ad-blocking software, a fraudulent extension made it onto the Chrome Web Store and tricked tens of thousands of victims into installing what turned out to be a very annoying piece of adware.
John Garcia, 10 Oct 2017 21:42
A more fitting name if this trend of fails continues. (Source: CHEIL India)

OnePlus is collecting user data without permission, and you should be scared

OnePlus has dropped the ball yet again, with a user discovering a data siphon that sends his private phone information and logs to a remote OnePlus server.
Ricci Rox, 10 Oct 2017 12:33
The next all-touchscreen smartphone from BlackBerry has surfaced. (Source: Evan Blass)

Blackberry's next all-touchscreen smartphone leaks out

Serial leaker Evan Blass has introduced the new BlackBerry Motion to the world. The new device will be the third touchscreen-only Android-based model from the the once dominant Canadian smartphone maker.
Sanjiv Sathiah, 06 Oct 2017 11:53
Yahoo? Help! (Source: Yahoo)

All 3 billion Yahoo user accounts were involved in the 2013 data breach

If you held a Yahoo account in 2013, then you were almost certainly involved in the data breach. At 3 billion user accounts affected, this announcement sets the record for the largest known data breach.
Craig Ward, 04 Oct 2017 02:26
Austrian and Chinese scientists conversed over the quantum-secured communication line. (Source: Austrian Academy of Sciences)

Chinese and Austrian scientists make first unhackable quantum video call

The quantum communication process involves data that is embedded into entangled photons. Any unauthorized tempering with the quantum data stream is immediately exposed and the quantum signature is automatically changed to prevent further data tempering.
Bogdan Solca, 03 Oct 2017 11:32
What Can a Chromebook Do?

What can you do with a Chromebook?

Chromebooks, which run on Google's ChromeOS, have quickly become one of the major drivers of mobile computing as they provide an easy way to access the web without worrying a lot about deployment, administration and configuration. Although ChromeOS is an almost online-exclusive OS, Chromebooks can still be adapted to handle most workflows. In this article, we explore what a Chromebook can do and help you decide if you should be hopping on the Google bandwagon.
Vaidyanathan Subramaniam & Sam Medley, 03 Oct 2017 09:24
Sirin Labs intends to bring the crypto world closer to mainstream with the upcoming Finney devices.

Sirin Labs is developing world's first blockchain smartphones and PC terminals

The Finney smartphones and PC terminals will be the first open-soruce devices to connect to an independent blockchain network. These will run a proprietary Android-based Shield OS that comes with an array of security features like behavioral based intrusion prevention system, secured communications through VoIP, text or email, and biometric authentication. The smartphones are expected to cost around US$1,000 and the PC terminal could be priced at US$799, but the prices might be modified after the crowdfunding campaign scheduled for this October.
Bogdan Solca, 28 Sep 2017 15:00
The Wi-Fi exploit could be affecting billions of devices. (Source: Google)

Google and Apple release emergency patches to fix Wi-Fi exploit in iPhone 7 and Galaxy S7 Edge

The Wi-Fi exploit works with any mobile device that integrates Broadcom Wi-Fi chips. Google and Apple claim they have released emergency patches for Android 8.0 Oreo and iOS 11, but it may take some time to patch all devices.
Bogdan Solca, 27 Sep 2017 15:02
No indication from Showtime whether the script was placed by them, or if their websites were hacked. (Source: Showtime)

CBS-owned 'Showtime' joins The Pirate Bay and rogue chrome extensions in using your CPU to mine cryptocurrency

CoinHive's cryptomining JavaScript has been found embedded in the site code of two of Showtime's websites, causing increases CPU usage. The script has now been removed, but silence from Showtime leaves the question open on whether they had placed the code there, or if their websites were hacked.
Craig Ward, 26 Sep 2017 17:15
The neuromorphic processor integrates 130,000 artificial neurons that can develop 130 million synapses. (source: Intel)

Intel presents its first self-learning neuromorphic processor codenamed Loihi

Intel's self-learning Loihi processor is built using the 14 nm manufacturing process and integrates 130,000 artificial neurons that can develop up to 130 million synapses. The chip can perform training and inference tasks, so it adapts in real time to environmental variables. Loihi could power self-driving cars in a few years, but it could also help improve education, facial recognition, manufacturing, emergency services and smart cities.
Bogdan Solca, 26 Sep 2017 15:04
All this considered, this is about par for cyber information control in most parts of the world. (Source: The Verge)

