Notebookcheck Logo

Security

    settings restrict
Page Type
Restrict articles to display by Page Type. Each article only falls under one Page Type category.
, , , , , , ,
   
Tags
Restrict articles to display by their associated tags. Articles can have multiple tags and can be further restricted with the "and" or search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Search
Search by article title: 
additional restrictions: Security
Russian and Belarusian hackers reportedly target Ukraine and its allies. (Image source: Michael Geiger)

Russian and Belarusian hackers launch large scale phishing attacks against Ukrainian and European entities, reveals Google

Google's Threat Analysis Group has pointed out in a blog post that Russian and Belarusian hackers are targeting Ukrainian and Polish military and governmental entities with phishing attempts. Hacking groups FancyBear and Ghostwrit...
Fawad Murtaza, 08 Mar 2022 18:41
Samsung has admitted that source code used for its Galaxy devices was recently stolen. (Image source: Babak via Unsplash)

Samsung confirms hack while alleged bad actors leak 190GB of data from the breach

Samsung has admitted that a recent security breach has led to the theft of source code used for its Galaxy devices. The company confirmed that the hackers did not steal any customer or employee personal information.
Polly Allcock, 07 Mar 2022 20:52
The South American group of hackers called Lapsus$ has apparently leaked over 70,000 credentials of Nvidia employees (Image: Nvidia)

Ruthless hackers have leaked 71,355 email addresses and password hashes of Nvidia employees

The hacker group responsible for the leak just recently made headlines by demanding a whopping US$1 million for a bypass tool which is supposed to unlock the full cryptomining performance of Nvidia RTX GPUs with the infamous LHR h...
Enrico Frahn, 05 Mar 2022 19:14
Intel's 12th gen vPro is now available in four flavors across 150 designs. (Image Source: Intel)

Intel 12th gen vPro branches into four distinct platforms across Windows and Chrome, Control Flow Enforcement now coming to desktops for the first time

Intel has announced the new 12th gen vPro platform with enhanced security features for the new working normal. This time, vPro is being segregated into vPro Enterprise for Windows, vPro Essentials, vPro Enterprise for Chrome, and ...
Vaidyanathan Subramaniam, 03 Mar 2022 17:39
The Galaxy S21 Ultra is reputed to be one of the affected devices. (Image source: Denis Cherkashin)

Samsung has shipped around 100 million smartphones with faulty or weak encryption

Reportedly, Samsung has sent out tens of millions of smartphones with weak or faulty encryption. Estimates for the number of affected smartphones could reach 100 million and include all Galaxy S smartphones from the Galaxy S8 onwa...
Alex Alderson, 02 Mar 2022 14:41
Apple's tracker detection is allegedly getting beat at its own game. (Image source: Apple)

An Android app blows Apple out of the water when it comes to AirTag detection, study claims

A group of researchers has published a study claiming that their “AirGuard” Android app is better at detecting nearby AirTags than Apple’s tracker detection service on iOS. Incidents of AirTags being used to track and steal things...
Fawad Murtaza, 28 Feb 2022 23:53
15.4 adds many new features. (Source: Apple)

iOS 15.4 is slated to bring the most keenly-awaited Apple features to iPhones

iOS 15.4 is the next major software upgrade for iPhones. It is already available to preview in the form of developer betas. Apple has released four of these thus far, the latest of which add the latest updates to the AirTag system...
Deirdre O'Donnell, 27 Feb 2022 22:16
Team Green apparently managed to encrypt the hacked data in a reciprocal hack - but it was too late. (Image source: Nvidia/Unsplash - edited)

Jensen hacks back: Nvidia allegedly attacks ransomware group that stole 1 TB of Team Green's confidential data

Nvidia has reportedly been the victim of a ransomware attack, with the hackers successfully making off with over 1 TB of sensitive date from Team Green’s servers. In a surprising twist of events, the graphics card company, headed ...
Daniel R Deakin, 26 Feb 2022 23:51
Upcoming Windows 11 builds may show a watermark on unsupported hardware. (Image Source: Windows Latest)

Microsoft testing desktop watermark for Windows 11 builds on unsupported hardware

