Xiaomi Mi 4I With Octa Core Soc To Be Launched At Global Mi Phone Premier In India On April 23 Event

— Mi India (@XiaomiIndia) April 10, 2015 The Mi 4i iteration was spotted by a Chinese website MyDrivers on Singapore’s Infocomm Development authority (IDA) database, and also on GeekBench, a benchmarking website over the weekend. As per the GeekBench listing, the Xiaomi Mi 4i is a Android 5.0.2 Lollipop based smartphone. It is powered by a 64-bit octa-core Snapdragon 615 processor clocked at 1.65GHz. It is powered by 2GB RAM and has 16GB of internal storage with a microSD slot for expansion of memory....

December 5, 2022 · 2 min · 255 words · Michelle Lempke

Xiaomi Mi 5 Rumored To Have Fingerprint Sensor And 16Mp Camera

Xiaomi Mi 5, codenamed Libra, is said to carry premium specs inviting competition from every other smartphone. According to the latest report, the Xiaomi Mi 5 will sport a fingerprint scanner. However, no details as to how would the fingerprint scanner technology has been disclosed in the new report. This confirms the previous report that had mentioned that Xiaomi had filed a patent and detailed the fingerprint recognition method via the handset’s buttons....

December 5, 2022 · 2 min · 365 words · Candace Walter

Xiaomi S New Tablet Can Turn Itself Into A Transformer Robot Techworm

Codenamed Soundwave, it basically looks like the Mi Pad 2 that turns itself into a Transformer like bot. Soundwave, which is being produced in honour of Xiaomi’s sixth anniversary on April 6 is primarily made for Xiaomi fans in China. “R&D worked really hard to ensure that the colour, details, and feel are exactly the same as Mi Pad 2. They were challenged at turning such a slim 7mm tablet into a 3D robot, but they managed to do so with a 30-step folding assembly”, said Hugo Barra, Global Vice President of Xiaomi in a Facebook post....

December 5, 2022 · 2 min · 356 words · Richard Cardenas

You Can Now Play 10 000 Retro Amiga Games In Your Browser Techworm

The collection, which surfaced at the start of August and has since blown up, comprises classics such as Double Dragon, King’s Quest II, Back to the Future Part II, Elite, Batman, Xenon, and Bubble Bobble. The collection also includes a lot of licensed stuff such as Rainbow Islands and R-Type. There are also a huge number of demos, shareware, and applications, such as Electronic Arts’ Deluxe Paint I through IV....

December 5, 2022 · 1 min · 180 words · Leticia Small

You Can Use This Website To Share Self Destructing Encrypted File Techworm

However there some many prerequisites for using a the website. The download link can only be used once. Nafue works like this. You want to share a very imported file, you have to encrypt it on your side using a a password generated using Pbkdf2 key before uploading it to the s3 storage service. Once this is done, the website will provide you with a one-time-use link to share with the recipient....

December 5, 2022 · 1 min · 177 words · Frances Vanderploeg

Your Smartphone Battery Could Be Snooping On You

The security researchers have found out that a feature of the HTML5 specification tells websites how much battery is left in a users’ phone and and is intended to allow websites to help preserve battery if phones are running low. At the same time, the information could then be used to spy on their online activity, allowing people to be tracked. You hit the power saver mode whenever your smartphone or your laptop goes low on battery....

December 5, 2022 · 2 min · 411 words · Kenneth Seals

Drone Strikes British Airways Plane Approaching Heathrow Airport Techworm

The British Airways flight BA727 travelling from Geneva, Switzerland was hit as it approached the Heathrow Terminal 5 at about 12:50pm with 132 passengers and five crew members on board, the Metropolitan Police has said. A Metropolitan Police spokesperson said: “A pilot on an inbound flight into Heathrow Airport from Geneva reported to police that he believed a drone had struck the aircraft. “It transpired that an object, believed to be a drone, had struck the front of the aircraft....

December 4, 2022 · 2 min · 242 words · Brett Mitchell

Freak Security Flaw Allowed Hackers To Steal Passwords And Personal Data From Iphone And Android Users For Past 10 Years

Researchers who have published their report on SmackTLS, state that this flaw existed from 10 years and Google Inc. and Apple Inc. are now trying to fix this vulnerability. A group of cryptographers at INRIA, Microsoft Research and IMDEA have discovered some serious vulnerabilities in OpenSSL (e.g., Android) clients and Apple TLS/SSL clients (e.g., Safari) that allow a ‘man in the middle attacker’ (MiTM) to downgrade connections from ‘strong’ RSA to ‘export-grade’ RSA....

December 4, 2022 · 2 min · 378 words · Katherine Green

10 Best Sites To Download Subtitles For Movies Tv Shows

There are over 50 major languages spoken around the world, and mastering each one of them would be an impossible task, for the purpose of watching movies and TV shows without subtitles. What Are Subtitles? Subtitles are text that displays the transcript of the dialogues of a scene as the screenplay progresses forward. What Are Subtitles?Why Use Subtitles?Best Site to Download Subtitles for Movies and TV Shows1. Addic7ed2. Opensubtitles3. Yifysubtitles4....

December 4, 2022 · 9 min · 1912 words · Joan Than

10 Best Torrent Sites For Game Download In 2023 Safe Working

Over the past few years, the gaming industry has been developing at a rapid pace. Developers are publishing games with realistic graphics accompanied by great storylines. Dozens of AAA titles are released every month and gamers wonder which torrent sites they can use to download game torrents. The reason behind using Torrent game sites instead of a normal game download site is that torrent sites use p2p file sharing method and is convenient to download bigger files using torrenting sites....

