Notebookcheck Logo

Hack / Data Breach

    settings restrict
Page Type
Restrict articles to display by Page Type. Each article only falls under one Page Type category.
, , , , , , ,
, , , , , , , , , , , , , , , , , , , , , , , , , , ,    
Tags
Restrict articles to display by their associated tags. Articles can have multiple tags and can be further restricted with the "and" or search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,    
Search
Search by article title: 
additional restrictions: Hack / Data Breach
xSDR packs a 2x2 MIMO software-defined radio in a tiny M.2 2230 module.

This tiny M.2 module turns your everyday laptop into a penetration testing tool

Wavelet Lab’s xSDR is a tiny M.2 2230 A+E-key software-defined radio (SDR) module built to plug straight into laptops, tablets, embedded PCs, and other compact systems. Just drop this tiny card into a spare M.2 slot, and turn it into a portable cellular network analyzer or penetration testing tool.
Debashis Das, 21 Feb 2026 18:19
Nighttime cityscape of Warsaw featuring the illuminated Palace of Culture and Science surrounded by modern skyscrapers and office buildings.

Major cyberattack on Poland wind and solar farms raises global concerns over insecure network hardware

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning after a cyberattack targeted renewable energy facilities in Poland. The incident shows security weaknesses in internet-connected systems used in energy infrastructure and has prompted global agencies to advise operators to improve their cybersecurity protections.
Praneeta, 11 Feb 2026 00:44
Banner for Discord Privacy and Safety

Discord will require face scans or ID for some servers in March, raising privacy concerns

Discord will soon force all users to complete ID verification or be shut out from age-restricted servers and features. In March, chatters must upload a video showing their faces or other qualified IDs. The company outlined privacy protections following an attempted October 2025 data breach.
Adam Corsetti, 09 Feb 2026 17:25
OpenClaw needs a lot of API tokens (symbolic picture)

Free to use AI tool can burn through hundreds of Dollars per day: OpenClaw has absurdly high token use

Despite several name changes, OpenClaw remains one of the most hyped AI tools. After all, it turns a PC into a fully autonomous AI agent. However, the tool can easily burn through hundreds of dollars in API tokens per day. Even worse, serious security flaws have been discovered.
Marc Herter, 04 Feb 2026 22:09
Madhu Gottumukkala and ChatGPT. (Image source: CISA.gov, public domain, edited by Notebookcheck)

US cybersecurity chief uploads confidential documents to ChatGPT

Madhu Gottumukkala, Acting Director of the Cybersecurity and Infrastructure Security Agency, triggered internal security alerts by uploading sensitive documents to ChatGPT. The incident raises questions about data security at CISA.
Marc Herter, 30 Jan 2026 18:21
ChatGPT user deletes Data (Symbolic picture AI | Nano Banana Pro)

ChatGPT: Professor loses two years of work

Two years of work lost with a single click—that is how Professor Marcel Bucher describes his experience in an article in Nature. He concludes that ChatGPT is a threat to consistent productivity. However, the chatbot offers a backup function that the researcher apparently failed to utilize.
Marc Herter, 25 Jan 2026 13:02
Microsoft hands over BitLocker keys in the event of a court order. (Symbolic image created with Nano Banana Pro)

Cloud risk with BitLocker: Microsoft occasionally hands over BitLocker keys to the FBI

While Apple and Google stress that they cannot unlock customer devices, the situation is different with Windows encryption: Microsoft routinely hands over BitLocker keys from the cloud to law enforcement agencies.
Marc Herter, 24 Jan 2026 13:14
WhatsApp census. (Symbolic image, source: Nano Banana Pro)

WhatsApp: Researchers create phone book with all 3.5 billion users

Researchers from Vienna have discovered a massive security vulnerability in WhatsApp, enabling them to identify 3.5 billion users. The lack of query limits allowed for the large-scale collection of usernames, profile pictures and status messages.
Marc Herter, 13 Jan 2026 12:10
A hacking forum got hacked. (Image source: AI generated by GPT-4o)

Hacker database gets hacked, leaks 324,000 accounts

In an ironic turn of events, a notorious hacking forum was hacked, resulting in a breach compromising roughly 324,000 accounts. Some of these accounts had public IP addresses tied to them, meaning that law enforcement could use this information to catch malicious actors.
Sam Medley, 12 Jan 2026 17:28
Instagram logo. (Image Source: Meta)