Your private data isn't so private after all, Wechat confirms

It's been a good week for privacy intrusions, with GO Keyboard being reported to siphon user data. This time out, it's the Wechat app on all the headlines, as the app's new privacy policy sheds light on how public, private user data actually is.
Ricci Rox, 24 Sep 2017 09:56
The main weakness of pattern and PIN is the ability for those around you to obverve entry. (Source: Msporch/Pixabay)

Android pattern unlock is the easiest authentication method to snoop

A study by researchers from the University of Maryland and the US Naval Academy has been published showing that a six-spot pattern unlock is six times easier for snoopers to repeat after seeing once than a six-digit PIN.
Craig Ward, 23 Sep 2017 02:20
Image: Twitter user Nick Sweeting

Equi-fail: Equifax directs customers affected by hack to fake phishing website

In another major misstep for Equifax, an employee of the credit services company responded to customer tweets with a link to a fake phishing website. The site, which was styled to look like the official Equifax site dedicated to the hack, was a fake used to demonstrate how easily malicious parties could further exploit Equifax's customers.
Sam Medley, 21 Sep 2017 23:58
CCleaner's binary was modified by hackers to insert a backdoor. (Source: Piriform)

CCleaner hijacked by hackers to open a backdoor for remote code execution

Piriform, makers of the popular PC cleaning software CCleaner, said that a few versions of the program's 32-bit binary were hijacked by hackers who could insert a two-stage backdoor capable of remote code execution. Investigation is on to understand what exactly caused the hijack that resulted in about 2.27 million users getting affected.
Vaidyanathan Subramaniam, 19 Sep 2017 10:20
Google Tez aims to make payments hassle-free. (Source: Google)

Google Tez aims to revolutionize the digital payment landscape in India

Google has launched a new payment service, Tez, which enables fast payments without the need to share information such as bank account numbers, fund transfer codes, or even pair up mobiles by NFC. The new service is compatible with any Indian bank that supports the Unified Payments Interface (UPI).
Vaidyanathan Subramaniam, 18 Sep 2017 21:11
Image: Equifax

Equifax security breach blamed on known web vulnerability in Apache Struts

One week after announcing a major data breach affecting over 143 million consumers, Equifax is pointing blame at a security vulnerability in the Apache Struts web framework. However, the vulnerability was publicly announced in March and a patch was available months before the attack.
Sam Medley, 14 Sep 2017 22:15
The QNAP TS-x77 features upto an 8-core 16-thread AMD Ryzen 7 CPU and 64 GB of RAM. (Source: QNAP)

QNAP briefs about QTS 4.3.4 OS and the TS-x77 NAS powered by AMD Ryzen

QNAP offered a glimpse into some of the advancements coming to the QTS 4.3.4 operating system that includes new features such as snapshot support for ARM-based QNAP NAS. It also offered a closer look into the TS-x77 NAS powered by AMD Ryzen CPUs.
Vaidyanathan Subramaniam, 14 Sep 2017 09:54
Windows 10 Fall Creators Update is due on October 17th. (Source: Microsoft)

Android and iOS-like app permissions coming to Windows 10 apps

Microsoft is bringing app permissions for improved privacy and security with UWP (Windows Store) applications. Admins of the Enterprise Edition have an option to reduce the diagnostic data collected to be reduced to the minimum needed for administration by company IT departments.
Craig Ward, 13 Sep 2017 21:30
Armis Labs warns that current security solutions will not detect BlueBorn, beacuse these are focused on IP attacks, not on airborne attacks. (Source: Armis Labs)

BlueBorne vulnerability could target billions of unpatched Bluetooth devices

Armis Labs discovered a Bluetooth vulnerability codenamed BlueBorne that could affect billions of devices including smartphones like Google Pixel and Samsung Galaxy, tablets like Samsung Galaxy Tab, smartwatches like LG Watch Sport, or audio systems like the Pumpkin Car Audio System. BlueBorne can also attack unpatched Windows and Linux PCs, and a variety of smart appliances like TVs and security cameras. In order to avoid the proliferation of the BlueBorne vulnerability, users are cautioned to permanently disable their Bluetooth connections until proper patches are issued.
Bogdan Solca, 13 Sep 2017 14:42
Graph of the increase in cryptocurrency mining trojans as measured by Kaspersky Labs. (Source: Bleeping Computer)

