Notebookcheck Logo

Security

    settings restrict
Page Type
Restrict articles to display by Page Type. Each article only falls under one Page Type category.
, , , , , , ,
, , , , , , , , , , , , , , , , , , , , , , , , , , , ,    
Tags
Restrict articles to display by their associated tags. Articles can have multiple tags and can be further restricted with the "and" or search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,    
Search
Search by article title: 
additional restrictions: Security
Casio was subject to a network breach on October 5, 2024. (Image source: Casio - Edited)

Cyberattack forces Casio to delay highly anticipated G SHOCK watch models, like the full metal GMC-B2100

A network breach on October 5, 2024, forced Casio to delay its G-Shock watch releases, including the GMC-B2100AD-2A and GMC-B2100D-1A models. The company is investigating potential data compromise and securing its systems.
Anubhav Sharma, 09 Oct 2024 10:41
The FBI and U.S. intelligence agencies are still investigating the extent of the intrusion. (Image source: Associated Press)

Verizon and AT&T breached in major Chinese cyberattack

A Chinese state-sponsored hacking group, Salt Typhoon, breached major U.S. broadband providers' networks, posing a huge national security threat by potentially accessing systems used for lawful wiretapping. Investigations are ongoing into the extent of the breach.
Anubhav Sharma, 08 Oct 2024 15:24
OpenBSD 7.6 official poster (Image source: OpenBSD)

OpenBSD 7.6 launches with Milk-V Pioneer support, security fixes, and more

The 57th release of the open-source, security-focused OpenBSD operating system is now available and carries the 7.6 version label. Its highlights include support for the Milk-V Pioneer board and Qualcomm Snapdragon X Elite processor, multiple tweaks and fixes, improved video acceleration support, and more.
Codrut Nistor, 08 Oct 2024 11:03
A bug in iOS 18 caused iPhones and iPads to read passwords out loud. (Image source: Apple / Apple Developer)

VoiceOver in iOS 18 exposes passwords, leading to data security concerns

After updating to iOS 18 and with the VoiceOver function activated, iPhones and iPads leaked saved passwords - a serious security vulnerability that was quickly closed by Apple. Anyone who has already installed iOS 18 should now update to iOS 18.0.1 as soon as possible.
Marius Müller, 07 Oct 2024 16:34
Sheriff's Department launches 24/7 camera surveillance of Los Angeles with grand opening of Real Time Watch Center. (Image source: ASM Jacqui Irwin on X)

Sheriff's Department launches 24/7 camera surveillance of Los Angeles with grand opening of Real Time Watch Center

The Sheriff's Department has launched 24/7 camera surveillance of Los Angeles with the grand opening of its first Real Time Watch Center. The Center can access public street cameras, license plate readers, and speeding cameras to identify criminals and conduct remote patrols. The center also has access to private cameras at businesses, churches, and homes if granted permission.
David Chien, 07 Oct 2024 10:06
The new 2K security camera. (Image source: Lorex)

Lorex 2K Dual Lens Indoor PT camera debuts with Instant Assistance button and accent LEDs

Lorex promises particularly high-res 360-degree in-home surveillance with its latest security camera, as it has 2 lenses and both are rated for 2K recording. The new pan-tilt (PT) model also has a prominent One-Touch button so that the user can immediately connect with a responsible account-holder and a "Smart" band of LEDs for notification alerts or ambient lighting.
Deirdre O'Donnell, 06 Oct 2024 22:15
HyperOS is expected to able to detect hidden cameras in future. (Symbolic image, image source: Jakub Żerdzicki)

Practical for travelers: Xiaomi smartphones will be able to recognize hidden cameras and protect privacy in the future

Xiaomi is apparently introducing a new feature into its own operating system that could improve privacy more than almost any other function, especially for travelers, and could even help to prevent certain crimes.
Silvio Werner, 06 Oct 2024 16:57
The Samsung Galaxy S24 FE - the first Android device to receive the October 2024 security patch. (Image source: Samsung)