Massive data leak reportedly exposes information of 17.5 million Instagram users

Malwarebytes has confirmed a massive data leak exposing personal information from 17.5 million Instagram accounts. The leaked data could be used for phishing and account takeovers, and users are urged to enable 2FA and stay alert for fake Meta messages.
Abdul Haddi, 10 Jan 2026 18:17
Microsoft defender blocking MAS (including screenshot from Powerm1nt via X)

Microsoft Defender might be right to block Microsoft Activation Scripts (MAS)

Reports are spreading that Microsoft Defender is blocking the popular community tool MAS, flagging it as a fake. In contrast, our own tests demonstrate that the script works flawlessly. Have affected users perhaps fallen victim to DNS tampering?
Marc Herter, 09 Jan 2026 19:31
OpenAI delivering Chats (Symbolic Picture Nano Banana Pro)

Court ruling against OpenAI: 20 million ChatGPT logs must be disclosed

Anyone who has entrusted their darkest secrets to ChatGPT might want to flinch nervously, because a US court is forcing OpenAI to hand over 20 million user logs to the opposing side in a major copyright dispute.
Marc Herter, 06 Jan 2026 23:47
Operators in Rainbow Six Siege. (Image Source: Ubisoft)

Rainbow Six Siege has reportedly been hacked for the third time, hackers can now ban players or type custom messages in-game

Rainbow Six Siege has reportedly been hacked again. This time, hackers are banning players and writing custom messages inside the game.
Abdul Haddi, 05 Jan 2026 20:26
The "dieselgate" principle is applied to honey (symbolic picture Nano Banana Pro)

Hide and seek with testers: YouTuber and digital forensics expert uncover new honey scandal

Together with Ben Edelman, YouTuber MegaLag proves a systematic obfuscation tactic that deliberately deceives testers and redirects commissions unnoticed. The "dieselgate" principle is applied: honey identifies testers and disables manipulative features.
Marc Herter, 02 Jan 2026 12:16
The PlayStation 5 Digital and Disc variants pictured (image source: PlayStation)

Sony faces an unfixable PS5 vulnerability as BootROM keys are dumped and shared publicly

A leaked set of PlayStation 5 BootROM keys, published online at the end of 2025, has exposed core hardware-level security secrets that researchers say Sony cannot simply patch on existing consoles. While the breach does not enable an immediate jailbreak, experts warn it significantly lowers the bar for future exploits, potentially paving the way for permanent hacks, homebrew software, and widespread piracy risks.
Rahim Amir Noorali, 02 Jan 2026 04:45
A screengrab from Bloodborne (image source: RPG Fan)

Bloodborne fans get first taste of online PC play as ShadPS4 emulator makes breakthrough

PC players are finally getting an early taste of Bloodborne’s online features on computers, as the rapidly advancing ShadPS4 emulator now supports asynchronous elements and limited co-op play. While the experience remains unstable and incomplete, the breakthrough marks a major step toward full-featured PS4 emulation and a long-awaited unofficial PC option for FromSoftware’s classic.
Rahim Amir Noorali, 31 Dec 2025 01:10
The Chrome extension Trust Wallet has been compromised by hackers (Image source: AI-generated with Nano Banana Pro)

$7 million stolen on Christmas Eve: Chrome extension Trust Wallet compromised by hackers

Once again, several high-profile crimes have taken place during this year's holidays. Hackers pulled off a major coup with a supply chain attack on Trust Wallet, which apparently involved up to $7 million in cryptocurrencies.
Marc Herter, 30 Dec 2025 03:48
Security researchers have cracked Xplora smartwatches (Image source: AI-generated with Nano Banana Pro)

Same key for all units: Security researchers have hacked Xplora smartwatches

A talk at 39C3 has revealed serious security flaws in Xplora smartwatches. Researchers from a German university show how a universal key provides access to the communication of all kids with Xplora watches, and why the manufacturer's previous updates haven’t fixed this.
Marc Herter, 30 Dec 2025 01:54
Ubisoft support and Rainbow Six Siege logos are shown (Image source: Ubisoft Support with edits)

Following Rainbow Six Siege hack, report emerges about bribes with Ubisoft customer support

