Apple Launches The 4.7

Apple on Wednesday finally announced its much-anticipated and affordable second generation of iPhone SE . According to Apple, the iPhone SE (2020) is a powerful new smartphone in a popular design. For those unaware, Apple had launched its popular budget handset and the original iPhone SE in March 2016, which turned out to be the company’s most successful device. “The first iPhone SE was a hit with many customers who loved its unique combination of small size, high-end performance, and affordable price; the new second-generation iPhone SE builds on that great idea and improves on it in every way — including our best-ever single-camera system for great photos and videos — while still being very affordable,” said Phil Schiller, Apple’s senior vice president of Worldwide Marketing....

December 14, 2025 · 4 min · 759 words · Vivian Roberson

Apple Watch Explodes And Sends Man To Hospital

Sadly an explosion in an Apple Watch Series 7 due to overheating has sent a man to the hospital. Right before the blast the battery of the Apple Watch expanded and overheated. At the time of writing this article, Apple is well aware of the accident and the company confirmed that it would investigate what happened. That said, Apple pressurized and asked the user to stay silent and not share the story with anyone....

December 14, 2025 · 2 min · 311 words · Brian Edwards

Badbox 2.0 Infects Over A Million Android Devices, Fbi Warns

The Federal Bureau of Investigation (FBI) on Thursday issued a fresh warning about BADBOX 2.0, a dangerous Android malware campaign that has quietly infected more than a million internet-connected devices in homes around the world. This malware is turning every day, lower-budget, and uncertified consumer electronics into tools for cybercriminals. What Is BADBOX 2.0? BADBOX 2.0 is the latest version of the original BADBOX malware that was discovered in 2023. It is primarily found on Chinese-manufactured Android-based devices—including digital streaming boxes, unbranded smart TVs, aftermarket vehicle infotainment systems, digital picture frames, low-budget tablets and projectors, and other Internet of Things (IoT) gadgets....

December 14, 2025 · 4 min · 643 words · Lloyd Cochran

Bitcoin Jumps Above The $20,000 Mark For The First Time

Bitcoin (BTC) , the world’s most popular cryptocurrency, breached the $20,000 mark for the first time on Wednesday. The cryptocurrency jumped as much as 7.6% to $20,893 in New York on Wednesday. This year Bitcoin has gained more than 170% as larger investors seek it for its purported inflation-resistant qualities. Further, there are also other reasons that can help increase the cryptocurrency prices even higher. These factors include growing institutional demand, increasing perception among investors that Bitcoin is a digital store of value and an alternative to gold, stronger network fundamentals, potential for quick gains, and expectations that the cryptocurrency will become a mainstream payment method...

December 14, 2025 · 2 min · 387 words · Gail Redfield

Cisa Flags Active Exploits In Windows, Cisco

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two security vulnerabilities affecting Cisco and Windows products to its Known Exploited Vulnerabilities (KEV) catalog, on Monday, warning organizations of active exploitation by malicious actors. The two below-mentioned vulnerabilities, which have been added to the KEV based on evidence of exploit campaigns, are frequent attack vectors for malicious cyber actors, and pose significant risks to organizations. These are: CVE-2023-20118 (CVSS Score: 6....

December 14, 2025 · 2 min · 425 words · Amanda Hornback

Cybersecurity Firm Mistakenly Hires North Korean Hacker, Faces Hack Attack

KnowBe4, a U.S.-based security awareness training company, recently discovered that it had inadvertently hired a North Korean fake IT worker for the role of Principal Software Engineer after the employee’s newly given computer became infected with malware. In an incident report summary on insider threat published on Tuesday, Stu Sjouwerman, KnowBe4 CEO and President said that the North Korean hacker posing as a software engineer was reportedly hired through a standard recruitment process for their AI division, which involved multiple interviews, background checks, and reference verifications....