Cryptocurrency mining malware has infected over 1.65 million computers this year

Data from Kaspersky Labs shows that the number of cryptocurrency mining trojan infections in 2017 has passed 1.65 million to date. Criminals use infected PCs to crunch transactions and route the success fee to their own digital wallets.
Craig Ward, 12 Sep 2017 21:58
Google Chrome. (Source: Google)

Google Chrome to include protection from man-in-the-middle attacks

Google Chrome 63 will come with a feature designed to protect users from third parties who are attempting to intercept their encrypted SSL transmissions.
Craig Ward, 11 Sep 2017 21:48
Swelling batteries in the XPS 15 9550 have caused displacement of trackpads rendering them useless. (Source: User Crashnorun on the Dell Support Forum)

PSA | Dell offers to replace swelling XPS 15 9550 batteries for free, even if out-of-warranty

There were problems with batches of 84Wh batteries in the XPS 15 9550 that led to the battery bulging and pushing against the trackpad. Once the swelling was bad enough, it not only hindered the trackpad function but also posed a safety hazard. Users are now reporting that Dell is now finally accepting out-of-warranty battery replacements for the XPS 15 9550.
Vaidyanathan Subramaniam, 10 Sep 2017 17:17
ASRock's X10 IoT router can remotely control various smart appliances around the house. (Source: ASRock)

ASRock's X10 IoT Router remotely controls home appliances over radio and IR

The X10 comes with the usual dual band Wi-Fi and Gigabit Ethernet connections, but also offers remote control capabilities for smart home appliances through the integrated ZigBee radio controller and IR blaster.
Bogdan Solca, 08 Sep 2017 11:29
Equifax announces major security breach affecting 143 million customers in the U.S.

Equifax announces major security breach affecting 143 million customers in the U.S.

Equifax announced today that the personal information of over 143 million American consumers was compromised in late July. Items such as birth dates, social security numbers, and even drivers licenses were stolen by hackers, in addition to over 200,000 credit card numbers.
Sam Medley, 07 Sep 2017 23:57
Apple's Siri is vulnerable to ultrasonic voice hacks.

Siri and Alexa are vulnerable to ultrasonic voice commands

Chinese researchers have been able to launch malicious voice command attacks on every major voice assistant including Siri and Alexa. Using ultrasonics, the researchers were able to hack devices with any victim completely unaware that their device had been compromised.
Sanjiv Sathiah, 07 Sep 2017 13:15
Lenovo has been fined US$3.5 million and had restrictions placed on pre-installed software on their systems in the United States. (Source: Geralt/Pixabay)

Lenovo fined US$3.5 million for pre-installing adware on some laptops in 2015

The saga about some Lenovo laptops coming pre-installed with adware in 2015 has now come to an end with the results of their court case being announced a few hours ago. Lenovo must pay a fine of US$3.5 million and has had some restrictions placed on how they handle pre-installed software in the United States.
Craig Ward, 06 Sep 2017 01:07
The Windows 10 Fall Creators Update is all set to roll out starting October 17

IFA 2017 | Windows 10 Fall Creators Update will officially roll out starting October 17 along with a slew of Windows Mixed Reality headsets

At its IFA 2017 keynote in Berlin, Microsoft announced that the Windows 10 Fall Creators Update will start officially rolling out starting October 17. Microsoft's partners will also start shipping affordable Windows Mixed Reality headsets alongside the new OS update.
Vaidyanathan Subramaniam, 01 Sep 2017 16:01
Insiders can now test drive full Office 365 apps directly from the Windows Store. (Source: Windows Central)

Microsoft invites Insiders to test drive Office 365 from the Windows Store

Microsoft is inviting Insiders to test out Office 365 programs from Windows Store. These are the original Win32-based programs converted using the Project Centennial desktop bridge that can now call UWP-specific APIs and services.
Vaidyanathan Subramaniam, 01 Sep 2017 13:24
Image: Essential