Hackers may use multiple methods to steal accounts in Ubisoft games like Rainbow Six Siege. A cybersecurity resource describes how the publisher’s help desk has been a liability. Bribery and social engineering have been popular routes to compromise customer support agents.
Adam Corsetti, 29 Dec 2025 02:21
Banner for Rainbow Six Siege X hack shown (Image source: screenshot, Ubisoft YouTube with edits)

Rainbow Six Siege hack forces Ubisoft to shut down servers after players receive free R6 credits

Servers for Ubisoft’s popular first-person shooter game are currently offline on consoles and PC. A suspected hack granted some Rainbow Six Siege players huge bundles of in-game currency. Other players have witnessed mass bans, prompting Ubisoft to take action while investigating.
Adam Corsetti, 27 Dec 2025 22:13
PlayStation logo is shown (Image source: PlayStation blog)

PlayStation Network account hack raises security concerns and exposes careless support

A writer for a French website is urging gamers to keep all PlayStation Network details private. An ID number was all a hacker needed to log in twice to the journalist’s account. Even with 2FA active, PSN support requires minimal information to grant strangers access.
Adam Corsetti, 24 Dec 2025 04:49
Microsoft account and Xbox games banner (Image source: Microsoft Xbox)

Gamer loses 15 years' worth of Xbox games, as reports of hacked Microsoft accounts grow

Physical disc owners have more reason to avoid the digital gaming age. Complaints continue about hackers compromising Microsoft accounts filled with Xbox games. Even if gamers can prove their identities, they may need to start from scratch and repurchase every title.
Adam Corsetti, 21 Dec 2025 04:06
Tracking WhatsApp (symbolic image created with Stable Diffusion)

Weak security in WhatsApp and Signal allows low-skill attackers to track users

Researchers at the University of Vienna have uncovered vulnerabilities within WhatsApp and Signal that allow undetectable user tracking through round-trip time (RTT) measurements. A simple program now available on GitHub demonstrates how easily this weakness can be exploited.
Marc Herter, 11 Dec 2025 08:19
Gandalf as a chat bot (image source: ChatGPT)

A beginner’s guide to AI jailbreaks — Using Gandalf to learn safely

Chatbots come with built-in safeguards designed to prevent them from producing harmful, offensive, or otherwise inappropriate content. But researchers and hackers have shown that, even with multiple patches, AIs can still be vulnerable to certain inputs that bypass those guardrails. One way to explore the basics is through an online game called Gandalf.
Christian Hintze, 08 Dec 2025 13:08
A fake Windows Security Update screen pictured (image source: Bleeping Computer)

An updated version of the 'ClickFix’ malware disguises itself as a Windows update, using PNG pixel data to deploy infostealers

A newly discovered variant of the ClickFix malware masquerades as a critical Windows Update, using a fake full-screen update prompt to trick users into pasting a malicious command that grants attackers administrative access. Huntress researchers found that the malware leverages hidden code in PNG pixel data to deploy powerful infostealers like Rhadamanthys and LummaC2, targeting credentials, financial data, and crypto wallets primarily via booby-trapped adult websites.
Rahim Amir Noorali, 30 Nov 2025 13:04
It was not an attack on Cloudflare (Image source: Stable Diffusion)

It was not an attack on Cloudflare: How a faulty configuration file paralyzed part of the internet

On the surface, the internet seems to be decentralized. In reality, only a few global players ensure the functionality of websites and apps. Cloudflare, one of the largest, was rendered unavailable for hours on Tuesday, November 18th. What initially seemed like an attack turned out to be a simple mistake.
Marc Herter, 22 Nov 2025 21:27
A phone user reading the screen (Image source: Firmbee/Unsplash)

Criminal gangs in China stole over $1 billion from Americans with SMS scam: how they did it and how you can stay safe

China-based gangs reportedly stole over $1 billion from Americans using advanced smishing scams that exploit SIM farms and mobile wallets. Here is how the cross-border scheme operates and what you can do to protect yourself.
David Odejide, 15 Oct 2025 18:44
PlayStation Network support logo is shown (Image source: Sony PlayStation with edits)

PlayStation Network security slammed after support leaks trophy hunter's account to hacker

Sony is again facing criticism for failing to secure PlayStation Network accounts. Another popular trophy hunter can no longer log in to his PSN account after a successful hack. Some gamers believe poorly trained customer support agents leak or sell protected information.
Adam Corsetti, 14 Oct 2025 00:42
Game Freak logo with Pokémon creatures below (Image source: Game Freak, Nintendo of America with edits)

