Hacker Takes Over Oculus Ceo’S Twitter Account, Announces New Boss

Oculus CEO’s Twitter account hacked, Hacker announces new Oculus CEO through it An unknown hacker hacked Oculus CEO Brendan Iribe’s Twitter account on Wednesday. The hacker then used the hacked Twitter account to promptly announce a new CEO for the Facebook owned virtual reality company. The hacker also changed Iribe’s Twitter bio to read, “im not testing ya security im just havin a laugh.” This is just the latest in a string of tech CEO’s having their Twitter accounts compromised, however this hack doesnt seem to be the work of OurMine which has in the past hacked accounts of Travis Kalanick, Sundar Pichai, Mark Zuckerberg and Dick Costolo ....

December 18, 2025 · 1 min · 168 words · Carol Deason

Hackers Auction Stolen Source Code For League Of Legends

Hackers are auctioning the alleged source code of the popular multiplayer online arena video game “League of Legends” stolen from the American gaming giant Riot Games in a cyberattack last week. Cyberattack On Riot Games Last Friday, Riot Games confirmed the cyberattack in a series of tweets in which it said that it was targeted by threat actors in an unexpected social engineering attack where the game company’s developer environment was compromised....

December 18, 2025 · 4 min · 840 words · Laura Walker

Hackers Compromised Ccleaner Software By Installing A Hidden Backdoor

CCleaner contained malicious backdoor that secretly stole information from users’ computers Researchers at the security firm, Cisco Talos have reported that CCleaner, a system-optimization tool distributed by anti-virus firm Avast, was hacked to distribute malware directly to its users through a hidden backdoor. The malware allows hackers to potentially get access to the user’s computer, and other connected systems, to steal personal data or credentials. CCleaner is a popular utility program used to clean potentially unwanted files (including temporary internet files, where malicious programs and code tend to reside) and invalid Windows Registry entries from a computer....

December 18, 2025 · 3 min · 612 words · Thomas Stagnaro

Hackers Exploited Zero

Threat actors have exploited a zero-day bug in the General Bytes Bitcoin ATM servers that allowed them to steal cryptocurrency from customers who purchased or deposited bitcoin through these ATMs. General Bytes is currently one of the largest Bitcoin, Blockchain, and Cryptocurrency ATM manufacturers with over 9,000 crypto ATMs installed throughout the world. Based on the product, it allows people to buy, trade, or deposit over 40 different cryptocurrencies. The Bitcoin ATMs manufactured by the company is controlled by a remote Crypto Application Server (CAS), which manages the ATM’s entire operation, including which cryptocurrencies are supported, real-time buying and selling of crypto on exchanges, and adding or delisting coins for transactions....

December 18, 2025 · 3 min · 535 words · Justin Hamburger

Here Is How Mark Zuckerberg And Other Celebrity Twitter Accounts Were Hacked

It Appears Every Celebrity Twitter Account Is Being Hacked Right Now and Here Is The Reason Why If you have been following online reports, you would find that at least one Hollywood celebrity Twitter account is being hacked everyday and the hackers are using the hacked Twitter accounts to tweet. Even the Facebook CEO, Mark Zuckerberg’s Twitter, Instagram and Pinterest accounts were hacked similarly. The hackers than use this hacked celebrity Twitter accounts to tweet something about a sex tape, making an unlikely death announcement or saying, “bush did 911” causing all sorts of embarrassment to the celebrity in question....

December 18, 2025 · 3 min · 639 words · James Chan

How To Fix Clock Watchdog Timeout Error On Windows 11/10

Blue Screen of Death errors (BSOD) on Windows are pretty common. Some go away after you restart the PC , while others can persist and prevent you from booting to the desktop. CLOCK_WATCHDOG_TIMEOUT is one such BSOD error affecting Windows 10 and 11 users. This error code indicates a communication problem between your PC and the CPU . This error appears when a System takes longer than the time allotted by the CPU to provide an output....