Andy Rubin issues apology for Essential customer privacy debacle

After a massive privacy foul-up, Essential's Andy Rubin has issued a formal apology to customers that had their personal information emailed to other customers. Essential will provide affected individuals with a one-year subscription to LifeLock and, possibly, a free Essential Phone.
Sam Medley, 31 Aug 2017 15:34
Acer Holo360 (left) and Acer Vision360 (right) LTE enabled 360-degree cameras. (Source: Acer)

IFA 2017 | Acer showcases 360-degree cameras with LTE connectivity

Acer has showcased two LTE enabled 360-degree cameras, the Holo360 and Vision360, at its IFA press conference. The Holo360 is a one-stop device for all things concerned with video recording, editing and sharing while the Vision360 is an in-car camera designed to augment driving safety.
Vaidyanathan Subramaniam, 31 Aug 2017 12:25
Toshiba Tecra X40-D (i7-7600U, FHD) Laptop Review

87% Toshiba Tecra X40-D (i7-7600U, FHD) Laptop Review

Carbon Copy. Toshiba's new Tecra X40-D is the Japanese manufacturer's latest entry in the thin-and-light business market and carries over several features from its smaller brother, the Portégé X30. Is the X40 able to differentiate itself enough, or is it more of the same in a larger package?
Intel Core i7-7600U, HD Graphics 620, 14", 1.3 kg
Sam Medley, 31 Aug 2017 09:09
Deep digging into the Intel ME firmware has finally enabled security researchers to disable its functioning. (Source: Positive Technologies)

Eureka! The Intel Management Engine can finally be disabled, thanks to the NSA

Researchers have found a way to disable a much hated component of Intel CPUs — the Intel Management Engine, thanks in part to the NSA's High Assurance Platform (HPA) program.
Vaidyanathan Subramaniam, 30 Aug 2017 20:37
WhatsApp will soon enable verified business numbers as a medium for customer interaction. (Source: WhatsApp)

WhatsApp will soon allow you to chat with verified businesses

Facebook-owned WhatsApp has started a pilot program to verify business numbers. This allows customers to directly chat with businesses for quicker updates and problem resolution.
Vaidyanathan Subramaniam, 30 Aug 2017 15:32
Verizon is one the first US carriers to roll out the new Android Oreo OTA update. (Source: Verizon)

Verizon starts rolling out Android Oreo to Google Pixel handsets

Contrary to popular notion, Verizon has started to seed the Android Oreo update to Google Pixel phones on its network much before any other major US carrier has initiated the process.
Vaidyanathan Subramaniam, 30 Aug 2017 09:30
Google's Certified Android devices program is a continuation of its security efforts. (Source: Google)

Google launches Certified Android device program

Google has announced its new Certified Android devices program. Designed to give customers the guarantee of a malware-free device out of the box, it is the company's latest effort to clamp down on Android security.
Sanjiv Sathiah, 29 Aug 2017 13:45
NY Mayor Bill de Blasio with NYPD deputy commissioner for IT, Jessica Tisch. (Source: NY Post)

NYPD contemplating on replacing 36,000 odd Windows Phones with iPhones

In the continuing habitual setback for Microsoft in its mobile endeavors, the NYPD will soon be scrapping its 36,000 odd smartphones running Windows Phone 8.1 for iPhones. The department is taking the decision in the wake of Microsoft halting updates for the ill-fated mobile OS.
Vaidyanathan Subramaniam, 29 Aug 2017 08:20
The Librem 5 will feature hardware kill switches for the camera, microphone, and wireless radios. (Image: Purism)

Purism turns to crowdfunding to develop their Linux-based smartphone

The Librem 5, currently up for preorder through a crowdfunding campaign, is Purism's attempt to create a privacy-focused smartphone. The phone will run a mobile variant of PureOS, which is Purism's own custom GNU/Linux-based operating system.
Sam Medley, 24 Aug 2017 22:43
Windows 95 is still used in various machines around the world, including critical systems inside the Pentagon. (Source: Brian Miller)

Windows 95 turns 22 - still lurks inside Pentagon's critical systems

22 years after its release, Microsoft Windows 95 is still running on machines around the world, including critical systems inside the Pentagon. The US Department of Defense is collaborating with Microsoft to migrate all Pentagon systems to Windows 10.
Bogdan Solca, 24 Aug 2017 17:05
Not all apps using the Igexin SDK were found to be collecting data, but they all had the potential to do it. (Source: Pixabay)

Igexin use their advertising SDK to siphon user data back to their servers in China

Igexin, the developer of an advertising software kit, has been caught collecting user data and sending it back to servers in China. Their kit was used in 500 legitimate applications and used the permissions granted to those apps to collect data such as call logs. Google has disabled the compromised applications while the developers replace the advertising APIs.
Craig Ward, 23 Aug 2017 23:05
Latest XPS 13 9360 1.0.7 BIOS update purportedly bricking systems

Latest XPS 13 9360 1.0.7 BIOS update purportedly bricking systems

In what could be another potential PR headache for Dell, the latest 1.0.7 BIOS update for the XPS 13 may be accidentally rolling back systems. It's recommended that XPS 13 owners do not install this latest update until Dell either reuploads a replacement or directly addresses users' complaints.
Allen Ngo, 23 Aug 2017 04:57
Hacking your phone through the touchscreen? Yes, it can be done. (Image: Shattered Trust)

New research paper demonstrates smartphone security hole in replacement hardware

A research team has successfully compromised a smartphone by injecting malicious code into the drivers for the touchscreen. The code allows full access to the device, including the ability to alter files, use the phone's camera, download malicious apps, and grant root access without unlocking the bootloader.
Sam Medley, 22 Aug 2017 23:36
BlackBerry KEYone

83% BlackBerry KEYone Smartphone Review

Press me! TLC has presented a new BlackBerry smartphone with a physical keyboard: the KEYone. The new smartphone combines a 4.5-inch touchscreen with a touch-sensitive keyboard that can also be used as a Trackpad.
Update: Build AAN358 is rolled out.
Qualcomm Snapdragon 625, Adreno 506, 4.5", 180 g
J. Simon Leitner, Daniel Schmidt, 22 Aug 2017 15:47
Ransomware Locky and Mamba have started rearing their ugly heads again. (Source: 2-Spyware)

Beware! Ransomware Locky and Mamba on the prowl again

Variants of ransomware Locky and Mamba have resurfaced and are more lethal than ever. Those unfortunate to be infected, risk encryption of the entire HDD and need to cough up a huge sum of money for decryption and recovery of their data.
Vaidyanathan Subramaniam, 18 Aug 2017 07:55
Microsoft buys Cycle Computing to accelerate Big Computing in the cloud

Microsoft acquires Cycle Computing

Thanks to the addition of the cloud computing orchestration market leader Cycle Computing to its long list of assets, Microsoft hopes to ease the process of using High-Performance Computing and other Big Computing capabilities in the cloud.
Codrut Nistor, 16 Aug 2017 09:50
Source: Amazon

BLU R2 budget smartphone now available for preorder

The latest budget-tier smartphone from BLU is now available for $80, although buyers will have to eschew some modern comforts like LTE connectivity at that price. For an extra $30, the R2 LTE offers a slight spec bump and 4G LTE speeds.
Sam Medley, 15 Aug 2017 23:14
Infographic showing how the blockchain works with cryptocurrencies. (Source: Oxfam/Financial Times)

Microsoft is making it easier for enterprise to integrate block chain technology

Microsoft has announced their 'Coco Framework' which will officially be released as an open-source project on GitHub in 2018. The Coco Framework is intended to help make blockchain technology a viable and secure option for industries to use to share and verify records and transactions.
Craig Ward, 12 Aug 2017 20:39
MIUI is compromising device security according to eScan. (Source: Xiaomi)

MIUI security flaws allow uninstallation of security apps and easy copying of data

eScan, a software security company, has reported on a number of vulnerabilities in Xiaomi's MIUI. The two principal ones allow the uninstallation of security apps and the transferring of phone data without prompting for the user password. Xiaomi disputes the findings of the report, claiming that using a PIN, password, pattern, or fingerprint will avoid these problems.
Craig Ward, 12 Aug 2017 17:58
The solution with the best result used sodium sulfate (Na2SO4), a compound found in detergents. (Source: Wikimedia Commons)