Teraleak resurfaces to reveal new Pokémon games and removed Pokémon Legends: Z-A features

Recent Pokémon Legends: Z-A leaks seem trivial compared to new Teraleak revelations. The 2024 hack of Game Freak has returned with discoveries about old and new Pokémon games. Gamers can find out about removed content and what to expect in an upcoming 10th-gen title.
Adam Corsetti, 13 Oct 2025 21:30
Artwork featuring Discord's mascot, Wumpus (image source: Discord)

Hackers claim to have stolen as many as 2.1 million photo IDs in 1.5TB Discord data breach

Hackers claim to have stolen 1.5 TB of Discord-related data, including a mammoth 2,185,151 images of government-issued IDs and selfies submitted for age verification after compromising third‑party customer service provider Zendesk, and are now attempting to extort the platform.
Rahim Amir Noorali, 13 Oct 2025 05:04
AT&T logo (Image source: Rubaitu Azad/Unsplash)

AT&T to pay $177 million after massive data breaches: How to check if you can claim up to $7,500

AT&T will pay out $177 million after two major data breaches exposed the personal data of more than 170 million customers. Affected users can claim up to $7,500, but only if they file before the December 18, 2025, deadline.
David Odejide, 12 Oct 2025 21:17
Discord logo (Image source: Alexander Shatov/Unsplash)

Discord breach exposes 70,000 government IDs: what went wrong and who was affected

Discord has revealed that 70,000 of its users may have had their government IDs stolen in its recent security breach. The company is in the process of emailing impacted account holders.
David Odejide, 09 Oct 2025 23:12
Xbox Insider program banner is shown (Image source: Xbox Wire with edits)

Xbox Insider update introduces age verification to comply with UK Online Safety Act

Xbox console users are now witnessing the ramifications of the UK Online Safety Act. Gamers participating in the Xbox Insider program may notice prompts to verify their ages. Despite privacy concerns, the checks are mandatory to retain access to multiplayer features.
Adam Corsetti, 09 Oct 2025 02:44
A screengrab from Call of Duty Black Ops 7 (image source: SteamDB)

"This is just the beginning": Activision says 97% of hackers banned within 30 minutes in Call of Duty: Black Ops 7 Beta

Activision seems to be firing on all cylinders when it comes to nabbing the growing menace of cheating across its platforms, awarding cheaters bans across the board on PC thanks to a mix of upgraded anti-cheat software and driver-based measures.
Rahim Amir Noorali, 07 Oct 2025 11:21
The Discord logo with its signature blurple-colored background (image source: Discord)

Discord users impacted by 3rd-party service provider's customer service data breach

Discord has confirmed a data breach through one of its third-party customer service vendors, exposing user names, emails, and limited billing info. The company says affected users will be contacted directly by the service.
Rahim Amir Noorali, 06 Oct 2025 09:17
Volvo exhibition booth at Realestate.com.kh Expo 2022, showcasing multiple Volvo cars including SUVs, with promotional banners and branding in front of a grand white building with columns. (Image Source: I'm Zion via Pexels)

Volvo North America confirms staff data stolen after Miljödata ransomware attack

Volvo confirms an employee data leak occurred as a result of the Miljödata ransomware attack. Affected by the breach is the car manufacturer's staff in the United States and one more country; Lund University employees may also be at risk.
Praneeta, 27 Sep 2025 08:51
Slot machines inside a casino with bright illuminated displays and people playing in front (Image source: djedj via Pixabay)

Las Vegas casino operator Boyd Gaming hit by cyberattack exposing information

Boyd Gaming has confirmed a recent cyberattack in a regulatory filing, noting that employee information was affected. The company said its casino and hospitality operations remain unaffected as investigations continue.
Praneeta, 24 Sep 2025 21:35
A screenshot of 2D platformer BlockBlasters that was removed from Steam for embedded malicious code that drained crypto wallets. (Image source: Steam)

Steam removes BlockBlasters after malware drains $150K in crypto from players

BlockBlasters, a verified title on Steam, was removed after it stole players' cryptocurrency to the tune of an estimated $150,000 over a period of one month. The game, released in July 2025, reportedly stole from 261 user accounts, including that of a Twitch streamer who was collecting donations for his cancer treatment.
Rohith Bhaskar, 22 Sep 2025 20:52
DIY projectors aren't anything new, but you don't need DIY Perks level skills to build this one (Image Source: Huy Vector via YouTube)

Pico projector from an old smartphone and the VapeServer - two of the week's best hardware hacks

CheckMag From building a pico projector that mere mortals might actually be able to achieve, to running a web server on a Vape battery, the hacker community never ceases to amaze. Here are two of the week's best hacks.
David Devey, 20 Sep 2025 09:46
A person wearing a Guy Fawkes mask looking at a Windows logo (Image source: Peakpx and Ahmed Zayan via Unsplash; edited)

Hidden flaw in Windows systems lets hackers log in with their own face

Less than two months after demonstrating a “Face Swap” vulnerability, researchers have revealed an even bigger Windows vulnerability. German security firm ERNW has revealed a more advanced attack against Windows Hello that allows attackers to inject their own face templates into victims' accounts.
Chibuike Okpara, 05 Sep 2025 04:52
A promotional image featuring the logo for xAI's Grok AI assistant. (Image source: Wikimedia Commons)

Scammers are using X's Grok AI to spread malicious links

Threat actors have found a way to bypass link restrictions on promoted posts on X, using the platform's Grok AI assistant. The exploit essentially tricks the AI assistant into promoting malicious links on the platform by hiding them in a From field beneath the post.
Rohith Bhaskar, 04 Sep 2025 14:26
Some Sony FeliCa IC cards prior to 2017, including Suica cards used in JR East train stations, are vulnerable to hacking. (Image source: Sony)

Sony FeliCa vulnerability found in pre-2017 IC transport cards

Sony has announced that third parties have found a vulnerability in FeliCa contactless IC cards shipped prior to 2017, including the popular Suica cards used in Tokyo for travel on the JR East train network. This breach allows hackers to read and modify card data.
David Chien, 31 Aug 2025 22:00
PromptLock shows how ransomware groups can weaponize local LLMs. Generic hacker typing on a keyboard pictured. (Image source: Dall-E 3)

ESET uncovers PromptLock ransomware prototype powered by local LLMs

ESET researchers have identified PromptLock, a proof-of-concept ransomware that uses a locally hosted language model to generate attack scripts on demand.
Nathan Ali, 27 Aug 2025 15:46
Artistic representation of Google search with AI assistance. (Image source: Google)

Google's AI overviews showing scam support numbers

Recently, a customer was scammed via a support number shown by Google’s AI overview. This wasn’t the first such case so be weary of the numbers served by these overviews.
Vineet Washington, 18 Aug 2025 18:18
 A modded blue Xbox 360 running a custom homebrew dashboard on a monitor, displaying the game “Conker: Live and Reloaded” alongside other Xbox and emulator titles. (Image source: Modern Vintage Gamer on YouTube)

Xbox 360 jailbreak gets easier with Bad Update 1.2, boosting success rate to 80% and cutting run times

A new version of the Bad Update exploit has been released, bringing a much higher success rate and improved stability to the Xbox 360 jailbreak process. Popular YouTubers such as MrMario2011 and Modern Vintage Gamer have confirmed these improvements. While the process remains unchanged, it is now far more practical for daily use, making homebrew more accessible to stock and non-moddable consoles.
Anmol Dubey, 12 Aug 2025 13:51
A logo of Microsoft SharePoint showcased against a plain white background. (Image Source: Microsoft)

New Microsoft SharePoint exploit patched in emergency security update

Microsoft has rushed out an emergency patch to block two zero-day exploits that have compromised SharePoint servers worldwide.
Rohith Bhaskar, 21 Jul 2025 12:01
Asus dumpster fire video teaser (Image source: GNCA on YouTube)

Gamers Nexus highlights Asus vulnerabilities as 2025 exploits hit routers and bloatware

Gamers Nexus reports that Asus faces multiple security issues in 2025, with active exploits targeting its routers and flaws affecting utilities like DriverHub, MyAsus, and Armory Crate. The coverage warns that persistent backdoors and low-level code vulnerabilities make firmware updates and the removal of unnecessary ASUS software essential for user safety.
Sebastian Jankowski, 19 Jul 2025 01:03
A person wearing a Guy Fawkes mask looking at a Windows logo (Image source: Peakpx and Ahmed Zayan via Unsplash; edited)

Hidden flaw in Windows laptops and desktops allows unauthorized login (identity theft)

