Archives by date

You are browsing the site archives by date.

Pelican iPhone XS and personal utility cases: Protect your iPhone from drops and shelter your gear outside

Since I live in the mild climate of Washington State, I spend lots of time outside running, hiking, fly fishing, camping, and more. In addition, as a professional engineer, you can often find me crawling around various spaces, tanks, and voids of commercial ships. Thus, I need to wrap my gear in a rugged case for adequate protection. top picks… Read more →

TicWatch S2, Pixel Slate coding, Nokia is back, Chrome OS tethering (MobileTechRoundup show #458)

As people continue to try to stick to New Year’s resolutions, Mobvoi is there to help with affordable TicWatch Google Wear watches. As discusssed on MobileTechRoundup show #458 we offer some impressions of the TicWatch S2, thoughts on Chrome OS as a primary computing platform, and more. Image: ZDNet Matt is taking the $180 Ticwatch S2 WearOS watch for a… Read more →

LocalBitcoins blames security breach on forum ‘third-party software’

Image: LocalBitcoins // Composition: ZDNet LocalBitcoins, a peer-to-peer cryptocurrency exchange portal, announced a security breach yesterday, Saturday, January 26. The breach occurred at around 10:00 UTC (05:00 ET) and lasted for almost five hours before the company intervened to stop the ongoing attack. During that time, users reported that when accessing the LocalBictoins forum, they would be redirected to a… Read more →

WordPress sites under attack via zero-day in abandoned plugin

WordPress site owners using the “Total Donations” plugin are advised to delete the plugin from their servers to prevent hackers from exploiting an unpatched vulnerability in its code and take over affected sites. Attacks using this zero-day have been observed over the past week by security experts from Defiant, the company behind the Wordfence firewall plugin for WordPress. The zero-day… Read more →

Japanese government plans to hack into citizens’ IoT devices

The Japanese government approved a law amendment on Friday that will allow government workers to hack into people’s Internet of Things devices as part of an unprecedented survey of insecure IoT devices. The survey will be carried out by employees of the National Institute of Information and Communications Technology (NICT) under the supervision of the Ministry of Internal Affairs and… Read more →

Totallee glossy Pixel 3/3 XL case: No branding, no bulk, and added grip

MWC: The best and worst of the past five years Mobile World Congress is the premier trade show for mobile hardware, software, accessories and services. We regularly see new smartphones and wearables, some good and some bad, … Source Article from https://www.zdnet.com/pictures/totallee-glossy-pixel-33-xl-case-no-branding-no-bulk-and-added-grip/#ftag=RSSbaffb68Totallee glossy Pixel 3/3 XL case: No branding, no bulk, and added griphttps://www.zdnet.com/pictures/totallee-glossy-pixel-33-xl-case-no-branding-no-bulk-and-added-grip/#ftag=RSSbaffb68http://www.zdnet.com/blog/rss.xmlLatest blogs for ZDNetLatest blogs for ZDNethttps://zdnet3.cbsistatic.com/fly/bundles/zdnetcore/images/logos/zdnet-144×144.png

I’m a happy iPhone XR owner and this is how Apple should sell it

It keeps on going. Image: Sarah Tew/CNET Apple won’t stop annoying me. It’s not deliberate. At least, not as far as I’m aware. Also: The absolute best iPhone deals It’s just that the company keeps running that iPhone XR ad with the people in colored jumpsuits running headlong, in search of a mythical Pamplona bull. Or something. It’s supposed to excite… Read more →

DailyMotion discloses credential stuffing attack

Image: DailyMotion Video sharing platform DailyMotion announced on Friday that it was the victim of a credential stuffing attack, ZDNet has learned. Credentials stuffing is a security term that describes a type of cyber-attack where hackers take combinations of usernames and passwords leaked from other sites and use them to gain illegal access on accounts on another site. According to… Read more →

Hackers are going after Cisco RV320/RV325 routers using a new exploit

Cisco RV320 router Image: Cisco // Composition: ZDNet Security researchers have observed ongoing internet scans and exploitation attempts against Cisco RV320 and RV325 WAN VPN routers, two models very popular among internet service providers and large enterprises. Attacks started on Friday, January 25, after security researcher David Davidson published a proof-of-concept exploit for two Cisco RV320 and RV325 vulnerabilities. The… Read more →

Google Chrome to add drive-by-download protection

Google engineers have started working on adding drive-by download protection in Chromium, the open-source browser engine that Chrome is based on. The feature is already active in the current Chrome Canary edition and is scheduled to land in the stable version, in Chrome 73, scheduled for release in March or April. For ZDNet’s non-technical users, “drive-by download” is a term… Read more →