Microsoft is testing displaying a watermark on the desktop and in the Settings app if run on unsupported hardware. Microsoft is doing A/B testing of the watermark in Dev channel Build 22557. It remains to be seen whether such mess...
Vaidyanathan Subramaniam, 25 Feb 2022 11:32
A new malware has been discovered by cybersecurity firm ThreayFabric on the Play Store. (Image: RoonZ.nl via Unsplash)

A new money-stealing malware makes rounds on Google Play Store posing as an innocent app with over 50,000 downloads

A new type of malware has been discovered making rounds on the Google Play store. Posing as a run-of-the-mill device speeding app "Fast Cleaner", the malware attempts to steal financial information from users of more than 50 Europ...
Fawad Murtaza, 24 Feb 2022 14:49
NFTs have been stolen in a phishing attack on OpenSea users. (Image source: Michael Dziedzic via Unsplash)

NFTs valued at over US$1.7 million have been stolen from OpenSea users

A phishing attack on users of OpenSea has resulted in the theft of NFTs worth millions of dollars. The source of the attack remains unclear, with 17 affected users identified.
Polly Allcock, 22 Feb 2022 11:18
Steam has now removed mods by Chaos that contained potential malware and Bitcoin miners. (Image Source: Epic Games Store)

Potential malware-ridden, Bitcoin mining Cities: Skylines mods removed by Steam

Steam has now removed suspicious mods of the popular game Cities: Skylines after users complained of performance regressions upon installing a redesigned Harmony mod. Turns out that the redesigned mod was created by a notorious de...
Vaidyanathan Subramaniam, 18 Feb 2022 14:29
Fake Windows 11 upgrade website spreads malware that steals sensitive information. (Image: Unsplash)

Bad actors hide malware in fake Windows 11 upgrade site

HP Threat Research Blog has reported on a dubious Windows 11 upgrade website that distributes RedLine Stealer malware. Hackers are creating inventive websites such as the fake Windows 11 upgrade site or the similar phoney Discord ...
Aleem Ali, 17 Feb 2022 17:55
The CIA engaged in mass collection of data of some American citizens. (Image source: CIA)

CIA mass surveillance: the agency spied on and collected unknown data from U.S. citizens

CIA spied on some American citizens, a letter from members of the Senate Intelligence Committee has disclosed. The agency hid the surveillance program from the committee and didn't disclose the exact details of the kind of data co...
Fawad Murtaza, 14 Feb 2022 13:26
Apple's AirTags have developed an unwanted reputation. (Source: Apple)

Apple's latest "advancements" to the AirTag and FindMy systems are touted to address the rising "unwanted tracking" phenomenon

Apple's AirTags have become embroiled in a scandal that highlights their potential to facilitate crimes such as stalking, theft and general unsolicited e-tracking. Accordingly, the Cupertino giant has responded with an "update" th...
Deirdre O'Donnell, 13 Feb 2022 16:41
Apple releases new iOS and iPadOS versions. (Source: Apple)

Apple releases the incremental iOS and iPadOS 15.3.1 update to fix a crucial security discrepancy

iOS and iPadOS versions 15.3 were pushed in order to patch a slew of vulnerabilities on iPhones or iPads. However, it left one, which may have allowed the execution of "arbitrary" code. Never fear, though, v15.3.1 is here to addre...
Deirdre O'Donnell, 11 Feb 2022 23:36
Feds demand harsh punishment for Team Xecuter member Gary Bowser for aiding Nintendo Switch video game piracy. (Image Source: Techworm.net)

Feds want Nintendo Switch Team Xecuter hacker to serve five years and cough up US$4.5 million in landmark case, defense argues US government indicting only to send a message

The U.S. government recommended a five-year prison sentence and US$4.5 million in damages against Team Xecuter's Gary Bowser citing that his actions of finding loopholes and making mods cost the video game industry and gamers dear...
Vaidyanathan Subramaniam, 07 Feb 2022 17:42
Scams and crypto-malware are more rampant than ever. (Image Source: Comodo cWatch)

New Mars Stealer malware targets Chrome-based browser crypto wallets

Security researcher warns that the Mars Stealer malware is now affecting Chrome-based browser crypto wallet extensions like MetaMask, Coinbase wallet and Binance chain wallet, plus it also compromises 2FA authenticators like Micro...
Bogdan Solca, 04 Feb 2022 16:41
Intel claims to be better than its main competitor AMD when it comes to CPU-related vulnerabilities (Image: SeekingAlpha)

Intel claims that AMD processors had almost twice as many security vulnerabilities as Intel CPUs in 2021

In its official 2021 product security report, Intel claims that its main competitor AMD has reported a significantly higher number of CPU vulnerabilities in 2021. The statistics on GPU-related security issues, however, are telling...
Enrico Frahn, 03 Feb 2022 23:02
The Bitcoin network is unlikely to be hit by a surprise quantum attack.

Scientists estimate that quantum computers may become powerful enough to crack the Bitcoin encryption in a decade

Mark Webber and a group of scientists from the University of Sussex calculated that it would take a quantum processor with 1.9 billion qubits to effectively crack the Bitcoin encryption, and this is most likely not going to happen...
Bogdan Solca, 03 Feb 2022 15:29
WebGL sites are prone to GPU-based privacy exploits. (Image Source: BetaNews)

Researchers demonstrate GPU tracking method that could impact online privacy

GPU fingerprinting is facilitated through websites relying on the WebGL 2.0 rendering API. This technique is currently 67% faster than any other tracking methods, but could become even faster with newer API versions. WebGL develop...
Bogdan Solca, 01 Feb 2022 20:02
Apple has rolled out the fourth major revision of watchOS 8. (Image source: Apple)

Apple Watch charging issue fixed with watchOS 8.4 update

Apple has started distributing watchOS 8.4 globally. The software update arrives for all Apple Watch Series devices from the Watch Series 3 onwards and is roughly a 200 MB download. According to Apple, watchOS 8.4 addresses eight ...
Alex Alderson, 27 Jan 2022 17:11
iOS 15.3 and iPadOS 15.3 are rolling out now to multiple devices. (Image source: Apple)

Apple releases new iOS and iPadOS updates to address ten security issues

Apple has started rolling out iOS 15.3 and iPadOS 15.3 to multiple devices. The two OS updates contain fixes for at least ten security issues but lack any new features or changes. iOS 15.3 and iPadOS 15.3 are large updates too, co...
Alex Alderson, 27 Jan 2022 15:37
FromSoftware has taken the PC servers of Dark Souls offline temporarily to fix an exploit that was found in Dark Souls 3's online mode. (Image source: FromSoftware)

Dark Souls' PC servers go temporarily offline after a severe vulnerability was discovered in Dark Souls 3's online mode

PC servers for Dark Souls games have temporarily gone offline after a vulnerability was discovered that could allow hackers to execute code remotely on affected computers. Reportedly, the exploit can also plague Elden Ring. Only t...
Fawad Murtaza, 24 Jan 2022 18:50
The FBI alerts customers to malicious QR codes that can direct them to phishing websites. (Image: Markus Winkler via Unsplash)

FBI warns that hackers are corrupting QR codes to conduct phishing attacks

The FBI has cautioned individuals who use QR codes to exercise vigilance when making payments or entering sensitive personal information. Cybercriminals are tampering with legitimate QR codes to create malicious codes that redirec...
Aleem Ali, 21 Jan 2022 22:54
Rock space AX1800 (2nd generation) WiFi 6 wireless router (Source: Rock space)

Rock space launches the second-generation dual-core AX1800 wireless router

In addition to a different design, the second iteration of the Rock space AX1800 wireless router also comes with WPA3 security and TWT support for lower power consumption on the connected devices. The list of features inherited fr...
Codrut Nistor, 20 Jan 2022 10:50
Safari on macOS and iOS 15 suffers from a serious privacy violation bug. (Image Source: Apple)

Unpatched Safari 15 bug on macOS, iOS 15, and iPadOS 15 found to expose browsing history and Google account info

A major bug exists in Safari 15 that can put user-privacy at risk. The IndexedDB API bug, which affects Safari users on macOS, iOS 15, and iPadOS 15, violates the same-origin policy that prevents websites accessing information fro...
Vaidyanathan Subramaniam, 17 Jan 2022 13:24
Magniber ransomware pretends to be a legit Edge or Chrome update package. (Image Source: Unsplash)

Magniber ransomware being spread in the guise of a legit Microsoft Edge and Google Chrome update