Samsung Galaxy S24 FE receives October 2024 security patch following recent critical Galaxy bug

Samsung is rolling out a new security update for the Galaxy S24 FE, aimed at device security. The October 2024 patch is slowly becoming available in Asia and Africa, with a global rollout expected soon.
Anubhav Sharma, 05 Oct 2024 12:34
The Deebot X2. (Image source: Ecovacs)

Robot vacuum from popular brand has cameras and speakers hacked in new report

Automatic floor cleaners are one of the most popular and widespread form of household robots right now. However, they come with potential privacy issues that are much less desirable, according to a smart home security researcher. One particular robot vacuum located in Australia reportedly contains vulnerabilities that allow attackers to hijack its camera and speakers completely wirelessly and remotely.
Deirdre O'Donnell, 04 Oct 2024 20:44
PayPal logo (Image source: PayPal)

PayPal to share personal data with third parties starting next summer

Starting in mid-2025, PayPal will share personal data with third parties due to a new feature, named Personalized Shopping. Thankfully, those not interested in it can opt out, although the problem is the fact that PayPal chose to enable this by default. However, there is plenty of time for them to change this.
Codrut Nistor, 03 Oct 2024 21:55
SimpleX Chat in action (Image Source: SimpleX Chat)

Open-source SimpleX Chat succeeds where Telegram failed

Lately, government agencies have been cracking down on privacy-oriented messaging services, leaving many with a sense of uncertainty surrounding their online privacy. Fortunately, SimpleX Chat has taken to solving this issue, and in his latest video, Mental Outlaw explores the unique privacy features that set SimpleX Chat apart.
Stephen Pereyra, 03 Oct 2024 01:01
UMC's Adult and Children Emergency Center located at 602 Indiana Ave as seen on Sept. 27, 2024 in Lubbock, Texas. (Image source: Avalanche-Journal)

UMC trauma center in Texas - the only one in a 400-mile radius - hit by ransomware attack, ambulances redirected

A ransomware attack has crippled the University Medical Center (UMC) in Lubbock, Texas, forcing it to divert ambulances to other facilities. It's the only level-one trauma center within 400 miles.
Anubhav Sharma, 01 Oct 2024 21:23
While still with an uncertain future, AI research in California is not restricted yet (Image source: Generated using DALL·E 3)

California allows AI to roam free for a little longer

The bill that would have forced some AI companies to spend time and resources coming up with safety protocols when developing certain AI models has been vetoed by Gavin Newsom. The official argued that this isn't the best approach for protecting against the dangers of AI. However, experts are still working on similar bills.
Codrut Nistor, 30 Sep 2024 12:21
Detectives can use AI to analyze years' worth of data for old unsolved cases. (Image source: Dall-E 3)

Australian-developed AI tool under trial in the UK can turn 81 years of cold case work into a mere 30-hour investigation

UK police are testing an Australian-developed AI tool called Söze that could solve cold cases by analyzing vast, complex data like video footage and financial records in hours - a task that would take humans decades.
Anubhav Sharma, 24 Sep 2024 14:58
Level Lock is no longer the property of Level Home, Inc. (Image source: Level)

Locksmith giant Assa Abloy acquires another smart lock startup

Level Lock is the latest in a series of acquisitions that have yielded the 190 brands in Assa Abloy’s portfolio. This purchase comes barely two years after the Swedish locksmith giant gave up August and Yale due to an antitrust lawsuit with the US Department of Justice.
Sarfo Ashong-Listowell, 21 Sep 2024 20:12
BingX cryptocurrency exchange loses over $52 million to hot wallet hack. (Image source: BingX)

BingX cryptocurrency exchange loses over $52 million to hot wallet hack

The BingX cryptocurrency exchange has lost over $52 million to a hot wallet hack. The hack occurred around 4 pm UTC+8 in Singapore. BingX has frozen transfers and initiated emergency procedures to minimize losses.
David Chien, 20 Sep 2024 23:57
Pit Viper 360 thermal images (Image Source: Bounce Imaging with edits)

