Tweetbot 3 for iOS is frequently regarded as one of the better mobile Twitter apps, no matter the platform -- it's full of shortcuts and visual flair that most clients (including Twitter's own) sorely lack. It has been lagging on support for Apple's... [...]
Thu, Oct 02, 2014
Source: Engadget
The market for used iPhone's is fraught with risk, because you may end up paying hundreds of dollars for a locked off device, or worse -- one that appears legit but can't make calls. Apple has just revealed an iCloud tool to nip that in the bud by... [...]
Thu, Oct 02, 2014
Source: Engadget
The wearable craze isn't only about fashionable watches and savvy glasses. After all, remember how tech giant Intel's vision for the space included a shirt? Hexoskin, a Canada-based startup, has similar beliefs, and that's why it recently introduced... [...]
Thu, Oct 02, 2014
Source: Engadget
Sure, you've been able to change the background on your PS Vita since day one, but swapping out the system's application icons wasn't exactly an option. Until now, that is. With the latest update to Sony's handheld, the custom themes that the... [...]
Thu, Oct 02, 2014
Source: Engadget
Since the launch of the Signature Touch, Vertu CEO Max Pogliani promised that "technology will be more a merging factor and not a differentiation point" for his phones. That's literally the case with the new mid-tier Aster launched today: This... [...]
Thu, Oct 02, 2014
Source: Engadget
Netflix said it had more movies coming other than the sequel to Crouching Tiger, Hidden Dragon and it's already lining them up, starting with an exclusive four picture deal for Adam Sandler. The comedian's flicks have grossed over $3 billion... [...]
Thu, Oct 02, 2014
Source: Engadget
It wasn't all that long ago that the biggest argument surrounding video games was whether or not they should be considered art -- something that's given way to more distressing topics as of late. A German gallery has an opinion on the former,... [...]
Wed, Oct 01, 2014
Source: Engadget
Curious as to just which Honda models you'd see Android pop up in first? If you had money on the 2015 Civic, Civic Tourer and CRV it's time to collect your prize from the pool. Google's mobile OS will appear as standard equipment in those vehicles... [...]
Wed, Oct 01, 2014
Source: Engadget
Wondering what all the e-cig hullabaloo is about? Today, we take an in-depth look at the birth of vaporized nicotine and its growing, mod-addicted community. That's not all we have on deck though -- read on for our news highlights from the last 24... [...]
Wed, Oct 01, 2014
Source: Engadget
Verizon is about to make it much easier to catch The Daily Show when you can't reach your TV on time. As part of a renewed carriage deal, Big Red will let you watch all of Viacom's live channels (including Comedy Central, MTV and Nickelodeon) through... [...]
Wed, Oct 01, 2014
Source: Engadget
Did you think that Tesla was done with surprises this year after name-dropping the Model 3? Far from it. The company's Elon Musk has just teased the unveiling of what looks like another vehicle, the "D," on October 9th. There will also be "something... [...]
Wed, Oct 01, 2014
Source: Engadget
Still confused about why the new version of Windows is 10, instead of 9? Beyond the loosely defined numbering schemes that are all too common in tech (how many iPhones did it take to get to 6?), a note posted to Reddit could provide an answer. Reddit... [...]
Wed, Oct 01, 2014
Source: Engadget
Cross-site scripting (XSS) vulnerability in HP System Management Homepage (SMH) before 7.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. [...]
Wed, Oct 01, 2014
Source: National Vulnerabilities Database
Cross-site request forgery (CSRF) vulnerability in HP System Management Homepage (SMH) before 7.4 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors. [...]
Wed, Oct 01, 2014
Source: National Vulnerabilities Database
HP System Management Homepage (SMH) before 7.4 allows remote attackers to conduct clickjacking attacks via unspecified vectors. [...]
Wed, Oct 01, 2014
Source: National Vulnerabilities Database
Unspecified vulnerability in the Administrative Console on the IBM WebSphere DataPower XC10 appliance 2.5 allows remote attackers to obtain administrative privileges by leveraging access to an eXtreme Scale distributed ObjectGrid network. [...]
Wed, Oct 01, 2014
Source: National Vulnerabilities Database
Unspecified vulnerability on the IBM WebSphere DataPower XC10 appliance 2.5 allows remote attackers to obtain administrative privileges by leveraging access to an eXtreme Scale distributed ObjectGrid network and capturing a session cookie. [...]
Wed, Oct 01, 2014
Source: National Vulnerabilities Database
Open redirect vulnerability in IBM Tivoli Federated Identity Manager (TFIM) 6.2.0 before 6.2.0-TIV-TFIM-IF0015, 6.2.1 before 6.2.1-TIV-TFIM-IF0007, and 6.2.2 before 6.2.2-TIV-TFIM-IF0011 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. [...]
Wed, Oct 01, 2014
Source: National Vulnerabilities Database
IBM Maximo Asset Management 7.1 through 7.1.1.13 and 7.5 through 7.5.0.6, Maximo Asset Management 7.5.0 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk, and Maximo Asset Management 7.1 and 7.2 for Tivoli IT Asset Management for IT and certain other products allow remote attackers to obtain sensitive directory [...]
Wed, Oct 01, 2014
Source: National Vulnerabilities Database
IBM WebSphere MQ 8.x before 8.0.0.1 does not properly enforce CHLAUTH rules for blocking client connections in certain circumstances related to the CONNAUTH attribute, which allows remote authenticated users to bypass intended queue-manager access restrictions via unspecified vectors. [...]
Wed, Oct 01, 2014
Source: National Vulnerabilities Database