ERNW has discovered a significant architectural flaw in Microsoft’s Windows Hello for Business that allows attackers with administrative access to swap facial identities, enabling them to log into another user's account with their own face.
Chibuike Okpara, 16 Jul 2025 06:22
Stellar Blade character Eve next to cryptocurrency (Image source: Shift Up, Amazon with edits)

The official Stellar Blade X account hacked for multiple days, as crypto scams target PC and PS5 game

Fans usually check the official Stellar Blade X account for the latest news on the PC and PS5 game. However, instead, a crypto scammer has asked followers to invest in a new coin. While the posts have disappeared, the game's developer has yet to regain access.
Adam Corsetti, 15 Jul 2025 03:51
Artistic image of a person using Gmail. (Image source: Google Blog)

Hackers could exploit this Gemini mail summaries loophole for phishing attacks

The loophole identified by a Mozilla researcher could allow phishing emails and compromised password warnings to get through to AI summaries generated by Gemini. But it looks like Google is working towards mitigating these gaps.
Vineet Washington, 14 Jul 2025 18:01

Tags

3D Printing (240) 5G (5327) 6G (3) Accessory (9205) AI (2211) Alder Lake (1080) AMD (6300) Android (28468) Anime / Manga (57) Apple (6044) Arc (240) ARM (8671) Arrow Lake (340) Astronomy / Space (467) Audio (2841) Benchmark (572) Biotech (338) Blackwell RTX 5000 (325) Business (11839) Camera (1804) CES 2026 (231) Cezanne (Zen 3) (267) Charts (877) Chromebook (519) Climate (10) Comics (16) Concept / Prototype (236) Console (4080) Convertible / 2-in-1 (2178) CPU (291) Cryptocurrency (393) Cyberlaw (728) Deal (6344) Desktop (7716) DIY (416) Drone (190) E-Ink (173) E-Mobility (4052) Education (71) Exclusive (35) Fail (2137) FemTech (15) Foldable (1853) Gadget (5202) Galaxy A (225) Galaxy M (10) Galaxy S (2830) Galaxy Tab (666) Game Releases (905) Gamecheck (238) Gamescom 2025 (37) Gaming (20921) Garmin (53) Gator Range (1) Geforce (4915) Google Pixel (1661) GPU (2331) Hack / Data Breach (68) Handheld (1891) Health (84) Home Theater (1186) How To (103) Humor (23) IFA 2025 (86) Intel (2452) Intel Evo (395) Internet of Things (IoT) (1060) iOS (1361) iPad (332) iPad Pro (699) iPhone (2950) Jasper Lake (60) Laptop (13689) Launch (11414) Leaks / Rumors (17343) Linux / Unix (1039) List (411) Lucienne (Zen 2) (51) Lunar Lake (267) MacBook (1171) macOS (147) Medusa Point   Meteor Lake (384) Microsoft (433) Mini PC (1739) Monitor (2479) Movies / TV-Shows (201) MS Surface (64) MSI (527) MWC   NAS (72) Network (39) Nova Lake (9) Nvidia (870) Open Source (343) Opinion (404) Panther Lake (102) Public Transport (24) Radeon (563) Raptor Lake (728) Renewable (447) Renoir (379) Retro (252) Review Snippet (1730) RISC-V (61) Robot / Robotics (165) Robot Vacuum (86) Rollable (1) Rugged (198) Ryzen (Zen) (2223) Samsung (991) Science (1121) Security (1535) Server/Datacenter (147) SFF (9) Single-Board Computer (SBC) (623) Smart Home (3584) Smartphone (27771) Smartwatch (4654) Snapdragon X Series (140) Social Media (287) Software (10459) Sports / e-Sports (146) Storage (2684) Tablet (5704) ThinkPad (1690) Thunderbolt (1422) Touchscreen (8276) Ultrabook (2718) Virtual Reality (VR) / Augmented Reality (AR) (1018) Watch (166) Wearable (6389) Wi-Fi 7 (362) Wi-Fi 8   Windows (8417) Workstation (1387) XPS (432) Zen 3 (Vermeer) (355) Zen 4 (597) Zen 5 (543) Zen 6 (19)
Please share our article, every link counts!
Mail Logo
Google Logo Add as a preferred
source on Google
Redaktion, 2013-05- 8 (Update: 2013-09-27)