Breaking tech news from all your favorite sources
See all
Members (290,791)
Amalia Agathou's profile photo
Zee M Kane's profile photo
! "Animals Special" Google+ !'s profile photo
(Shamrock Grn Love)'s profile photo
'wafa fadey's profile photo
+Corrinas2013Designs's profile photo
! 'DEUTSCHLAND 'GOOGLE !'s profile photo
'Altamir Marley's profile photo
! jese 'lot !'s profile photo
!*Share Worthy Vids*'s profile photo
" MORISIKA " ........ film by Nipon Dholua.'s profile photo
$mart Crowdfunding & Macrofinancing Consulting's profile photo
"Professor Jenny" - Local SEO Specialist's profile photo
"The Closer" Sales Training's profile photo
' fizicks's profile photo
# Barimakers's profile photo
# BESTEST's profile photo
'Aang Jnr's profile photo
# Mithun's profile photo
* * * Kids Movies & Games * * *'s profile photo
‫## فُےـرجَےـيّےـنٌےـيّےـٱ ##2015‬‎'s profile photo
*Administartor *'s profile photo
#5Ive00 Kolione's profile photo
'Bolaji Akinsanya's profile photo

Stream

Join this community to post or comment

JM Hipolito

Discussion  - 
 
A popular mobile messaging application, LINE was used as a bait to lure targets in a targeted attack which hit Taiwan government. LINE, an application that offers free calls and chat messages is commonly used in countries such as Taiwan, Japan, Indonesia, India, United States, Mexico, and Colombia among others. Based on reports, as of 2014, it has global users of more than 490 million registered users. The number of LINE users in Taiwan reaches up to 17 million in the same year. As proof of its popularity, certain government officials are said to employ this application for communication purposes in the office.
2
Add a comment...

JM Hipolito

Discussion  - 
 
Threats that can evade detection are among the most dangerous kind we’re facing today. We see these characteristics in the most challenging security issues like targeted attacks and zero-day exploits. Being able to stay hidden can determine the success of an attack, making it something that attackers continuously want to achieve. In this series of blog posts, we will take a look at one of the techniques used by cybercriminals to evade detection and analysis.
In the first part of this series of blog posts, we examine how steganography is being used to hide malware settings.
2
2
Rudy Salazar's profile photoJohn Paquette's profile photo
Add a comment...

Samuel Bel

Discussion  - 
 
This article really explains why Taylor Swift shook Spotify off. (see what I did there XD). What do you guys think about this situation?
http://techgulp.com/controversy_spotify_free_music/
2
Samuel Bel's profile photoGreg s's profile photo
3 comments
Greg s
 
Taylor Swift is paid programming....
Add a comment...

Joshua Pitts

Discussion  - 
9
4
Creed Haymond's profile photoJacob Smith's profile photoAakash Patni's profile photoMarcos Gonzalez's profile photo
 
wow, that is pretty cool-lookin!
Add a comment...

Tech Grapple

Discussion  - 
 
Samsung has not used the same sensor for all Galaxy S6 and S6 edge, so you must be thinking which one is the best. Samsung used two sensors: Sony IMX240 and Samsung’s own ISOCELL sensor. Now the question is why Samsung did that and if there is any specific region for specific camera sensor? Samsung has not …
View original post
1
Add a comment...

George Virginia

Discussion  - 
 
 
YangYang: Humanoid robot that scarily resembles Sarah Palin is unveiled in China. Well, I guess she has the same style of glasses.
A humanoid robot designed by Hiroshi Ishiguro has been unveiled at the Global Mobile Internet Conference.
6 comments on original post
2
1
Michael Ross's profile photoRoswell Night's profile photoDan G.'s profile photo
4 comments
 
So the mega corporation that owns this android is gonna assasinate and impersonate the real Sarah in order to win the presidential election and take over america... Then the world? No? Technology isn't convincing enough yet? Damn, that would've been a fun story.
Add a comment...

Luke Snyder

Discussion  - 
 
SpaceX engineers and mission specialists head to Cape Canaveral today to launch a prototype of the 'Dragon' crew capsule into the water. The test was designed to prove the Dragon's fail safe technology that would allow its crew to escape a failed launch in one piece:
10
Add a comment...

John Powers

Discussion  - 
 
The world's first autonomous 18-wheeler is getting down to business. At a ceremony at the Las Vegas Motor Speedway on Tuesday, Gov. Brian Sandoval handed ove...
5 comments on original post
12
2
Steven Davidson's profile photoKurt Joseph's profile photoCarl M. Gregory (Max)'s profile photo
 
Finally!
Add a comment...

