Honor 6 Plus
Asus Strix Tactic Pro
Xiaomi Redmi 2
V-MODA Crossfade LP
You can do more with Canvio
Honor 4x: A closer look at the build, design and screen quality
Your Take: How Asus Zenfone 5 users rate the device over long term usage
A closer look at the Digiflip Pro ET701 Android tablet, priced at Rs. 3,999
Intel Edison Board Troubleshooting and FAQ
Don't read this, lest you get offended!
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Xiaomi to celebrate 5 year anniversary with new product(s) on March 31
Cyanogen, BLU working on Android device without Google services
Moto X (2015) slated for August / September release
Google says no comments to reporter's query, with a GIF
F8 Conference: Facebook Messenger to allow third-party iOS app integration
Intex Xtreme V
iBall Slide Q40i
How to use Intel XDK plugins for Sublime Text
Intel XDK Update - HTML5 Games, Sublime Text* & Easier to Get Started
Steps to add x86 support to Android Apps Using Unity
3 easy steps for maximum performance for your Android emulator (Intel HAXM)
How does your GPU affect your image blur algorithms
Micromax Canvas Selfie Review
Xiaomi Redmi 2 Review
World's first 5K television from LG
LG's New Mid Range smartphones
'LG VR for G3'
Top phone launches of Q1 2015 in India
Honor 4X: Performance and camera tests
First Impressions: Samsung Galaxy S6, S6 Edge
Top 10 smartphones to buy under 10K in India
Moto Turbo: First Impressions and Benchmarks
Intel Developer Zone
Intel Windows Developer Zone
Turbulence was to be expected from the 27th Chaos Communication Conference being held in Berlin, and a team of computer programmers (the same guys responsible for unlocking the Wii) has revealed the final piece to cracking the PS3 security puzzle that has withstood the concerted onslaught of thousands of hacker/gamers for over four years.
[RELATED_ARTICLE]The team, presumably named fail0verflow, has created a hack that doesn’t require a dongle, and works with a range of firmware versions that range from as recent as the current v3.55, to v3.42 and earlier. Instead of trying to win the impossible war of security bypasses, fail0verflow has pierced straight to the heart of the problem, and has extracted the non-random private cryptography key of the device, enabling users to write self-signed homebrew software. The PS3 system was also jailbroken, with the team managing to overwrite the bootup NOR flash, providing complete control.
The consensus of the active PS3 hacking community out there is that the PS3 is now effectively and irreparably jailbroken, which most unfortunately for Sony, doesn’t just benefit developers, but pirates as well. Reports of the conference say the team commented it would be very difficult for Sony to fix the described exploits, and that Sony's security was an “EPIC FAIL!” Epic, after such a long war, sure, but fail?
The tools required for the fail0ver jailbreak will supposedly be released by the team at some point next month, over at their currently 404 site. Check out the below videos showing off the process behind the hacks: