Razer Blade 14 gaming laptop, Razer Raptor 27 (2021), and Razer USB-C 130W GaN Charger were announced at E3 2021 during the company’s keynote. The Razer Blade 14 is a slim gaming laptop that uses AMD’s latest Ryzen 5000 series CPU and Nvidia’s latest GeForce RTX 30 series GPUs. The Razer Raptor 27 (2021) gets
admin
Niantic and Hasbro have partnered to announce a new game called Transformers: Heavy Metal. This real-world mobile AR game looks to satiate all Transformers fans, letting them team up with the likes of Bumblebee and the Autobots to save the world from Decepticons. The Transformers franchise was a big deal in the mid-80s and the
Call of Duty: Warzone and Black Ops Cold War are all set to get Season 4 update on June 17. Activision has shared what players have to look forward to in the new season including four multiplayer maps, five new weapons, a new quest in Outbreak, new Points of Interests (PoI) in Verdansk, and more.
Hitman Sniper: The Shadows, a spin-off to Hitman: Sniper mobile game, has been announced at E3 2021 by Square Enix. The game will be free-to-play, which is a new direction for the game, as Hitman: Sniper was paid. In Hitman Sniper: The Shadows, you do not play as Agent 47 but as one of the
Jun.13 — It’s been a difficult few months for NIO Inc.. The company has laid off employees, cancelled plans for a factory, and reported its third-consecutive month of declining vehicle deliveries and a revenue forecast for the second quarter that missed the lowest analyst estimate. The electric vehicle startup’s founder and Chief Executive Officer William
May.08 — Byron Allen, Entertainment Studios chief executive officer, comedian and onetime TV host, discusses his investment in Sinclair Broadcast Group’ acquisition of Fox’s regional sports networks, and his company’s plans to buy four TV stations in Indiana and Louisiana. He speaks on “Bloomberg Technology.”
Chamath Palihapitiya, Social Capital founder, discusses President Trump’s impact of Silicon Valley with Bloomberg’s Emily Chang on “Bloomberg Technology.”
Nov. 4 — Former Microsoft Chief Executive Officer Steve Ballmer joins host Emily Chang on “Bloomberg Studio 1.0” to discuss his relationship with Bill Gates. Like this video? Subscribe to Bloomberg Technology on YouTube: http://www.youtube.com/BloombergTech?sub_confirmation=1 Subscribe to Bloomberg for the latest business news: http://www.youtube.com/Bloomberg?sub_confirmation=1 And subscribe to Bloomberg Politics for the latest political news: http://www.youtube.com/BloombergPolitics?sub_confirmation=1
Jan.07 — Sofi Chief Executive Officer Anthony Noto talks about why he’s taking the company public through a SPAC and his plans for more mergers in the future. He speaks with Emily Chang on “Bloomberg Technology.”
Jul.23 — Apple Inc. co-founder Steve Wozniak says YouTube has for months allowed scammers to use his name and likeness as part of a phony bitcoin giveaway. He speaks with Bloomberg’s Emily Chang.
Nov.30 — George Hotz, Comma.ai founder, discusses self-driving car technology and regulations with Bloomberg’s Emily Chang on “Bloomberg Technology.”
Attention readers, if you are using Google Chrome browser on your Windows, Mac, or Linux computers, you need to update it immediately to the latest version Google released earlier today. Google on Wednesday rolled out an urgent update for Chrome browser to address 14 newly discovered security issues, including a zero-day flaw that it says
Meat processing company JBS on Wednesday confirmed it paid extortionists $11 million in bitcoins to regain access to its systems following a destructive ransomware attack late last month. “In consultation with internal IT professionals and third-party cybersecurity experts, the company made the decision to mitigate any unforeseen issues related to the attack and ensure no
Bolstering password policies in your organization is an important part of a robust cybersecurity strategy. Cybercriminals are using compromised accounts as one of their favorite tactics to infiltrate business-critical environments; as we’ve seen in recent news, these attacks can be dangerous and financially impactful. Unfortunately, account compromise is a very successful attack method and requires
An emerging ransomware strain in the threat landscape claims to have breached 30 organizations in just four months since it went operational, riding on the coattails of a notorious ransomware syndicate. First observed in February 2021, “Prometheus” is an offshoot of another well-known ransomware variant called Thanos, which was previously deployed against state-run organizations in
The U.S. Department of Justice (DoJ) Thursday said it disrupted and took down the infrastructure of an underground marketplace known as “Slilpp” that specialized in trading stolen login credentials as part of an international law enforcement operation. Over a dozen individuals have been charged or arrested in connection with the illegal marketplace. The cyber crackdown,
Cybersecurity researchers on Thursday took the wraps off a new cyberespionage group that has been behind a series of targeted attacks against diplomatic entities and telecommunication companies in Africa and the Middle East since at least 2017. Dubbed “BackdoorDiplomacy,” the campaign involves targeting weak points in internet-exposed devices such as web servers to perform a
A seven-year-old privilege escalation vulnerability discovered in the polkit system service could be exploited by a malicious unprivileged local attacker to bypass authorization and escalate permissions to the root user. Tracked as CVE-2021-3560 (CVSS score: 7.8), the flaw affects polkit versions between 0.113 and 0.118 and was discovered by GitHub security researcher Kevin Backhouse, who
Organizations’ cybersecurity capabilities have improved over the past decade, mostly out of necessity. As their defenses get better, so do the methods, tactics, and techniques malicious actors devise to penetrate their environments. Instead of the standard virus or trojan, attackers today will deploy a variety of tools and methods to infiltrate an organization’s environment and
Multiple critical security flaws have been disclosed in Samsung’s pre-installed Android apps, which, if successfully exploited, could have allowed adversaries access to personal data without users’ consent and take control of the devices. “The impact of these bugs could have allowed an attacker to access and edit the victim’s contacts, calls, SMS/MMS, install arbitrary apps