Highly confidential information concerning Apple, the company’s business practices, and designs has allegedly been hacked in a ransomware attack against a key Apple partner, Luxshare Precision Industry.
The attacking group is called RansomHub, which claims to have purloined product data, confidential design files (including 3D CAD models), and personally identifiable employee information in the heist. The group is threatening to leak this information unless a ransom is paid. It also said it gathered equally sensitive information concerning Nvidia and LG during the attack.
None of the concerned parties have confirmed the claims.
Who is Luxshare?
Luxshare assembles iPhones, AirPods and is the exclusive manufacturer of the Vision Pro. The Apple business is lucrative, generating around 70% of the company’s income, and Luxshare is also reported to have been signed up to make OpenAI’s hardware devices.
To some extent, it doesn’t matter whether the attack took place or not, because the story underlines one of the biggest weaknesses every company and every person faces in the digital world: you, your data and your business partner’s data are only ever as secure as your least secure partner.
That’s a fact that needs to be mulled over, particularly as a deeply unstable political environment means the profile of those carrying out these attacks is also changing. Attacks are sophisticated, follow complex attack vectors, can be financed by nation states, and can comprise multiple stages. “The total number of data breaches more than tripled between 2013 and 2022,” Apple said a couple of years ago.
An attack against a single employee can be part of a multi-pronged assault on the protections of your key business partners.
Digital war zone
Charl van der Walt, head of security research for Orange Cyberdefense, warns: “We exist within a dense web of interdependence where a single weakness can enable mass compromise. Small businesses and critical services have become prime conduits to amplify economic and social consequences.”
This isn’t the first time a partner in the Apple — or any — space has been attacked. Apple partner Quanta was hit by ransomware in 2021. In recent years, we’ve seen a scourge of mercenary spyware. Just today, Jamf Threat Labs published a report exploring a DPRK-linked campaign that uses malicious GitHub repositories to deliver macOS malware through Visual Studio Code.
(Jamf claims to have uncovered a JavaScript-based backdoor that provides remote code execution, persistent communication with command-and-control infrastructure and system fingerprinting on macOS systems.)
The data shows us that the security environment is increasingly difficult.
Supply chains are under attack
The latest edition of Orange Cyberdefense’s annual Security Navigator report confirms the number of cyber extortion attacks has trebled since 2020, with parts of the supply chain — such as Luxshare — a particular target for such attacks. The group behind this attack is known to be one of the most active ransomware gangs around and primarily targets industrial manufacturing and healthcare. A CISA advisory tells us the group successfully breached around 210 targets in 2024 alone.
To protect themselves, enterprises must implement multi-layered, defense-in-depth protections, harden their endpoints, and use integrated management and security tools to ensure visibility across all potential attack vectors.
More than the OS
Part of this involves the operating system, of course, and Apple has always managed to provide that. (We don’t know whether the Luxshare systems that were attacked involved Macs, but I’m willing to bet they were not.)
At a system level, Apple continues to invest in security across its systems, with tools like Lockdown Mode, Threat notifications, XProtect, Gatekeeper, and regular system patches helping keep its ecosystem secure. But the claimed attack against a key Apple business partner illustrates that relying solely on operating system safety isn’t enough; it’s vitally important that any company put protections in place.
Too many enterprises don’t do this. For example, just two years ago we learned that firewalls are disabled on 55% of Macs being used in businesses, while one in 20 devices has vulnerable applications installed. Apple’s recent decision to begin to push out essential security updates to users could not be better timed.
If it can happen at Luxshare…
As for the unfortunate incident at Luxshare, while it is too early to read too much into it, I think it likely that a combination of human error, and at least one unpatched vulnerability, potentially at a partner company, enabled the exploit to occur. If it can happen to a large and powerful company like Luxshare, it can certainly happen elsewhere; you must take precautions.
You can follow me on social media! Join me on BlueSky, LinkedIn, and Mastodon.
Source:: Computer World
By Tom Bedford One of CES 2026’s big robotics releases is a new robotic control suit from Daimon Robotics.
The post Daimon Robotics’ new data acquisition system brings haptic intelligence to robot teleoperation appeared first on Digital Trends.
Source:: Digital Trends
By Pranob Mehrotra Samsung could soon introduce updates for the Galaxy Ring’s connectivity notifications to offer users more relevant information.
The post Samsung might soon call you out if you leave your Galaxy Ring disconnected for too long appeared first on Digital Trends.