Researchers create flexible salt-based batteries

A team of researchers have been experimenting with various sodium-based solutions to replace lithium-ion batteries with significant success. Sodium-ion batteries (SIBs) would be advantageous as they would not require as many safeguards due to the more benign nature of sodium versus lithium.
Douglas Black, 12 Aug 2017 04:01
suhide-lite can bypass Google's SafetyNet, allowing rooted phones to run apps that would otherwise be restricted. (Source: XDA-Developers)

It's now easier to hide root on your Android phone with suhide-lite

A new SuperSU package by developer Chainfire allows users to hide root status from specific apps, which can enable the use of certain apps on rooted devices that would otherwise be blocked via Google's SafetyNet API.
Sam Medley, 11 Aug 2017 22:47
The malicious software is activated whrn the DNA sequencer analyzes the data. (Source: Shutterstock)

Biohackers splice malware directly into DNA strands

Scientists came up with a plan to infect computers using altered human DNA. The malicious code is activated when the altered human genetic code is analyzed by a DNA sequencer that is hooked to a computer network.
Bogdan Solca, 11 Aug 2017 14:46

Tags

3D Printing (231) 5G (5287) 6G (3) Accessory (9006) AI (2114) Alder Lake (1080) AMD (6199) Android (28123) Anime / Manga (51) Apple (5971) Arc (232) ARM (8639) Arrow Lake (324) Astronomy / Space (414) Audio (2767) Benchmark (555) Biotech (336) Blackwell RTX 5000 (297) Business (11710) Camera (1746) CES 2026 (222) Cezanne (Zen 3) (267) Charts (875) Chromebook (518) Climate (9) Comics (16) Concept / Prototype (222) Console (3918) Convertible / 2-in-1 (2170) CPU (275) Cryptocurrency (393) Cyberlaw (721) Deal (6111) Desktop (7561) DIY (398) Drone (182) E-Ink (166) E-Mobility (3981) Education (68) Exclusive (35) Fail (2109) FemTech (15) Foldable (1825) Gadget (5107) Galaxy A (222) Galaxy M (10) Galaxy S (2801) Galaxy Tab (664) Game Releases (877) Gamecheck (238) Gamescom 2025 (37) Gaming (20189) Garmin   Gator Range (1) Geforce (4885) Google Pixel (1640) GPU (2299) Hack / Data Breach (60) Handheld (1782) Health (71) Home Theater (1147) How To (99) Humor (23) IFA 2025 (86) Intel (2393) Intel Evo (392) Internet of Things (IoT) (1013) iOS (1340) iPad (322) iPad Pro (694) iPhone (2900) Jasper Lake (60) Laptop (13512) Launch (10956) Leaks / Rumors (16960) Linux / Unix (1022) List (406) Lucienne (Zen 2) (51) Lunar Lake (261) MacBook (1156) macOS (143) Medusa Point   Meteor Lake (382) Microsoft (397) Mini PC (1670) Monitor (2408) Movies / TV-Shows (186) MS Surface (64) MSI (524) NAS (63) Network (31) Nova Lake (6) Nvidia (824) Open Source (335) Opinion (396) Panther Lake (66) Public Transport (23) Radeon (548) Raptor Lake (728) Renewable (431) Renoir (379) Retro (221) Review Snippet (1642) RISC-V (58) Robot / Robotics (146) Robot Vacuum (78) Rollable (1) Rugged (195) Ryzen (Zen) (2206) Samsung (916) Science (1051) Security (1502) Server/Datacenter (140) SFF (6) Single-Board Computer (SBC) (609) Smart Home (3478) Smartphone (27390) Smartwatch (4533) Snapdragon X Series (138) Social Media (253) Software (10352) Sports / e-Sports (140) Storage (2667) Tablet (5626) ThinkPad (1676) Thunderbolt (1403) Touchscreen (8235) Ultrabook (2708) Virtual Reality (VR) / Augmented Reality (AR) (1009) Watch (27) Wearable (6258) Wi-Fi 7 (328) Wi-Fi 8   Windows (8345) Workstation (1374) XPS (424) Zen 3 (Vermeer) (352) Zen 4 (589) Zen 5 (499) Zen 6 (17)
Please share our article, every link counts!
Mail Logo
Google Logo Add as a preferred
source on Google
Redaktion, 2013-05- 8 (Update: 2013-09-27)