Bounce Imaging announces world's first throwable 360 thermal camera

Bounce Imaging, a leader in tactical camera technology, announced a new thermal imaging version of its throwable 360 camera, the Pit Viper 360. This will be the company's latest offering in the tactical camera space.
Stephen Pereyra, 19 Sep 2024 05:58
The new 2K 4MP Battery Doorbell. (Image source: Reolink)

Reolink Smart Battery Doorbell upgrades to "world-first" 2K resolution and 1:1 view

Reolink has announced that its latest Battery Doorbell is the industry's first to debut with a 2K resolution conferred by a 4MP camera, thereby offering a potentially clearer, sharper and more detailed picture of a visitor. The new home security accessory is also touted to come with upgraded Wi-Fi connectivity and not to demand monthly fees from the user.
Deirdre O'Donnell, 18 Sep 2024 19:34
Instagram "Teen Accounts" coming soon (Image source: Generated using DALL·E 3)

Instagram to actively look for teens pretending to be adults by early 2025, downgrade their accounts

As the concerns regarding the toxicity of social media for teens increase and more studies prove them legit, Instagram decides to turn normal accounts into "Teen Accounts" for users aged under 18. They will be automatically set as private, and changing the defaults will need a parent's approval, who will also be able to monitor them.
Codrut Nistor, 17 Sep 2024 21:17
US Kaspersky antivirus accounts sold to UltraAV with automatic service transfers occuring this month. (Image source: Kaspersky)

US Kaspersky antivirus accounts sold to UltraAV with automatic service transfers occuring this month

US Kaspersky antivirus accounts have been sold to UltraAV, a division of the Pango Group. Kaspersky was forced to abandon the US market after being banned by the Biden administration on June 20, 2024. The action was taken to prevent Russia from collecting and weaponizing data on Americans. All Kaspersky US users will be migrated unless action is taken.
David Chien, 17 Sep 2024 06:44
Tile hypes its new trackers. (Image source: Tile)

Tile's 2024 line of anti-loss trackers debuts with upgraded specs and Life360 SOS alerts

Tile has announced that its latest line of personal tracker devices come with an upgraded Bluetooth range of up to 500 meters (~1,640 feet) in the new Pro variant. The new series also includes updated Mates and Stickers, not to mention an all-new Slim version for wallets. All 4 new trackers are rated to be sleeker, louder, and safer than their predecessors with the integration of Life360 SOS alerts.
Deirdre O'Donnell, 16 Sep 2024 18:42
It looks like upcoming changes to Windows kernel security measures could allow more games to be played on Linux. (Image source: Steam / Easy Anti-Cheat - edited)

Microsoft paves the way for Linux gaming success with plan that would kill kernel-level anti-cheat

Microsoft has officially announced its intent to move security measures out of the kernel, following the Crowdstrike disaster a few short months ago. The removal of kernel access for security solutions would likely revolutionise running Windows games on the Steam Deck and other Linux systems.
Julian van der Merwe, 14 Sep 2024 08:35
Welcome to the Matrix: Meta confirms AI training on social media posts since 2007 (Image source: Generated using DALL·E 3)

Welcome to the Matrix: Meta confirmed that AI was trained on all social media public posts since 2007

While European and US users of Facebook and Instagram were allowed to choose for their data not to be used to train AI, Australians didn't have any opt-out options available. As a consequence, all of their public posts since 2007 were used by Meta. For now, Facebook representatives couldn't confirm a future freedom of choice in the matter to Australian users.
Codrut Nistor, 12 Sep 2024 23:58
Kali Linux 2024.3 comes with new security tools and Qualcomm Snapdragon SDM845 support (Image source: Kali Linux Blog)

Kali Linux 2024.3 comes with 11 new tools and support for the Qualcomm Snapdragon SDM845 SoC