Source:: Digital Trends
By Ana-Maria Stanciuc Belgian business software company Odoo, also a unicorn, has reached a fresh milestone. Growth investor General Atlantic has increased its stake in the firm, buying additional shares from regional backer Wallonie Entreprendre and pushing Odoo’s valuation to roughly €7 billion. This move isn’t a typical funding round where a company raises new capital. Instead, it’s a secondary transaction: General Atlantic bought existing shares that were previously held by Wallonie Entreprendre, the investment arm of Belgium’s Walloon region. After the deal, Wallonie Entreprendre still holds about 3 % of the company. Odoo was founded in 2002 in Belgium and has grown steadily…This story continues at The Next Web
Source:: The Next Web
By Deepti Pathak Infinix has officially launched the Note Edge, a new smartphone designed to offer a premium look…
The post Infinix Launches Note Edge With MediaTek Dimensity 7100 & 6,500mAh Battery appeared first on Fossbytes.
Source:: Fossbytes
Google’s Mandiant security division has come up with an unusual tactic to persuade organizations to stop using the aged and hugely insecure NTLMv1 authentication protocol: publish a data lookup that makes cracking NTLMv1 credentials trivial for attackers.
The intention, Mandiant explained, is to draw attention to the fact that, despite decades of evidence that NTLMv1 (NT LAN Manager version 1) is insecure, organizations continue to use it. Anyone can use Mandiant’s Net-NTLMv1 pre-computed rainbow table lookup, downloadable from the Google Cloud Research Dataset portal, to map a given server response to reconstruct a real NT hash.
Hashes, of course, are mathematical representations of real passwords, but are just as useful to criminals when exploited using techniques such as pass-the-hash. The benefit is time and money saved: Mandiant reckons its rainbow table allows the recovery of an NTLMv1 key in 12 hours using a computer costing $600, rather than relying on third party services or expensive hardware to brute-force the keys.
None of this makes NTLMv1 less secure or easier to target than it already is. Mandiant’s hope is that the release of the table will serve as a reminder that the problem exists, prompting organizations to finally rip out NTLMv1 from their networks.
“This legacy protocol leaves organizations vulnerable to trivial credential theft, yet it remains prevalent due to inertia and a lack of demonstrated immediate risk,” the company said in its announcement. “By releasing these tables, Mandiant aims to lower the barrier for security professionals to demonstrate the insecurity of Net-NTLMv1.”
Long fallback
NTLMv1 is a 1990s challenge-response protocol used to authenticate Windows NT users to Active Directory (AD). Based on 1980’s Data Encryption Standard (DES) encryption, it was updated to the more secure NTLMv2 in 1996 before being completely replaced by Kerberos. Unfortunately, legacy protocols like NTLMv1 don’t just disappear, and are retained as a fallback in case they are needed by older applications. That fallback has turned out to last decades.
What evidence does Mandiant have that organizations are still using NTLMv1? The first is anecdotal: “Mandiant consultants continue to identify its use in active environments,” the company noted in last week’s announcement.
Secondly, cyberattackers regularly target it. For example, a 2024 campaign by the TA577 threat group targeted NTLM hashes by using booby-trapped emails to send challenge-response authentication requests to internal SMB resources such as legacy printers.
A more recent incident involved an authentication relay attack aimed at a specific NTLM vulnerability, CVE-2025-54918, which came only weeks after Microsoft announced that it was finally removing NTLMv1 support from Windows Server 2025 and Windows 11.
Primary hurdle: Knowing it’s still there
According to Rob Finn, International vice president at supply chain security company Chainguard, even security-aware organizations could be caught out by NTLMv1.
“Legacy protocols like NTLMv1 are buried deep within third-party firmware. A security team might deprecate NTLMv1 at the OS level, only to have a legacy printer driver or industrial sensor reintroduce it via an unpatched, decades-old library,” he said. “For most companies, the primary hurdle isn’t just knowing NTLMv1 is insecure, it’s knowing that it’s still there.”
Because resources such as printers are not externally exposed, it is tempting to assume they are beyond the reach of attackers. Despite this, NTLMv1 can still be targeted from outside the network using relay or coercion techniques, by, for example, triggering authentication via a phishing attack.
“Attackers don’t need to know you’re using it. They just have to poke the system to find out. Fundamentally, organizations keep legacy protocols active not because they want to, but because they fear breaking a mission-critical legacy app,” said Finn.
Despite Microsoft recommending that organizations upgrade to NTLMv2 and Kerberos for more than two decades, it appears not everyone got the memo. “In crypto terms, NTLMv1 isn’t just old, it’s archaeological,” said Rob Anderson, head of reactive consulting services at Reliance Cyber. “NTLMv1 is still enabled, not because it is needed today, but because it was needed once, and nobody is quite brave enough to turn it off and see what breaks.”