December 4, 2022 · 7 min · 1416 words · Fannie Huff

130 000 Chinese Rail Passengers Data Leaked Via Official Railway Ticketing Website130 000 Chinese Rail Passengers Data Leaked Via Official Railway Ticketing Website

Real-name registration must be provided to purchase tickets via the official website.The local news reported that data such as usernames, e-mail address, passwords, and phone numbers of over 130,000 customers of official railway ticketing website of China Railway, 12306.cn had been leaked. The leak is discerning for the Chinese citizens as all the China Railway passengers are required to register with real names and email ids to purchase the tickets....

December 4, 2022 · 1 min · 195 words · Amanda Mayson

3 Brutal Mobile Marketing Mistakes That Can Wreck Your Business Techworm

You know what’s worse than making a mobile marketing mistake? Not even knowing that you’re doing it wrong in the first place. You don’t want that, and neither do I. That’s why on this guide, we’re going to talk about the 3 mistakes that you might be making, that’s keeping your business from reaching greater heights. If you’ve been using mobile marketing for quite some time now, yet you haven’t really given your promotional campaigns a closer look to make sure that you’re doing them right, then you might want to continue reading....

December 4, 2022 · 6 min · 1070 words · Jason Nelson

365 Pakistani Websites Hacked And Defaced By Afghan Cyber Army Techworm

Most of the websites were still showing defaced page at the time of writing the Article Earlier today they also hacked Daily Post International, website of leading Newspaper from Pakistan Don’t be a silent user let us know what do you think about it in comments below 🙂

December 4, 2022 · 1 min · 48 words · Mary Ratliff

5 Best Hacking Books You Must Read To Be A Hacker

Ethical hacking (legal) is defined as making use of programming skills, so as to penetrate a computer system, and identify weaknesses in data computer security for business and organizations across the globe, to protect them from hackers or criminals with less honest motives. This not only helps them earn a good and honest living but also keeps them away from facing prison time. On the other hand, in Unethical hacking (illegal) is used by hackers to penetrate into a computer system and exploit it for their own personal gains or mischief....

December 4, 2022 · 4 min · 798 words · Roger Wells

5 Top Reasons To Install Linux On Your Laptop Techworm

Here are the top 5 reasons why you should switch to Linux on your laptop1. You don’t have to abandon Windows (or OS X)2. It’s easy to install3. It has everything that you need4. It is very safe5. You are supporting open source and free software Linux is available in different flavors called distros (distributions) and the choice is yours which one you want to opt for. By far, Ubuntu is the most popular desktop distro and is a good place to start for novices....

December 4, 2022 · 4 min · 744 words · Gregory Rieser

5 Ways In Which Technology Has Improved Every Day Living Techworm

It’s fascinating how technology moves at a fast pace. Ever wondered what else will be invented 30 to 40 years from now? With all the luxuries and conveniences we are enjoying right now, it’s overwhelming to think what else is in store for humanity. Technology will keep on advancing as long as we exist. Let’s just take 3D printers for example. Who would have thought we could make rapid prototypes of almost everything right from home?...

December 4, 2022 · 1 min · 171 words · Michell Mullins

A New Implant Could Boost Failing Human Brains Techworm

Berger tells IEEE Spectrum that his experiments with rats and primates make him confident that “it’s really time” for a clinical device. “We’re testing it in humans now, and getting good initial results,” he says. “We’re going to go forward with the goal of commercializing this prosthesis.” The prosthetic, which Berger has been working on for so many years, can function as an artificial hippocampus, which is a major component of the human brain and one of the first regions in the brain to suffer damage in Alzheimer’s....

December 4, 2022 · 4 min · 652 words · Ellie Hillyer

Adobe Ends Support For Flash Player

Finally, Adobe has gone ahead and pulled the plug on its Flash Player on December 31, 2020. This means users will now no longer receive “Security Update for Adobe Flash Player” from Microsoft that applies to Microsoft Edge Legacy and Internet Explorer 11. Starting in January 2021, Adobe Flash Player will be disabled by default and all versions older than KB4561600 released in June 2020 will be blocked. Downloadable resources related to Adobe Flash Player that are hosted on Microsoft websites will no longer be available....

December 4, 2022 · 2 min · 293 words · Randall Dangelo

Airdroid App Vulnerable To Authentication Flaw That Allows Hackers To Take Over Smartphone

AirDroid for Android is a very popular App among smartphone users and has been downloaded 20 million times with a overall 4.5 stars ratings from reviewers on Google Play. Researchers at Bishop Fox have discovered that it is vulnerable to a pretty serious authentication bug which can be exploited even if the AirDroid for Android App is not being used. Once an attacker gains access to a victim’s phone, an attacker can perform actions such as taking photos via the phone’s camera, track the victim via GPS, send messages and harass the victim’s contacts, Bishop Fox’s Matt Bryant explained in a blog post....

December 4, 2022 · 2 min · 226 words · Carlos Maffei

Alleged Nullcrew Hacker Arrested By The Fbi On Charges Involving Cyber Attacks On Companies And Universities Techworm

During the investigation one of the IP address which was used by the alias, Orbit was found to be assigned to French’s Morristown, Tenn., address belonging to Timothy. If convicted Timothy may face upto 10 years in prison and a $250,000 fine.

December 4, 2022 · 1 min · 42 words · Christopher Freeze