Bringing no less than 11 additional tools, Debian-based Kali Linux 2024.3 is an update that also comes with support for the Qualcomm Snapdragon SDM845 SoC. Additionally, it begins the transition to the Python 3.12 update, which removes some deprecated APIs but also breaks some packages, so it needs more work before being released.
Codrut Nistor, 12 Sep 2024 12:37
Additional AI and cloud limitations legislation now in the making (Image source: Generated using DALL·E 3)

Proposed US legislation could make life harder for AI and cloud service providers

The U.S. Commerce Department is now focusing on both AI and cloud computing service providers with a new proposal, which involves requiring additional reporting from these companies. The goal of these new requirements is to ensure the safety of the technologies developed, such as their ability to handle cyberattacks.
Codrut Nistor, 10 Sep 2024 12:21
Unpatchable Yubico two-factor authentication key vulnerability breaks the security of most Yubikey 5, Security Key, and YubiHSM 2FA devices. (Image source: Yubico)

Unpatchable Yubico two-factor authentication key vulnerability breaks the security of most Yubikey 5, Security Key, and YubiHSM 2FA devices

An unpatchable Yubico two-factor authentication key vulnerability has broken the security of most Yubikey 5, Security Key, and YubiHSM 2FA devices. The Feitian A22 JavaCard is also vulnerable. Vulnerable 2FA keys should be replaced as soon as possible, especially when used to secure cybercurrency or top-secret information.
David Chien, 04 Sep 2024 08:49
Image source: AI-generated

Windows and Linux vulnerable to oddly familiar Cicada3301 ransomware

Cybersecurity researchers have finally cracked Cicada3301, a ransomware-as-a-service attack that first surfaced in June of 2024 on a dark web forum. The ransomware is able to target both Linux and Windows systems. It bears a striking similarity to ransomware used in the 2021 attack on the Colonial Pipeline.
Daniel Fuller, 03 Sep 2024 23:14
A security vulnerability in the FlyCASS system would have allowed unauthorized persons to access the cockpit of an aircraft. (Image source: Pixabay / JESHOOTS-com)

Serious security gap uncovered at airports

As uncovered by security researchers Ian Carroll and Sam Curry, there was a vulnerability in the FlyCASS management system that allowed unauthorized persons to bypass security checks and even get into the cockpit of an aircraft.
Marius Müller, 02 Sep 2024 18:31
AI behind bars (Image source: Generated using DALL·E 3)

California one step away from putting AI on a short leash

Defended by Elon Musk and feared by the executives of iconic tech companies such as Google, OpenAI, and Meta, California’s antagonistic AI safety bill, SB 1047, is now just one step away from reshaping the tech landscape. After passing the state legislature, the bill is now waiting for Gavin Newsom's decision.
Codrut Nistor, 29 Aug 2024 18:25
Image source: AI-generated

NGate malware steals bank data via NFC

Newly reported malware aimed at Android phones steps up the usual social engineering attacks by including an NFC component. Vulnerable users who fall for the scam can have their bank details, and thus their money, stolen.
Daniel Fuller, 28 Aug 2024 20:03
Cthulhu stealer is basically a disguised Apple disk image (DMG) file that is written in Golang open-source programming language. (Image source: Notebookcheck)

A $500-a-month malware dubbed "Cthulhu Stealer" targets macOS users and steals sensitive data

Cthulhu Stealer is an information-stealing malware targeting macOS users. Available as a MaaS service for $500 per month, it steals sensitive data like passwords, system info, and crypto wallet details. The malware impersonates legitimate software and uses social engineering techniques to trick users into running it.
Anubhav Sharma, 26 Aug 2024 13:21
Image source: AI-generated

August Windows patch breaks some dual-boot systems: how to fix

Microsoft recently pushed out a security update to Windows users that breaks some dual-boot configurations. Users with some older Linux distributions, or any that use GRUB 2, may find their system unable to boot. This article goes over the cause of that, and how to fix it.
Daniel Fuller, 22 Aug 2024 19:36
The Kids section in Google Play (Image source: Own)

Google pulls the plug on the Play Security Reward Program

Introduced in 2017, the Google Play Security Reward Program offered up to $20,000 for discovering remote code execution bugs. However, this initiative allowed Google to collect data that is now used for automated checks, and since fewer malicious apps are being reported, this initiative will be terminated on August 31st.
Codrut Nistor, 20 Aug 2024 11:04
Pindrop unveils Pulse Inspect software to detect AI-deepfake voice clones to help stop fraud and disinformation. (Image source: AI-generated, Dall-E 3)

Pindrop unveils Pulse Inspect software to detect AI-deepfake voice clones to help stop fraud and disinformation

Pindrop has unveiled the Pulse Inspect software to detect AI-deepfake voice clones to help stop fraud and disinformation. Cloned voices have become so convincingly real that millions have been lost to fraud, and fake phone calls and videos by politicians are becoming more common. The software reliably detects over 90% of AI-generated voices.
David Chien, 19 Aug 2024 07:46
Exploring the wonderful world of paid apps on Android (Image source: Unsplash)

8 paid Android apps worth the one-time purchase (August 2024 edition)

CheckMag Android power users love splurging those hard-earned salaries on apps to make their lives not only more efficient, but full of fun as well. Let's take a look at some of the best paid Android apps for August 2024.
Jonathan Bester, 17 Aug 2024 08:48
Critical Windows security vulnerability allows attackers full control over IPv6 - apply August patch now. (Image source: AI-generated, Dall-E 3)

Critical Windows security vulnerability allows attackers full control over IPv6 in CVE-2024-38063 threat - apply August patches now

Microsoft has detailed a critical Windows security vulnerability that allows attackers full control over IPv6 in the CVE-2024-38063 threat. Users of affected Windows OSs should apply the August patches now or disable IPv6 in the network adapter settings.
David Chien, 15 Aug 2024 23:05
Image source: Claudio Schwarz on Unsplash

Extreme data breach may affect over 2 billion people

In August of 2024, one of the largest data breaches in history took place, exposing roughly 2.7 billion personal records. The set reportedly contains data on citizens of the United States, Canada, and the United Kingdom.
Daniel Fuller, 15 Aug 2024 07:18
NIST finalizes three post-quantum cryptography standards to better protect the Internet, cryptocurrency, and communications. (Image source: AI-generated, Dall-E 3)

NIST finalizes three post-quantum cryptography standards to better protect the Internet, cryptocurrency, and communications

The NIST has finalized three post-quantum cryptography standards after nearly a decade of work to better protect the Internet, cryptocurrency, and communications. This move is in preparation for the ability of emerging quantum computers to crack public-key cryptosystem technologies such as RSA.
David Chien, 15 Aug 2024 06:32
Internet anonymity (Generated using DALL·E 3)

Tails 6.6 live Linux launches with persistent storage improvements and multiple fixes

The Edward Snowden-endorsed live Linux distro Tails is back with version 6.6. This refresh brings Thunderbird and Tor Browser up to date, as well as packing support for new hardware and improving the persistent storage capabilities of this Debian-based piece of code, which targets those seeking complete Internet anonymity.
Codrut Nistor, 14 Aug 2024 16:48
ADT says the cyberattack only compromised ‘limited customer information’.  (Image source: ADT)

Home security giant ADT confirms data breach

In an SEC filing, ADT mentions last month's cybersecurity breach but insists it has “no reason to believe” its customers' home security was compromised. Meanwhile the hackers are already advertising a wealth of customer data they claim was obtained from the breach.
Sarfo Ashong-Listowell, 13 Aug 2024 21:05
Firewall protection (Generated using DALL·E 3)

IPFire 2.29 Core 187 launches with an extra layer of protection against DoS attacks

Focused on delivering an easy initial setup and post-install configuration, IPFire is a Linux distro designed for firewalls. Version 2.29 Core 187 comes with an additional layer of protection against denial-of-service (DoS) attacks. This capability is useful in high-bandwidth and cloud deployment scenarios.
Codrut Nistor, 12 Aug 2024 09:25
The Sinkclose vulnerability affects AMD processors dating back to 2006. (Image source: Krzysztof Hepner via Unsplash)