December 14, 2025 · 3 min · 589 words · Louis Payne

Deep Discharge Fixes Nintendo Switch Consoles Excessive Battery Drain

Nintendo Switch is one of the greatest handheld gaming consoles of all time. Despite being five years old now the console is still quite popular among gamers. One of the most common problems found in the regular and OLED Nintendo Switch is excessive battery drain. In response to users complaining about rapidly draining batteries, Nintendo has asked users to perform a deep-drain and recharge cycle on the batteries. Lately, OLED Nintendo Switch owners have been complaining about the draining of batteries overnight when the console is supposed to be in sleep mode....

December 14, 2025 · 2 min · 344 words · Ray Jones

Dish Network Has Been Hit With Outage For Almost 2 Days

Dish Network, the first largest and direct-broadcast satellite service provider in the United States, has been experiencing a major internal outage since Thursday morning that has caused its company’s main websites, apps, and customer support systems to remain offline for almost 2 days now. Apparently, the outage began around the same time that Dish was to release the company’s earnings for Q4 and fiscal year 2022. CEO Erik Carlson took the opportunity to address the outage problems....

December 14, 2025 · 3 min · 584 words · Gerald Terry

Do You Know The Use Of Function Keys (F1 To F12)?

What is the use of Function keys on your Computer; F1 to F12 shortcut keys use in windows? These keys sit atop your keyboard yet you may have hardly used them except for certain functions like pressing F1 for help while using Microsoft Office programs. PC and laptop keyboard comes with a set of Function Keys which cater to special functions. These Function Keys running from F1 through to F12 help you use shortcuts and special functions....

December 14, 2025 · 4 min · 738 words · Michelle Johnson

Do You Know Why There Is A Cylinder At The End Of Your Charger?

What Is This Cylinder On Your Charger For? While my laptop charger has never bugged me, but I always felt strange at times to see a bump in my laptop charger right after it connects to the laptop. I always use to wonder why the charger has a bump and what purpose does it serve? You normally see these “bumps” on the mouse, keyboard and monitor cables in a typical computer system found in a home or office....

December 14, 2025 · 3 min · 435 words · Pearl Morton

Eztv Ditches .It For .Ch Domain, Faces Problems

Top TV Torrent Website Has Ditched Italian .IT Domain for Swiss .CH Domain But Still Facing Problems The top TV shows torrents provider, EZTV has switched domains after facing heat from the Italian authorities over copy right infringements. Founded in 2005, the TV-torrent site EZTV has served torrents for nearly a decade. It has jumped to become one of the most popular torrents website in its niche on the Internet today....

December 14, 2025 · 1 min · 210 words · Marcia Snell

Fake Ai Tools Spread Noodlophile Malware To 62K+ Via Facebook

In a concerning development, cybercriminals are leveraging the popularity of artificial intelligence (AI) tools to distribute a new malware called ‘Noodlophile Stealer’ through Facebook. The Deceptive Tactic According to researchers at Morphisec, threat actors create fake “AI-themed” video generation platforms, promoted through seemingly legitimate Facebook groups and viral social media campaigns. These groups, boasting over 62,000 views on a single post, attract users to upload images or videos, promising AI-generated content in return, indicating the campaign’s extensive reach....

December 14, 2025 · 3 min · 560 words · Roger Brooks

Gmail Accounts Compromised As Russian Hackers Bypass Mfa

According to security researchers at Google’s Threat Intelligence Group (GTIG), the attacks began in at least April and continued through early June 2025. The hackers, tracked under the name UNC6293 and suspected to be linked to the well-known APT29/ICECAP group, relied on carefully crafted social engineering tactics to extract login credentials from their victims. Hackers Used Deception, Not Malware Rather than using typical malware or blatant phishing links, the attackers opted for a more subtle approach....

December 14, 2025 · 3 min · 500 words · Ricky Champagne

Google Acquires Ai Avatar Start

Tech giant Google has reportedly acquired Alter, an artificial intelligence (AI) avatar start-up for about $100 million in an effort to boost its own content offerings and better compete against the reigning short-form video platform, TikTok. While the takeover was completed about two months ago, both the companies chose not to officially announce it, reported TechCrunch on Thursday citing an unnamed source familiar with the matter. However, last week, Google confirmed the purchase but declined to comment on the financial terms of the deal....

December 14, 2025 · 2 min · 329 words · Thomas Johnson

Google Meet Video Conferencing Is Now Free For Everyone, Here’S How To Get It

The increased need for social video calling across the globe amid the coronavirus (COVID-19) lockdown has seen video conferencing apps like Zoom, Messenger Rooms , Microsoft Teams, Skype and more becoming hugely popular among employees working from home and students doing online education. In a move to compete with its rival video chat service Zoom, Google announced that it is making its premium video conferencing app, Google Meet free for everyone until September 30....

December 14, 2025 · 3 min · 459 words · Everett Bailey

Google Offers 100,000 Scholarships For Certificates In Data Analytics, Ux & Project Management

Google on Monday announced a new suite of Google Career Certificates to help U.S. workers get qualifications in high-paying, high-growth job fields such as Data Analytics, Project Management, and User Experience (UX) Design. As part of the initiative, the search giant would fund 100,000 need-based scholarships and it will consider all of its Career Certificates as the equivalent of a four-year college degree for related roles in the company. “College degrees are out of reach for many Americans, and you shouldn’t need a college diploma to have economic security....

December 14, 2025 · 3 min · 440 words · Eugene Hirt

Google To Shut Down Currents And Migrate Users To Spaces In 2023

Starting in 2023, Google is planning to wind down Google Currents , the work-focused app it specially brought for G Suite users in 2019, the company announced in a blog post on Thursday. The search giant said it will instead migrate remaining content and communities over to Spaces , a dedicated app for organizing people, topics, and projects in Google Workspace that tightly integrates with Gmail, Calendar, Drive, and Meet, which was introduced last year....

December 14, 2025 · 2 min · 321 words · Jonathan Bynum

Google Warns Of Actively Exploited Zero

Google on Tuesday rolled out patches for 50 security vulnerabilities affecting its Pixel smartphones, of which one patched vulnerability has already been exploited in the wild as a zero-day. The zero-day tracked as CVE-2024-32896, which has been rated a high-severity security issue, exploits the elevation of privilege (EoP) flaw in the Pixel firmware. This flaw could provide threat actors with app rights that should not be available to them, thereby giving them access to sensitive data....

December 14, 2025 · 2 min · 239 words · Rebecca Thomas

Hacker Finds A Way To Take Over Any Iphone, Macbook Camera

According to Pickren, Apple requires nearly every app to be granted explicit permission to access the camera and microphone, but the same was not true for Apple’s own apps, such as Safari. He exploited this exception to uncover the vulnerabilities and managed to “hammer the browser with obscure corner cases” until he got access to the camera. “The camera security model in iOS and macOS is pretty intense. In a nutshell, each app must be explicitly granted camera/microphone permission, which is handled by the OS via a standard alert box”, Pickren wrote in a blog post ....

December 14, 2025 · 2 min · 346 words · Mildred Willis

Hackers Exploit New Linux Vulnerability To Hijack Vpn Connections

A research team has discovered a new vulnerability that affects most Linux and Unix-like operating systems, including FreeBSD, OpenBSD, Android, iOS and macOS systems. The flaw allows remote ‘network adjacent attackers’ to hijack and tamper with VPN (Virtual Private Network) connections, and inject malicious data into the TCP (Transmission Control Protocol) stream. “I am reporting a vulnerability that exists on most Linux distros, and other *nix operating systems which allows a network adjacent attacker to determine if another user is connected to a VPN, the virtual IP address they have been assigned by the VPN server, and whether or not there is an active connection to a given website....

December 14, 2025 · 3 min · 485 words · Roberta Mullis