Apple Unveils M3, M3 Pro, And M3 Max Processors

Apple officially announced its latest M-series processor family, M3, M3 Pro, and M3 Max, on Monday at its October “Scary Fast” Halloween Eve product event. These new chips are the first personal computer chips built using the TSMC 3nm process technology, which packs more transistors into a smaller space and improves speed and efficiency. Apple says that the M3 processor family showcases the next-generation GPU that represents the biggest leap forward in graphics architecture ever for Apple silicon....

January 15, 2026 · 2 min · 328 words · Ralph Martinez

Avast’S Free Antivirus Tracked And Sold User Data To Google, Microsoft

Popular antivirus firm Avast reportedly harvested users’ data via browser plugins and then sold it through a subsidiary to several biggest companies in the world, according to an investigative study done by Motherboard and PCMag . Jumpshot, a subsidiary of Avast, is responsible for selling data, accessing user data from Avast Antivirus’ free browser extension. It has access to data from over 100 million devices, including PCs and mobile devices....

January 15, 2026 · 3 min · 498 words · Mark Varner

Call Of Duty Modern Warfare Servers Down: Users Unable To Connect Or Login

It’s not just you, Call of Duty Modern Warfare and Warzone Servers are actually down for everyone. Users are unable to connect or login into the call of duty server. Sites like down detector and outage report are showing users from around the globe are reporting the downtime and facing issues logging into the server. Also Read- Best Multiplayer Online Games For PC What Happened? Activision, the developer of the call of duty is aware of the situation and is working to fix the issue....

January 15, 2026 · 1 min · 138 words · Chet Stormo

Delorean’S New Alpha5 Is A Four Seater Electric Vehicle

DeLorean Motors Reimagined LLC (doing business as DeLorean Motor Company or DMC) on Monday released the images of its highly anticipated all-new electric vehicle (EV), dubbed “Alpha5”. For the unversed, the original DeLorean is famously remembered for producing the DMC DeLorean (DMC-12) stainless steel sports car that featured as the time machine in the Back to the Future film trilogy (1985, 1989, and 1990). However, the company was shut down when it went bankrupt in 1982....

January 15, 2026 · 3 min · 482 words · Edna Lehtonen

Dji Announces Mini 2 With Longer Flight Time, 4K Video Recording And More

DJI on Thursday announced DJI Mini 2, the successor to the original DJI Mavic Mini drone that was launched in October 2019. The new ultralight and foldable Mini 2 weighs less than 249 grams (0.55lb), which allows users to fly the drone without needing to register with the Federal Aviation Administration (FAA). The drone has folded dimensions of 138×81×58 mm (L×W×H) and unfolded dimensions of 159×203×56 mm (L×W×H). DJI Mini 2 supports up to 4K video resolution at 30 fps (frames per second) at a 100Mbps video bitrate, which is up from 2....

January 15, 2026 · 3 min · 469 words · Miriam Brand

Elon Musk Says Tesla Vehicles Can Now Be Bought Using Bitcoin

Tesla in a filing with the Securities and Exchange Commission (SEC) last month had revealed that it had bought $1.5 billion in bitcoin and that it would soon start accepting bitcoin as payment for the purchase of Tesla motors. Back then, the electric car maker said that it was buying the cryptocurrency for “more flexibility to further diversify and maximize returns on our cash.” It also added that it will accept bitcoin in exchange for its products “subject to applicable laws and initially on a limited basis, which we may or may not liquidate upon receipt....

January 15, 2026 · 2 min · 306 words · Scott Gracey

Expressvpn Removes India

ExpressVPN on Thursday removed its physical VPN (virtual private network) servers from India, as it disagreed with the new VPN rules introduced in the country that limits internet freedom. According to the new data law, all VPN providers are required to collect/store user information for at least five years – even after users stop using the service – and hand it over to India’s Computer Emergency Response Team (CERT-In). The new VPN order in India, which is set to become effective on June 27, 2022, will require companies to store users’ real names, IP addresses assigned to them, usage patterns, and other identifying data....

January 15, 2026 · 3 min · 544 words · Paul Paul

Facebook Messenger Adds Ar Group Effects To Video Calls And Rooms

Facebook on Thursday announced a new feature called “Group Effects” for Messenger video calls as well as Messenger Rooms, a videoconferencing facility like Zoom. Group Effects are new AR (augmented reality) experiences that can augment everyone on a video call at the same time, enabling a more fun and immersive way to connect with friends and family. “We’re excited to see how creators, like Ross Wakefield who designed the “Blow the Dandelion” effect, expand their creativity with Group Effects, while also helping you deepen connections with friends and family in real-time,” Facebook wrote in a blog post....

January 15, 2026 · 2 min · 394 words · Betty Merino

Fake Calendly Invites Used To Steal Google And Facebook Ad Accounts

Cybercriminals are running a sophisticated, long-running phishing operation that uses fake Calendly invitations — disguised to appear to be from major global brands — to steal Google Workspace and Facebook Business account credentials. The campaign, uncovered by cybersecurity researchers at Push Security, depends upon polished social engineering and advanced detection-evasion techniques to infiltrate high-value advertising platforms. How The Scam Works The attack begins with a multi-stage phishing email that appears to come from a legitimate recruiter at a well-known company....

January 15, 2026 · 3 min · 555 words · Olive White

Fake Msi Afterburner Download Webpage Is Spreading Malware

MSI Afterburner is one of the most reliable programs for overclocking GPUs. Using Afterburner you can set clock speeds for the GPU and memory, adjust the voltage, and monitor the temperature of the card. In a nutshell, Afterburner allows users to run a GPU at its full potential. In addition to MSI Graphics cards, Afterburner can also be used with cards from other GPU manufacturers. Amid the rise of cryptocurrency miners, MSI has alerted users about a malicious software that is being disguised as the official MSI Afterburner software....

January 15, 2026 · 2 min · 291 words · Richard Johnson

Five Plead Guilty In North Korea It Hiring Scam

Five people — four Americans and one Ukrainian — have pleaded guilty to helping North Korean operatives secure remote IT jobs at U.S. companies, generating more than $2.2 million for Pyongyang’s sanctioned government, the U.S. Department of Justice (DoJ) announced on Friday. According to the prosecutors, the group acted as “facilitators,” using their own identities — along with false and stolen identities belonging to at least 18 U.S. citizens — to place North Korean workers in U....

January 15, 2026 · 4 min · 640 words · James Scofield

Fix: One Airpod Louder Than The Other

Apple AirPods provide you with a great listening experience. Typically, AirPods work flawlessly, but occasionally users come across an issue in which the sound of one AirPod gets louder than the other this can be your right AirPod or left. Or Similarly, One Airpod can be quieter than the other. Facing such issues is very frustrating and ruins the entire experience of using AirPods. If you are also having similar problems with your AirPod, or Airpod Pro then don’t worry....

January 15, 2026 · 6 min · 1073 words · Carolyn Tinker

Fortinet Confirms Data Breach, 440Gb Of Files Stolen

Fortinet, the third-largest cyber security firm in the world, confirmed on Thursday that they suffered a data breach after a hacker claimed unauthorized access to a third-party cloud-based file-sharing service used by the company, affecting a small number of its customers in the Asia-Pacific region. Fortinet, a company based in Sunnyvale, California, develops and sells security solutions, such as firewalls, endpoint security, and intrusion detection systems. Interestingly, a threat actor known as “Fortibitch” claimed on a hacking forum that they had stolen 440GB of files from the company’s Microsoft Sharepoint server....

January 15, 2026 · 3 min · 433 words · Nancy Benson

Google Denies Reports Of Massive Gmail Data Breach, Calls Claims “False”

Google has slammed reports of a massive Gmail hack as “completely false,” after several media outlets ran sensational headlines over the weekend claiming that 183 million accounts were exposed in a huge data leak. The company clarified that the reports were inaccurate and based on a misunderstanding of previously stolen data, and not an actual breach of its systems. “Reports of a “Gmail security breach impacting millions of users” are false....

January 15, 2026 · 3 min · 565 words · Cynthia Jackola

Google Warns Users To Install Chrome Emergency Update Immediately

Last week, Google released an emergency security update for all its 3.2 billion Chrome users to address a high-severity zero-day vulnerability that is being actively exploited in the wild. Google has rolled out the new Chrome version 112.0.5615.121 for Windows, Mac, and Linux systems, as an emergency update which means that the security issue in the Web browser is serious. The emergency Chrome update to version 112.0.5615.121 is unique, as it only fixes a single security flaw....

January 15, 2026 · 3 min · 431 words · Robert Welborn

Google’S Gemini Ai Faces Controversy Over Edited Demo Video

Google on Wednesday launched its next-generation and multimodal AI (artificial intelligence) model, Gemini, calling it the “most capable, flexible, and general AI model” that the company has ever built. It also displayed a six-minute demonstrative video to the public and publication outlets. However, within 24 hours of its release, Google started facing backlash over the authenticity of the demonstration video of Gemini, saying that it was not conducted in real-time....

January 15, 2026 · 3 min · 607 words · Charlotte Tenery

Google’S Pixel Cameras To Read Your Heart Rate And Respiratory Rate

Google on Thursday announced that cameras on Google Pixel smartphones will now allow users to measure their heart rate and respiratory rate. Starting next month, the feature will be made available as an update to Google Fit, the company’s health tracking app, on Pixel phones with plans of making it available to more users by expanding support to non-Pixel phones in the future. “Heart rate and respiratory rate are two vital signs commonly used to assess your health and wellness....

January 15, 2026 · 2 min · 403 words · Charles Harris

Gta Vice City Download For Pc: Free (Windows 10/11/7) 2025

Developed by Rockstar North and published by Rockstar Games , Grand Theft Auto: Vice City is an action-adventure game that was released in 2002. Despite being two decades old, GTA Vice City is still insanely popular among gamers. Luckily, Grand Theft Auto Vice City can be downloaded and played on all modern computers, smartphones, and gaming consoles. In this article, we have shared different methods to Download Vice City on your preferred hardware....

January 15, 2026 · 5 min · 914 words · Robert Brown

Hackers Can Crash Your Chrome And Firefox Browser Remotely Using Search Suggestions

Researchers discover a way to crash Chrome and Firefox browsers on Linux PCs and Android smartphones Imagine you are searching for a keyword on Google search using Chrome browser on your Android smartphone. The Chrome browser will immediately return the most plausible suggestions matching your search. Click on one of these search suggestions and suddenly you will find your Chrome browser has crashed. This is due to a bug found out by security researchers from Nightwatch Cybersecurity ....

January 15, 2026 · 4 min · 641 words · Joyce Paya

Hands

Hackers and penetration testers across the globe spend a lot of time finding vulnerable wireless routers or access points enabling them to freely use open networks or those with weak encryption. Though these vulnerabilities get fixed with each new iteration of routers and firmware upgrades, fresh opportunities keep appearing for hackers to look into. Security researchers have revealed a vulnerability in the WPS protocol of routers. WPS (WiFi Protected Setup) uses a hard-coded PIN number that is pre-stored in routers allowing for easy wireless connections with various devices....

January 15, 2026 · 4 min · 655 words · William Williams