Despite those fears, organizations need to take action. “Scan for its use, find out why it is in use, register it as a high risk and get to work removing it, with achievable deadlines,” he advised.
This article originally appeared on CSOonline.
Source:: Computer World
Meta’s major investment in Metaverse has not been a great success, and recently more than 1,000 people working on the project were laid off.
The latest news is that the social VR platform Horizon Workrooms will be shut down on February 16, according to a support document on Meta’s website.
At the same time, sales of the Meta Quest VR headset and associated software for business users will cease, reports The Verge.
Going forward, the focus for Metaverse will be on mobile phones and smart glasses, which is a big step away from the original vision.
Source:: Computer World
By Ana-Maria Stanciuc Venture capital powerhouse Sequoia Capital is preparing to invest in Anthropic, the AI startup best known for its Claude family of large language models, in one of the largest private funding rounds in tech this year. The deal is being led by Singapore’s GIC and U.S. investor Coatue, each contributing roughly $1.5 billion, as part of a planned raise of $25 billion or more at a staggering $350 billion valuation. This move stands out for two reasons: the size and speed of the valuation surge and the fact that Sequoia, already an investor in rival AI builders such as OpenAI…This story continues at The Next Web
Source:: The Next Web
By Ana-Maria Stanciuc When the European Commission announced on 15th of January a €307.3 million funding call for AI and related tech under Horizon Europe earlier this year, the press materials presented it as a strategic push toward trustworthy AI and European digital autonomy. The funding targets trustworthy AI, data services, robotics, quantum, photonics, and what Brussels calls “open strategic autonomy.” Viewed in isolation, the number itself isn’t eye-popping. By global standards, where the private sector alone pours hundreds of billions into AI, €307 million is barely a rounding error. Yet this sum matters less for its scale and more for what it…This story continues at The Next Web
Source:: The Next Web
By Deepti Pathak KRAFTON India has released the BGMI 4.2 update, which brings a fantasy-themed battleground and competitive elements….
The post BGMI 4.2 Update Introduces a Fantasy World and New Competitive Changes appeared first on Fossbytes.
Source:: Fossbytes
By Alexandru Stan Legislation and digital policy European Commission opens call for evidence on Open Digital Ecosystems Signal: The EU is preparing a structural shift toward open, interoperable digital infrastructure. This marks a move from regulating dominant platforms to actively shaping alternatives and reducing strategic dependency. DMA and DSA enter an enforcement-heavy phase in 2026 Signal: Europe’s digital laws have moved from principle to execution. Compliance, fines, litigation, and operational constraints are now the central risk factors for large technology companies in the EU. Intellectual property and market structure EUIPO reports record trademark and design filings in 2025 Signal: European technology and business…This story continues at The Next Web
Source:: The Next Web
By Shikhar Mehrotra ChatGPT Go is OpenAI’s new budget subscription tier, delivering expanded usage limits, access to GPT-5.2, and enhanced memory, bridging the gap between free and premium plans.
The post ChatGPT Go is now available in the U.S., but be prepared to see ads appeared first on Digital Trends.
Source:: Digital Trends
By Ana-Maria Stanciuc OpenAI’s decision to introduce advertisements inside ChatGPT for free users and its new $8 “Go” tier is already shaping up to be one of the most consequential pivots in generative AI’s short history. It’s not a simple business tweak. It’s a reframing of where digital intent, attention, and commercial influence intersect in an age where conversations increasingly replace search bars. OpenAI has not yet started showing ads in ChatGPT, but it plans to begin testing ads in the coming weeks. The first tests will target adult users in the United States on the Free tier and the new $8 ChatGPT…This story continues at The Next Web
Source:: The Next Web
By Ana-Maria Stanciuc Italian startup BizzyNow has launched an equity crowdfunding round on Mamacrowd to finance the next phase of its networking app, built around quick, in-person meetups it calls “Bizzy Moments.” The campaign targets €150k–€400k at a €3m pre-money valuation, with a €500 minimum ticket. BizzyNow says proceeds will support go-to-market validation, product upgrades, and the operational groundwork needed to scale. The problem BizzyNow solves Professional networking has a timing problem. The most valuable introductions often happen in the gaps: 40 minutes before a flight, a pause between conference sessions, an unscheduled evening in a new city, or the lull after a…This story continues at The Next Web
Source:: The Next Web
The first Patch Tuesday release of the new year addresses 112 CVEs across Microsoft’s product portfolio, including eight rated critical and three zero-day vulnerabilities. One of the zero-days (CVE-2026-20805), an information disclosure flaw in the Desktop Window Manager, is already under active exploitation. That prompted CISA to add it to the Known Exploited Vulnerabilities catalog with a remediation deadline of Feb. 3, 2026.