December 18, 2025 · 5 min · 1005 words · Trina Fleming

How To Make Your Android Smartphone Automatically Switch To Strongest Wi

Make Your Android Smartphone Automatically Switch to the Strongest Available WiFi Network One feature where Android smartphone fails to Apple’s iPhone is smart Wi-Fi connection. The iPhone has a built-in feature to switch to the strongest Wi-Fi signal without dropping the connection. This is where Android OS fails miserably. This becomes a major headache when you may have set up multiple routers or repeaters to ensure full wireless coverage but your Android smartphone connects to the next Wi-Fi signal only after your current signal drops to zero....

December 18, 2025 · 3 min · 448 words · Tamatha Jones

How To Open, Convert Flac File On Any Device

MP3 has become synonymous with audio files around the world. Its size and above-average quality have really helped in global adoption. The only problem with MP3 is that it is a lossy format. This means that there is a significant loss in quality when reducing the file size for reasons like fitting in more files or saving space in general. FLAC shines in this regard, offering a lossless audio format. There is no loss in quality when compressed or reduced in size....

December 18, 2025 · 10 min · 2064 words · Leila Wagster

How To Turn Off Phone Without Power Button [Android]

Sometimes, for a variety of reasons, such as a broken power button, you might need to switch off your Android phone without the power button. This is a typical occurrence on all devices, but what should you do if it is needed for your Android phone? There are some workarounds put in place by your phone’s manufacturer, as well as some third-party ones that may be used to switch off your Android phone without the power button when you are in any situation that requires it....

December 18, 2025 · 7 min · 1280 words · John Dage

Hundreds Of Secret Ufo ‘X

X-Files revealed: CIA releases top-secret UFO reports online The U.S. Central Intelligence Agency (CIA) has decided to release hundreds of X-files-like UFO documents on their website, a moment that UFO fans all over the world have been waiting for since the first sightings were noted. The CIA has declassified hundreds of documents detailing the agency’s investigations into UFOs in a move to make sure that things are easier for Mulder and Scully....

December 18, 2025 · 4 min · 645 words · Amy Sikes

Igi 2: Covert Strike Download For Windows Pc [2025]

If you want to download IGI 2: Covert Strike on a Windows 10 PC then you have landed on the right article. Initially released on 21 February 2003, IGI 2: Covert Strike is still a popular stealth-based first-person shooter game. The sequel to Project I.G.I is set in spectacular locations like Russia and the South China Sea. The single-player campaigns in IGI 2: Covert Strike are nicely organized into 19 main missions and the story is presented in cutscenes....

December 18, 2025 · 3 min · 458 words · Linda Lawson

Kerala, Indian Fb User Arrested For Livestreaming Sex On His Facebook Page

Idukki youth arrested for live-streaming sex on Facebook While live streaming explicit NSFW acts on Facebook are quite a common occurrence in the United States of America, in deeply conservative India it is frowned upon. However, there have been instances of revenge p@@n when exes leak images of their girlfriend/boyfriend after a breakup. Linu, a 23-year-old Facebook user from Idukki district in Kerala, India become perhaps the first youth to be arrested for live streaming his erotic act with his girlfriend on Facebook....

December 18, 2025 · 3 min · 507 words · Roy Mcneal

Li.Fi Protocol Targeted By Exploit, Reportedly Affecting Jumper, Draining $10 Million Already

According to the latest updates from the company, the crypto interoperability platform Li.fi has been affected by an exploit. It is reported that assets worth $10 million have already been drained. In an X post published on 16 July, the official handle of the Li.fi protocol warned users not to use any applications powered by the protocol. The post asked users not to interact with Li.fi-based applications as the company is doing an investigation on the exploit....

December 18, 2025 · 3 min · 447 words · Nancy Lubrano

Mac Os 8 For Windows And Linux Now Available As An Emulator

Announced in 1997, Mac OS 8 was coined as Apple’s next-generation operating system. Thanks to Slack developer Felix Rieseberg, you can now use MacOS 8 on a Windows, Linux, or modern macOS laptop or desktop as a downloadable application. As you might remember, Felix Rieseberg also developed an emulator for running Windows 95 on modern-day operating systems. This time around, Rieseberg has transformed an entire 1991 Macintosh Quadra with Mac OS 8....

December 18, 2025 · 2 min · 329 words · Paul Martin

Meta Fined €251M For 2018 Data Breach That Affected 29M Facebook Accounts

According to Ireland’s regulator, the breach dates back to July 2017, when Facebook deployed a video upload function that included a “View As” feature. This feature allowed users to view their own Facebook page as another user would. The cyber attackers exploited a vulnerability in Facebook’s “View As” feature, which allowed them to invoke the video uploader in conjunction with Facebook’s “Happy Birthday Composer” feature. The video uploader generated a user token that gave the attackers full access to the other user’s Facebook profile....

December 18, 2025 · 2 min · 407 words · Steven Block

Microsoft Confirms Acquiring Cybersecurity Firm Riskiq

Microsoft on Monday announced in a blog post that it is acquiring San Francisco-based cybersecurity firm RiskIQ , a leader in global threat intelligence and attack surface management. The Redmond giant said it is buying RiskIQ to “help our shared customers build a more comprehensive view of the global threats to their businesses, better understand vulnerable internet-facing assets, and build world-class threat intelligence.” Further, RiskIQ’s SaaS (software as a service) platform is powered by a global internet intelligence graph that has mapped the billions of relationships between the internet components belonging to every organization, business, and threat actor on Earth....

December 18, 2025 · 3 min · 477 words · Maria Freeman

Microsoft Confirms Its Systems Was Hacked By Lapsus$ Group

Microsoft on Tuesday confirmed that the hacking group LAPSUS$ had gained “limited access” to a single account, but the attempt was interrupted by its security teams. For those unaware, earlier, on Sunday morning, the LAPSUS$ gang had posted a file holding nearly 37GB of data stolen from Microsoft’s Azure DevOps Server and claimed that it contained partial source code for Bing, Cortana, and other projects. “No customer code or data was involved in the observed activities....

December 18, 2025 · 3 min · 463 words · Sheila Gibson

Microsoft Flight Simulator Finally Launched For Windows 10 Pc

Over the years, Microsoft has played a crucial roll in the development of the PC gaming industry. In addition to making a developer-friendly operating system, Microsoft has also produced many prominent games like Minecraft, Halo Infinite, Gears 5, Flight Simulator X, and many more. The highly anticipated Microsoft Flight Simulator has finally been launched for Windows 10 PC. The successor to the 2006 Flight Simulator X has become the highest-scoring PC game release of the year....

December 18, 2025 · 3 min · 474 words · Henry Tibbets

Microsoft’S Windows 10 May 2020 Update Is Breaking The Fresh Start Feature

Microsoft’s latest Windows 10 May 2020 (version 2004) update is reportedly breaking the important “Fresh Start” functionality in the operating system. For those unaware, the Fresh Start feature in Windows 10 lets, you perform a clean reinstallation and update of Windows while keeping your personal data and most Windows settings intact. The tool “may improve your device’s startup and shutdown experience, memory usage, storage app performance, browsing experience, and battery life,” says Microsoft....

December 18, 2025 · 2 min · 304 words · Larry Whittington

Mit Researchers Find New “Unpatchable” Vulnerability In Apple’S M1 Chip

Researchers at MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) in a new paper have exposed an “untraceable” hardware vulnerability in Apple’s most powerful chip to date, the M1. The M1 chip implements a security feature called “Pointer Authentication”, which acts as the “last line of security” against memory corruption exploits on the M1 SoC. For the unversed, Pointer authentication works by offering a special CPU instruction to add a cryptographic signature — or Pointer Authentication Code (PAC) — to unused high-order bits of a pointer before storing the pointer....

December 18, 2025 · 3 min · 514 words · Jamie Valenzula