Latest News
Twitter bans far-right extremist group the Oath Keepers
Twitter has banned the accounts of far-right extremist group the Oath Keepers and its founder, Stewart Rhodes. According to the Southern Poverty Law Center, the group is one of the US's largest anti-government movements. It claims to have tens of tho… Source
Read MoreAirTV Anywhere allows you to watch and record local channels remotely
Sling TV has introduced a way for you to easily watch Netflix and local news on the same device, even when you’re away from home. The company updated one of its distinct products, AirTV, to allow you to view and record local over-the-air (OTA) channe… Source
Read MoreAll the biggest announcements from Ubisoft’s Forward event
Ubisoft just debuted another one of its Forward events, where the company previewed more upcoming titles and details on its fall lineup, including a better look at Immortals Fenyx Rising, the return of Scott Pilgrim vs. The World: The Game, and the announcement of new games like Prince of Persia:…
Read More‘Riders Republic’ is an extreme sports MMO from the studio behind ‘Steep’
Ubisoft is working on a new sports action game called Riders Republic. Set in the heartland of the US, the upcoming multiplayer title allows up to 50 players to race one another on bike, skis, snowboard and wingsuit across an open world that takes in… Source
Read MoreWith Tell Me Why on Xbox Game Pass, episodic gaming has found its moment
Episodic gaming has always felt like an idea that was ahead of its time. For many players, it’s a compelling concept: story-driven games broken up into digestible chunks that you can play over the course of weeks or months. But the realities of game development and release schedules proved problematic.…
Read MoreAttackers can bypass Bluetooth encryption by exploiting new BLURtooth vulnerability null
Researchers at École Polytechnique Fédérale de Lausanne (EPFL) and Purdue University have discovered a new vulnerability in certain implementations of Bluetooth 4.0 through 5.0 which could allow an attacker to gain access to authenticated services by overwriting or lowering the strength of the pairing key. The two teams of academic…
Read More