Microsoft HoloLens headset reviews claim Poor Battery performance
When Microsoft's much awaited HoloLens augmented reality headset goes on sale, you might receive only two-and-a-half hours of backup with the battery that has...
Sharing across Android devices with GooglePlay Family Library
This past Wednesday, July 27, Google (NASDAQ: GOOGL) launched its cross-device sharing service: Sharing across Android devices with GooglePlay Family Library. The service allows...
Alcatel IDOL 4S is the first VR-integrated smartphone
The Alcatel IDOL 4S is the newest flagship smartphone developed by the Chinese company. It will start selling in the U.S. via T-Mobile very...
How safe is Android’s Pattern Lock? Not very
A group of researchers from three different institutions recently developed an algorithm that can crack even the most complicated Android pattern in one single...
New bug on the internet
A new flaw in the internet’s architecture has been discovered, that allows hackers to make DNS attacks. As the specialists in matters of internet security...
Check these 5 alternatives to the Samsung Galaxy 8
Samsung officials have leaked some more information about the upcoming Galaxy 8, this time disclosing the flagship will have facial recognition technology that will...
Samsung unveiled Galaxy Note 5; but will not be available in...
South Korea - The Korean electronic tech giant, Samsung (NASDAQ: SSNLF) has unveiled Galaxy Note 5 at the Galaxy Unpacked 2015 event in New York....
PlayStation 4.5: Know the rumors, price, specs and release date
The virtual gaming industry is definitely on a roll and is looking to make things as exciting as possible to ensure that you come...
Discord bans alt-right servers after Charlottesville protests
On Monday, Discord shut down several alt-right servers where users aligned with “white supremacy and Nazi ideology.” The mass banning came after the pro-Confederate...
USBs can be used to hack computers
Hackers evolve. They create new techniques and malwares, in order to make a successful attack and extract the crucial information that they’re looking for....