'Sinkclose' vulnerability discovered in post-2006 AMD chips could pose a critical threat to data security

A critical vulnerability, Sinkclose, has been discovered in AMD processors. The flaw allows attackers to gain near-total control of affected systems. While AMD is working on patches, users are urged to update their systems immediately to mitigate risks of data theft, system takeover, espionage, and possible infrastructure disruption.
Anubhav Sharma, 11 Aug 2024 10:53
Following Oligo Security's report, Chrome is now blocking access to 0.0.0.0 (Finch Rollout) starting with Chromium 128. (Image source: Google)

0.0.0.0 Day exploit reveals 18-year-old security flaw in Chrome, Safari, and Firefox

The "0.0.0.0 Day" vulnerability, discovered 18 years ago, allows malicious websites to bypass security protocols in Google Chrome, Mozilla Firefox, and Apple Safari, primarily affecting Linux and macOS devices. This flaw lets attackers remotely alter settings, access protected information, and potentially execute code on affected systems. Despite its initial disclosure in 2008, the vulnerability remains unresolved, though browser developers are now taking steps to address it. Additional security measures are recommended for developers to protect their applications.
Anubhav Sharma, 08 Aug 2024 21:28
The prototype is still a bit large, but it works reliably. (Image source: Brenda Ahearn, Michigan Engineering)

Privacy: Newly developed camera turns people into stick figures

Cameras support the robot vacuum cleaner at work or detect falls in the home. Unfortunately, there is always a risk of misuse, which a new type of camera system can prevent.
Mario Petzold, 08 Aug 2024 10:54
The path of attack (Image Source: SafeBreach)

Old is new: Windows vulnerability allows undetectable downgrade attacks

At Black Hat USA 2024, a researcher showcased a method for taking over the Windows Update Process to craft a custom system downgrade. With the system downgraded, threat actors can elevate privileges, bypass security features, and exploit previously patched vulnerabilities.
Stephen Pereyra, 08 Aug 2024 06:03
The AI model can decipher signals from HDMI cables with an error rate of 30%, which is expected to be even lower in the future. (Image source: Pexels / Srattha Nualsate)

Hackers can now reconstruct screen content from HDMI's electromagnetic radiation

Researchers have developed an AI-powered method to reconstruct images displayed on a computer screen by intercepting electromagnetic radiation emitted from the HDMI cable. Hackers could remotely capture sensitive information, such as passwords or financial data. While the average user is unlikely to be targeted, organizations handling sensitive information should be aware of this and take necessary measures if needed.
Anubhav Sharma, 29 Jul 2024 21:42
WazirX states that valuation of crypto assets is based on the time when trading was paused, which was 21st July 2024, 8:30 PM IST. (Source: WazirX)

WazirX exchange implements a two-tiered recovery plan for users following $230 million crypto theft

WazirX has outlined a strategy to address a recent cyberattack that resulted in the loss of over $230 million in crypto assets. The crypto exchange has implemented a two-tiered recovery plan, allowing users to choose between prioritized asset recovery with limited access or immediate access with delayed recovery. To mitigate losses, WazirX will distribute recovered funds among affected users through a “balanced crypto basket” approach.
Anubhav Sharma, 27 Jul 2024 20:06
I don't want to learn why, Google. I want to leave me alone and let me use my computer. (Image Source: gHacks, edited.)

🎙️ OpinionWhen exactly did web browsers turn into helicopter parents?