Analysts have now discovered that attackers behind the Magniber ransomware, who have been exploiting IE-based vulnerabilities so far, are now targeting PCs via modern browsers such as Edge and Chrome. The Magniber ransomware is di...
Vaidyanathan Subramaniam, 16 Jan 2022 20:05
An investigation by a German cybersecurity agency has found no evidence of built-in censorship function inside Xiaomi phones. (Image source: BSI)

Germany's federal cybersecurity body fails to find any proof of built-in censorship inside Xiaomi phones

The Federal Cyber Security Authority, Germany's cybersecurity watchdog, has failed to find any evidence that Xiaomi is censoring certain words from its smartphones. In September 2021, Lithuania alleged that Xiaomi smartphones auto...
Fawad Murtaza, 15 Jan 2022 00:53
25 Tesla cars in 13 countries hacked as a security warning by a 19-year-old enthusiast

25 Tesla cars in 13 countries hacked as a security warning by a 19-year-old enthusiast

A 19-year-old IT and security enthusiast has managed to gain access to a number of Tesla cars in different countries following a vulnerability in third-party software or hardware that they installed. The access included key contro...
Daniel Zlatev, 13 Jan 2022 20:05
Versions 15.2.1 of iPadOS and iOS are rolling out now. (Image source: Apple)

Apple releases iPadOS 15.2.1 and iOS 15.2.1 to address a long-standing security flaw for both operating systems

Apple has rolled out new updates for iPadOS and iOS, both aimed at addressing a long-standing security flaw and an issue with sending photos using an iCloud Link. iOS 15.2.1 should fix a bug that made some third-party CarPlay apps...
Alex Alderson, 13 Jan 2022 14:58
A team of researchers has developed a malware detection system for Raspberry Pi. (Image source: Jainath Ponnala via Unsplash)

Researchers build novel malware detection system for Raspberry Pi

A research team has built a malware detection system using an oscilloscope to scan the electromagnetic field of a Raspberry Pi device. The technique allows you to identify the threat while likely remaining undetected by the hacker...
Polly Allcock, 13 Jan 2022 10:40
T-Mobile has experienced a data breach and customers may be affected by SIM swapping and their network information may have been leaked. (Image: Mika Baumeister)

T-Mobile hit with a data breach

T-Mobile has been hit with a data breach that appears to affect only a small number of customers. Users may be victims of SIM swapping and their CPNI may have been exposed. This attack comes after a massive breach in August.
Aleem Ali, 29 Dec 2021 04:36
DuckDuckGo has announced that it is building a desktop app to increase users' privacy. (Image source: DuckDuckGo)

DuckDuckGo is working on a standalone desktop browser for increased user privacy

DuckDuckGo has revealed that it is building a desktop app similar to its mobile app. The desktop app aims to provide increased privacy for users, with features such as the Fire Button, to clear all tabs, browsing history and data ...
Polly Allcock, 24 Dec 2021 15:28
F-Secure found that Ellume at-home COVID-19 tests were hackable via Bluetooth, allowing you to falsify your test result. (Image source: Roman Wimmers on Unsplash)

Researcher reveals that some at-home COVID-19 tests could be hacked using Bluetooth

It has been discovered that you can hack some at-home COVID-19 lateral flow tests via Bluetooth. This flaw would allow you to modify your test result. However, the problem has now been resolved, ensuring that you cannot alter the ...
Polly Allcock, 22 Dec 2021 17:33
UK's National Crime Agency recovered 225 million compromised passwords and added them to Have I been Pwned website's database. (Image: Towfiqu barbhuiya)

UK police donates 225 million compromised passwords to the Have I Been Pwned website

UK police have recovered hundreds of millions of passwords that were stolen by criminals and provided them to the security website, Have I Been Pwned. The website lets people know if their personal data has been compromised due to...
Aleem Ali, 21 Dec 2021 22:08
Bad actors were previously able to take advantage of a vulnerability in AppX installer that allowed them to spread malware. (Image: RoonZ.nl via Unsplash)

Microsoft patches spoofing vulnerability that was exploited to spread malware

Microsoft patched a zero-day vulnerability that affected the AppX installer in Windows. The vulnerability allowed hackers to create packages to infect systems with malware. The patch was included in the December Patch Tuesday upda...
Aleem Ali, 16 Dec 2021 22:27
Apple has deleted all references to its CSAM initiative. (Image source: Jeremy Bezanger)

Apple pulls controversial CSAM plans to scan the Photos app in iOS and iPadOS for nude pictures of children from its website