Younus Hassan

Discussion  - 
 
Ride bicycles!
56
19
Heman Gandhi's profile photoAngela Spragg's profile photoDavid Myers's profile photoLangano Hyku's profile photo
5 comments
J oker
 
+Jordan H 😀
Add a comment...

Andraž Rihtar

Discussion  - 
 
That's some next-gen shit right there!
 
#tech  
Man, I just watched a crazy video. The video was an advertisement for the startup company “The Void”, which is working on creating virtual reality arenas. The Void plans on using constructed arenas, practical special effects, motion simulators, proprietary HMDs (Head mounted displays), and an assortment of other virtual reality tech to melt people’s minds with some of the wildest, immersive and interactive virtual reality experiences. In their li...
View original post
4
2
Justin Werner's profile photogabe smith's profile photo
Add a comment...

About this community

Tech news, views and reviews brought to you by the team at The Next Web.

Vamien McKalin

Discussion  - 
 
Mobile is taking over the world. The PC is dying ladies and gentlemen.
A major tipping point in the modern Internet has hit: the search engine giant Google has announced that, for the first time in its history, more people googled from their mobile devices than from their personal computers.
6
1
Justin Goldsmith's profile photoAndreev Andrei's profile photoWaf's profile photo
3 comments
 
What I'd say is that a balance will be reached eventually. Those that can use mobile more or less exclusively are bound to be more in number as not everyone needs a PC for work. 
Add a comment...
 
The IoT can help the world improve in many ways.

+Anis Uzzaman(the CEO of +Fenox Venture Capital) delivered a keynote speech at the Tech in Asia Singapore 2015.

He talked about how IoT, Wearable and Health IT are leading the trends and how these new trendy areas are looked at by corporations and startups.
Anis Uzzaman, general partner and CEO Fenox Venture Capital delivers a keynote speech on what Silicon Valley trends could soon grip the global tech scene.
1
Add a comment...
 
 
A Virginia man has sued the Fairfax County Police Department for collecting images of his license plate in a massive database.
2 comments on original post
3
Add a comment...

George Virginia

Discussion  - 
 
 
Dire need for talented workers with the skills to fend off the nation's foes.

#IT #InformationTechnology #Security #Servers 
The commander of US Navy Cyber announced a five-year strategy, and like the Pentagon's cyber strategy announcement two weeks earlier, acknowledged the dire need for talented workers with the skills to fend off the nation's foes.
View original post
3
Add a comment...

Chad Buenaflor

Discussion  - 
 
HTC One M8 Problems, Glitches, Questions, Errors and Solutions [Part 37]
Welcome to the 37th part in our series of troubleshooting articles dedicated to the HTC One M8. Once the flagship model of the Taiwanese company, this model is still one of the best Android phones out...
4
Add a comment...
 
                                            Apple CEO Tim Cook. For Apple, the good times keep on coming: New data from Kantar Worldpanel show that the Cupertino company's smartphone business is continuing to grow at Google'...
1
Yggdrasil AE's profile photoDonald Troup's profile photo
2 comments
 
Considering the iPhone releases in Q4, this isn't that big a news.
Add a comment...
 
This new app, BizzBook lets you hire local pros with a simple text. Instead of having to make countless calls, they take your request & blast it to local companies and let them compete for your business. 
2
Stefan Kojouharov's profile photo
 
Anyone else use this?
Add a comment...

Luke Snyder

Discussion  - 
 
This recently discovered piece of malware seems like your standard trojan at first; gathering data wholesale from browsing sessions, making off with crucial bits of info via FTP, and avoiding detection with clever disguise. Where it gets interesting is that if the Rombertik virus detects that it is being analyzed it will overwrite your master boot record rather than give up its secrets:
A new malware, Rombertik, is making headlines for its hostile response to investigation techniques. When it detects an attempt, it attacks the master boot record of the local hard drive.
2
Madeleine Doan's profile photo
 
Yikes, how do you remove something like that?
Add a comment...

George Virginia

Discussion  - 
 
 
Holders of BC/BS #Anthem LOOK
WASHINGTON — Virginia Gov. Terry McAuliffe says he received a letter alerting him that the social security numbers of two of his five children were exposed in a recent data breach. On Wednesday, McAuliffe used…
View original post
1
George Virginia's profile photoChristine Felixon's profile photo
3 comments
 
+George Virginia I remember when they first said that it happened I figured that it is probably the government that did it. I am not going to worry about it. Anything online is subject to nosy eyes anyways. Lol 
Add a comment...