CheckMag We're sorry, but unfortunately NBC Notebookprotect Safe Browsing filter doesn't recognise this blurb. This article might try to do unpredictable things to your computer.
Matthew Lee, 24 Jul 2024 01:01
With a 65% usage share among browsers, Chrome has been criticised for not blocking third-party cookies that track user activity

Google’s years-long plan to rid Chrome of third-party cookies crumbles

After years of working on a plan to eliminate third-party cookies, which enable tracking user activity across websites, from the Chrome browser, Google has decided not to go ahead with it, citing adverse effects on its advertising business. Instead, it now plans to give users the choice to opt out of third-party cookies in favour of its new Privacy Sandbox tech.
Vishal Bhardwaj, 23 Jul 2024 19:29
To fix the problem, all you had to do was delete the file C-00000291*.sys in the folder C: Windows\System32\drivers\CrowdStrike. (Image source: CrowdStrike / Pixabay)

Elon Musk bans CrowdStrike from his companies

After a faulty update of the security solution CrowdStrike caused history-making IT failures last week, entrepreneur Elon Musk took the logical step and banned the software from his companies.
Marius Müller, 22 Jul 2024 14:29

Tags

3D Printing (250) 5G (5382) 6G (4) Accessory (9412) AI (2413) Alder Lake (1081) AMD (6404) Android (28974) Anime / Manga (67) Apple (6209) Arc (252) ARM (8745) Arrow Lake (359) Astronomy / Space (546) Audio (2927) Benchmark (603) Biotech (343) Blackwell RTX 5000 (342) Business (12025) Camera (1903) CES 2026 (231) Cezanne (Zen 3) (267) Charts (878) Chromebook (522) Climate (15) Comics (18) Concept / Prototype (264) Console (4337) Convertible / 2-in-1 (2205) CPU (326) Cryptocurrency (394) Cyberlaw (744) Deal (6599) Desktop (7980) DIY (462) Drawing (18) Drone (205) E-Ink (187) E-Mobility (4111) Education (74) Exclusive (38) Fail (2183) FemTech (17) Foldable (1927) Gadget (5338) Galaxy A (233) Galaxy M (11) Galaxy S (2875) Galaxy Tab (670) Game Releases (963) Gamecheck (243) Gamescom 2025 (37) Gaming (21789) Garmin (110) Gator Range (1) Geforce (4942) Google Pixel (1683) GPU (2373) Hack / Data Breach (74) Handheld (1988) Health (91) Home Theater (1239) How To (108) Humor (26) IFA 2025 (86) Intel (2602) Intel Evo (396) Internet of Things (IoT) (1115) iOS (1396) iPad (345) iPad Pro (703) iPhone (3007) Jasper Lake (60) Laptop (14055) Launch (12066) Leaks / Rumors (17806) Linux / Unix (1101) List (417) Lucienne (Zen 2) (51) Lunar Lake (279) MacBook (1247) macOS (187) Medusa Point   Meteor Lake (385) Microsoft (494) Mini PC (1838) Monitor (2541) Movies / TV-Shows (237) MS Surface (67) MSI (531) MWC (67) NAS (78) Network (50) Nova Lake (13) Nvidia (918) Open Source (393) Opinion (442) Panther Lake (194) Public Transport (27) Radeon (573) Raptor Lake (730) Renewable (465) Renoir (379) Retro (294) Review Snippet (1806) RISC-V (61) Robot / Robotics (186) Robot Vacuum (104) Rollable (2) Rugged (207) Ryzen (Zen) (2239) Samsung (1090) Science (1216) Security (1589) Server/Datacenter (163) SFF (15) Single-Board Computer (SBC) (641) Smart Home (3726) Smartphone (28273) Smartwatch (4774) Snapdragon X Series (157) Social Media (327) Software (10668) Sports / e-Sports (154) Storage (2705) Streaming (4) Tablet (5827) ThinkPad (1723) Thunderbolt (1464) Touchscreen (8312) Ultrabook (2733) Virtual Reality (VR) / Augmented Reality (AR) (1029) Watch (335) Wearable (6532) Wi-Fi 7 (411) Wi-Fi 8 (1) Wildcat Lake   Windows (8494) Workstation (1416) XPS (441) Zen 3 (Vermeer) (357) Zen 4 (601) Zen 5 (591) Zen 6 (23)
Google LogoAdd as a preferred source on Google
Mail Logo
Redaktion, 2013-05- 8 (Update: 2013-09-27)