Rumour had it that Apple would integrate CSAM scans within iOS 15.2 and iPad 15.2, released earlier this week. However, the company has now deleted all references to these plans on its website, indicating that the feature has been...
Alex Alderson, 16 Dec 2021 17:11
Hackers tweet that India has accepted Bitcoin as official currency from PM Modi's account

Hackers tweet that India has accepted Bitcoin as official currency from PM Modi's account

India is currently working on a comprehensive cryptocurrency legislation to regulate the digital assets market in the country which may lead to an outright Bitcoin ban. The final say will be on Prime Minister Narendra Modi, whose ...
Daniel Zlatev, 13 Dec 2021 11:10
The Apache log4j vulnerability can potentially be used by threat actors to hack into Steam, Twitter, and other services (Image source: Panda Security)

Apache Log4j zero-day exploit could be used by hackers to target users on Steam, Twitter, Amazon, and other platforms

A zero-day exploit was recently identified within the Apache log4j logging library, which can potentially be used by hackers to take over entire servers via logging messages. The vulnerability affects a number of online services, ...
Arjun Krishna Lal, 12 Dec 2021 23:59
Besides billions of Shiba Inu coins, crypto hackers managed to steal more than 20 other cryptocurrencies from the crypto exchange BitMart (Image: Shiba Inu Token)

Hackers steal 893 billion Shiba Inu coins and other Ethereum-based cryptocurrencies worth US$150 million

Hackers once again gained access to the crypto wallets of a well-known crypto exchange and were able to steal a considerable amount of Shiba Inu coins and a multitude of other cryptocurrencies which are based on the Ethereum and B...
Enrico Frahn, 08 Dec 2021 01:30
The US Patent and Trademark Office is set to grant Clearview AI a patent for its facial recognition software. (Image source: Tumisu via Pixabay)

Clearview is one step closer to getting a US patent for its facial recognition software

A patent filed by Clearview AI for part of its facial recognition technology is set to be granted by the US Patent and Trademark Office. Clearview's software is already being used by several bodies in the US, including the FBI.
Polly Allcock, 07 Dec 2021 00:51
Scammers use the panic about the Omicron variant of COVID-19 to spread phishing emails. (Image: Lifewire)

Scammers send phishing emails based on the Omicron variant of COVID-19

Scammers are distributing phishing emails and using fake websites in an attempt to commit identity fraud. In these messages, hackers impersonate UK agencies and falsely claim to offer new Omicron PCR tests for free. These scammers...
Aleem Ali, 06 Dec 2021 19:18
Security firm flags crypto wallet credentials malware tucked into a hacky KMSPico Windows activator

Security firm flags crypto wallet credentials malware tucked into a hacky KMSPico Windows activator

The security researchers from Red Canary have identified another threat to your software cryptocurrency wallet of choice, and it is hiding in a popular Windows activator. The fake KMSPico installers work as intended for Microsoft ...
Daniel Zlatev, 06 Dec 2021 16:39
Some Google Pixel phones are getting hijacked after users mail them in for repairs. (Image source: Google)

Google Pixel phones suffer privacy woes as phones sent for warranty repairs are getting hijacked

Some users are reporting that their Google Pixel phones, which they had mailed in for repairs, are getting stolen from the warehouses and their data compromised. A recent incident saw someone allegedly obtaining a Pixel 5a from a ...
Fawad Murtaza, 06 Dec 2021 01:17
eBay accidentally deletes several user accounts. (Image source: eBay)

eBay accidently deletes several user accounts

eBay accidentally deleted several user accounts on December 3. According to a tweet by eBay, the suspension was unintentional. After an outcry on Twitter and Reddit, the company resolved the issue the following day. eBay is now no...
Fawad Murtaza, 06 Dec 2021 00:52
Eligible Zoom users in the US can now claim up to US$25 as part of a class-action lawsuit settlement. (Image Source: Gadgets 360)

Paid Zoom users between March 2016 and July 2021 eligible for US$25 class-action settlement, free users US$15

Users of the popular Zoom video conferencing app between March 2016 and July 2021 can now file for compensation as part of a class-action lawsuit which the company has decided to settle outside of court for US$85 million. Accordin...
Vaidyanathan Subramaniam, 03 Dec 2021 15:34
Over US$120 million has been stolen from cryptocurrency wallets linked to BadgerDAO. (Image source: Art Rachen on Unsplash)

