Moto E (2nd Gen) 4G
Lenovo A6000 Plus
Yurbuds Venture Talk
Quick, cheap fixes for common tech problems
15 slim, sexy laptops that don't cost a bomb
Windows 10: 10 great new features in store for you
Internet of Things: Using MRAA to Abstract Platform I/O Capabilities
ZTE Nubia Z9 Mini: First Impressions
Don't read this, lest you get offended!
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Samsung Galaxy Note 5, Project Zero 2 details revealed
India's very own space shuttle will launch in the next 2-3 months
Android M to bring native support for fingerprint scanning
NSA planned to hack phones via Google Play store
Google reportedly working on 'Brillo OS' for IoTs
Asus O!Play Mini V2
Videocon Infinium Z45 Nova plus
Meizu M1 Note
Nubia Z9 Mini
How to use Intel XDK plugins for Sublime Text
Intel XDK Update - HTML5 Games, Sublime Text* & Easier to Get Started
Steps to add x86 support to Android Apps Using Unity
3 easy steps for maximum performance for your Android emulator (Intel HAXM)
How does your GPU affect your image blur algorithms
Lenovo A6000 Plus Review
Top launches of the week: May 22, 2015
6 weird inventions that tried too hard
Top stories of the week: May 22, 2015
10 best smartphones to buy between Rs. 10,000 to Rs. 20,000
First Look: Panasonic’s newly launched Toughbook and Toughpads
Intel Windows Developer Zone
Intel Developer Zone
Intel IoT Developer Zone
Turbulence was to be expected from the 27th Chaos Communication Conference being held in Berlin, and a team of computer programmers (the same guys responsible for unlocking the Wii) has revealed the final piece to cracking the PS3 security puzzle that has withstood the concerted onslaught of thousands of hacker/gamers for over four years.
[RELATED_ARTICLE]The team, presumably named fail0verflow, has created a hack that doesn’t require a dongle, and works with a range of firmware versions that range from as recent as the current v3.55, to v3.42 and earlier. Instead of trying to win the impossible war of security bypasses, fail0verflow has pierced straight to the heart of the problem, and has extracted the non-random private cryptography key of the device, enabling users to write self-signed homebrew software. The PS3 system was also jailbroken, with the team managing to overwrite the bootup NOR flash, providing complete control.
The consensus of the active PS3 hacking community out there is that the PS3 is now effectively and irreparably jailbroken, which most unfortunately for Sony, doesn’t just benefit developers, but pirates as well. Reports of the conference say the team commented it would be very difficult for Sony to fix the described exploits, and that Sony's security was an “EPIC FAIL!” Epic, after such a long war, sure, but fail?
The tools required for the fail0ver jailbreak will supposedly be released by the team at some point next month, over at their currently 404 site. Check out the below videos showing off the process behind the hacks: