Blog

Review: Updated: Windows 10

Windows 10 review: Introduction Update: While Microsoft’s recent behaviors surrounding Windows 10 are causing a ruckus for some users, the company is trying to appease gamers with a new cross platform initiative between PC and Xbox. Read on into “Latest news” to find out more. Windows 10 is an entirely fresh version of Microsoft’s veteran

Read More
Review: Updated: Apple Music

Introduction Update: Apple has just announced a UI overhaul of Apple Music at WWDC 2016 with a renewed focus on clarity and simplicity. In addition to reorganising the app, Apple has also added new discovery modes to allow you to find curated lists of new music, as well as daily curated playlists (which appear to

Read More
Review: Updated: iPad Pro 9.7

Introduction and design Update: The iPad Pro 9.7 is about to get its first major software upgrade with iOS 10, which Apple plans to announce at WWDC 2016 this week. We’ll revise this review accordingly when that happens. The iPad Pro is ambitiously touted as Apple’s new tablet that has the guts to replace your

Read More
Hands-on review: Dell Precision 7710

Hardware vendors have annual refresh cycles, both for consumer and professional products. While that’s a fairly easy exercise for the former, trying to innovate too much with a niche professional audience can backfire – and sometimes badly. Dell somehow took the risk and completely revisited its 17-inch workstation, although we feel the company didn’t push

Read More
Hacked Twitter accounts are posting links to adult dating and sex personals

Over 2,500 Twitter accounts were compromised to post links to adult dating and sex personals. Blog Feature Image:  hooded_keyboard.jpg Twitter Card Style:  summary_large_image More than 2,500 Twitter accounts have been compromised to tweet links to websites specializing in adult dating and sex personals. The attackers also changed the profile photo, biography, and full name of

Read More
TA16-144A: WPAD Name Collision Vulnerability

Original release date: May 23, 2016 | Last revised: June 01, 2016 Systems Affected Windows, OS X, Linux systems, and web browsers with WPAD enabled Networks using unregistered or unreserved TLDs Overview Web Proxy Auto-Discovery (WPAD) Domain Name System (DNS) queries that are intended for resolution on private or enterprise DNS servers have been observed

Read More
TA16-132A: Exploitation of SAP Business Applications

Original release date: May 11, 2016 Systems Affected Outdated or misconfigured SAP systems Overview At least 36 organizations worldwide are affected by an SAP vulnerability [1]. Security researchers from Onapsis discovered indicators of exploitation against these organizations’ SAP business applications. The observed indicators relate to the abuse of the Invoker Servlet, a built-in functionality in

Read More