Over US$120 million has been stolen from multiple cryptocurrency wallets connected to BadgerDAO

BadgerDAO has warned customers that it recently suffered a hack, affecting multiple cryptocurrency wallets linked to the company. In total, it is estimated that US$120 million (~€106 million) worth of cryptocurrency, including bit...
Polly Allcock, 03 Dec 2021 11:50
Hamilton Police arrested a suspected youth involved in a cryptocurrency theft of CAD$46 million. (Image: Michael Förtsch via Unsplash)

A Canadian adolescent was arrested in connection with an alleged CAD$46 million cryptocurrency robbery.

A collaborative investigation by the Hamilton Police and US Intelligence organisations uncovered the theft of CAD$46 million in cryptocurrencies. A victim in the US was targeted by the bad actor in a SIM swap attack. An adolescent...
Aleem Ali, 25 Nov 2021 02:58
Tile is about to become a part of Life360. (Source: Life360)

Tile is to become part of Life360 as part of a US$200+ million deal

The Life360 has announced that it will acquire Tile, buying the company out for just over $205 million. The acquisition has the potential to expand and streamline the location-tracking features involved in the services offered by ...
Deirdre O'Donnell, 24 Nov 2021 19:50

Tags

3D Printing (174) 5G (4985) Accessory (7857) AI (1558) Alder Lake (1068) AMD (5753) Android (26299) Anime / Manga (20) Apple (5549) Arc (211) ARM (8443) Arrow Lake (175) Astronomy / Space (135) Audio (2425) Benchmark (418) Biotech (295) Blackwell RTX 5000 (199) Business (11178) Camera (1386) CES 2026   Cezanne (Zen 3) (267) Charts (870) Chromebook (509) Comics (9) Computex 2025 (80) Concept / Prototype (120) Console (3150) Convertible / 2-in-1 (2118) CPU (175) Cryptocurrency (385) Cyberlaw (648) Deal (5095) Desktop (6837) DIY (266) Drone (94) E-Ink (108) E-Mobility (3519) Education (55) Exclusive (32) Fail (1973) FemTech (12) Foldable (1680) Gadget (4646) Galaxy A (211) Galaxy M (10) Galaxy S (2693) Galaxy Tab (642) Game Releases (396) Gamecheck (220) Gaming (16516) Geforce (4742) Google Pixel (1534) GPU (2105) Hack / Data Breach (22) Handheld (1189) Home Theater (945) How To (86) Humor (15) IFA 2025   Intel (2078) Intel Evo (385) Internet of Things (IoT) (831) iOS (1251) iPad (295) iPad Pro (670) iPhone (2638) Jasper Lake (60) Laptop (12830) Launch (8670) Leaks / Rumors (15121) Linux / Unix (928) List (322) Lucienne (Zen 2) (50) Lunar Lake (214) MacBook (1089) macOS (91) Meteor Lake (374) Microsoft (204) Mini PC (1360) Monitor (2134) Movies / TV-Shows (69) MS Surface (57) MSI (498) NAS (32) Nova Lake   Nvidia (619) Open Source (275) Opinion (273) Public Transport (9) Radeon (473) Raptor Lake (708) Renewable (367) Renoir (379) Retro (40) Review Snippet (1331) RISC-V (51) Robot / Robotics (57) Robot Vacuum (28) Rugged (142) Ryzen (Zen) (2123) Samsung (581) Science (675) Security (1381) Server/Datacenter (92) Single-Board Computer (SBC) (552) Smart Home (2959) Smartphone (25580) Smartwatch (4075) Snapdragon X Series (114) Social Media (135) Software (9490) Sports / e-Sports (101) Storage (2581) Tablet (5252) ThinkPad (1613) Thunderbolt (1319) Touchscreen (8021) Ultrabook (2672) Virtual Reality (VR) / Augmented Reality (AR) (945) Wearable (5149) Wi-Fi 7 (208) Windows (8043) Workstation (1296) XPS (418) Zen 3 (Vermeer) (349) Zen 4 (544) Zen 5 (359) Zen 6 (7)
Please share our article, every link counts!
Mail Logo
Redaktion, 2013-05- 8 (Update: 2013-09-27)