Enterprise teams should prioritize Windows and Office updates this cycle (both have Patch Now recommendations), particularly since the Preview Pane attack vectors allow code execution without fully opening malicious documents. To help navigate the latest changes, the team from Readiness has provided this useful infographic detailing the risks of deploying updates to each platform. (More information about recent Patch Tuesday releases is available here.)
Known issues
Microsoft published several known issues this month. Focusing on actionable issues affecting later versions (non-ESU), the following deserve attention:
After installing KB5074109, KB5073455, or KB5073724, users connecting to Azure Virtual Desktop or Windows 365 Cloud PCs via the Windows App could experience authentication errors and credential prompt failures. Microsoft is preparing an out-of-band fix. In the meantime, enterprise teams should direct affected users to connect via the Remote Desktop client for Windows (MSRDC) or the Windows App Web Client.
A small number of users might notice that the password icon on the Windows login screen is not visible. This has been an ongoing issue since the August 2025 update. Microsoft published a Known Issue Rollback (KIR) to address Pro and Home users. Enterprise deployments should use an updated Group Policy to restore the icon.
This update intentionally removes legacy Agere and Motorola soft modem drivers (agrsm64.sys, agrsm.sys, smserl64.sys, smserial.sys) to address CVE-2023-31096, an elevation of privilege vulnerability. Notably, the mere presence of these drivers — even without a modem connected — rendered systems vulnerable. Hardware dependent on these drivers will no longer function after applying the January updates.
As we noted in December, the 2011 certificates currently used by most Windows devices will begin expiring in June, with a second batch expiring this coming October. Devices that do not receive the updated 2023 certificates could fail to boot securely or stop receiving future Secure Boot security fixes.
Resolved issues
This is a new section to our monthly rundown. Depending on future Microsoft updates, this section may evolve or get integrated in platform specific sections. The January release resolves several issues that had been affecting enterprise environments:
An issue where applications such as Outlook, Teams, Edge, Chrome, and Excel would close unexpectedly when entering text has been fixed in KB5073455 for Windows 11 23H2 users.
The NPU battery drain issue affecting AI PCs — where Neural Processing Units remained powered during system idle — has been resolved in KB5074109.
WSL networking failures causing “No route to host” errors over VPN connections have been addressed in KB5074109.
RemoteApp connection failures in Azure Virtual Desktop environments have been fixed in KB5074109.
Major revisions and mitigations
Microsoft has (so far) published one revision and an Office platform mitigation for this release:
CVE-2023-31096: Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability. This revision addresses a vulnerability originally documented by MITRE in 2023 that remained unpatched for nearly three years. Rather than issuing a security fix, Microsoft has removed the vulnerable drivers entirely (agrsm64.sys, agrsm.sys, smserl64.sys, smserial.sys). These drivers shipped natively with Windows, meaning systems were vulnerable even without modem hardware connected. After applying the January cumulative updates, any soft modem hardware dependent on these drivers will no longer function. Administrators should audit their managed devices for legacy modem dependencies before deployment.
CVE-2026-20952, CVE-2026-20953, CVE-2026-20944: Microsoft Office Remote Code Execution Vulnerabilities. These critical vulnerabilities (CVSS 8.4) can be exploited via the Preview Pane in Outlook and File Explorer, allowing code execution without users fully opening malicious documents. According to the Zero Day Initiative, organizations that cannot immediately deploy Office updates should disable the Preview Pane as a temporary mitigation.
Windows lifecycle and enforcement updates
Microsoft Teams administrators should note that messaging safety defaults rolled out on Jan. 12. Organizations using default configurations now have three protections automatically enabled: weaponizable file type blocking, malicious URL scanning, and user reporting for false positives.
The Secure Boot enforcement phase remains scheduled for “not before January 2026,” with Microsoft committing to at least six months’ advance notice. When enforcement begins, the Windows Production PCA 2011 certificate will be automatically revoked and added to the Secure Boot UEFI Forbidden (DBX) List on capable devices. This enforcement (as we noted in December) will be programmatic with no option to disable.
Looking ahead, several Windows lifecycle milestones are approaching this year. Windows Server 2012 and 2012 R2 reach the end of their third and final Extended Security Update year on July 14. Windows 10 LTSB 2016 also loses support on that date.
Each month, the team at Readiness analyzes the latest Patch Tuesday updates and provides detailed, actionable testing guidance. This month’s release includes a high-risk update to the Desktop Window Manager, alongside security hardening for network file sharing and deployment services. Organizations should prioritize visual and personalization testing given the DWM changes.
Graphics and display
The Desktop Window Manager updates this month were marked as high risk by Microsoft and affect how Windows renders visual elements. Apply theme changes and verify accent colors render correctly on window borders, including:
Test taskbar color customization and transparency settings.
Validate DirectComposition-based applications render without artifacts.
Switch between light and dark modes and confirm UI consistency.
Test multi-monitor configurations with different DPI scaling.
Network File Sharing
SMB (Server Message Block) components received security updates affecting both modern and legacy protocols; testing should include:
Accessing SMB shares configured with mandatory signing and verified connectivity.
Testing encrypted SMB connections between clients and servers.
Validating SMB share access across domain trust boundaries.
And, if SMBv1 is still required in your environment, testing legacy share access with signing enabled.
Windows Deployment Services
Security hardening changes affect unattended OS deployment scenarios. New registry controls modify default behavior. Testing should include:
Performing network-based OS deployments using existing unattended configurations.
Verifying that hands-free deployment workflows complete successfully.
Reviewing event logs for new security-related warnings during deployment.
Testing deployment scenarios with various security configurations.
Window management
Core window management components received updates affecting application behavior; the following need testing:
Minimize, maximize, and restore applications to verify correct behavior.
Move and resize windows, confirming smooth transitions.
Close applications and reopen to verify window position persistence.
Test window operations in Remote Desktop sessions.
Office applications
Security updates address vulnerabilities in Excel, Word, and SharePoint Server components.
Test Scenarios:
Open and edit complex Excel workbooks with formulas and macros.
Test Word document formatting and embedded object handling.
Validate SharePoint document library operations and co-authoring.
Verify Office add-ins continue to function after patching.
The Readiness team suggests you focus testing efforts on the Desktop Window Manager changes first. Secondary priority should be given to SMB testing if your environment relies heavily on network file shares with signing or encryption requirements. SQL Server 2022 and 2025 also received GDR updates. If you manage SQL Server environments, follow your standard patching and validation procedures for these cumulative updates.
Each month, we break down the update cycle into product families (as defined by Microsoft) with the following basic groupings:
Browsers (Microsoft IE and Edge)
Microsoft Windows (both desktop and server)
Microsoft Office
Microsoft Exchange and SQL Server
Microsoft Developer Tools (Visual Studio and .NET)
Adobe (if you get this far)
Browsers
Microsoft Edge version 143.0.3650.139, released Jan. 9, incorporates critical upstream Chromium security fixes. The most significant is CVE-2026-0628, a high-severity vulnerability involving insufficient policy enforcement in the WebView tag. This flaw could allow a malicious extension to bypass security controls and inject scripts into privileged pages. Add these browser changes to your standard release calendar.
Microsoft Windows
Microsoft released patches for 95 Windows-specific vulnerabilities this month, including three rated critical by Microsoft. The bulk of fixes address elevation-of-privilege flaws, which account for roughly half of this month’s patches. Key affected components include:
CVE-2026-20840 and CVE-2026-20922: Windows NTFS heap-based buffer overflow RCE vulnerabilities
CVE-2026-20820: Windows Common Log File System (CLFS) Driver EoP
CVE-2026-20817: Windows Error Reporting Service EoP
CVE-2026-20816: Windows Installer EoP
CVE-2026-20843: Windows Routing and Remote Access Service (RRAS) EoP
CVE-2026-20860: Windows Ancillary Function Driver for WinSock EoP
CVE-2026-20871: Desktop Window Manager EoP
The three critical-rated vulnerabilities are CVE-2026-20822, a use-after-free in the Windows Graphics Component (CVSS 7.8); CVE-2026-20876, a heap-based buffer overflow in Windows Virtualization-Based Security (VBS) Enclave (CVSS 6.7); and CVE-2026-20854, a remote code execution vulnerability in Microsoft’s LSASS security authority (CVSS 7.5).
This month’s actively exploited zero-day is CVE-2026-20805, an information disclosure vulnerability in Desktop Window Manager. Despite its relatively modest CVSS score of 5.5, Microsoft and CISA confirm active exploitation in the wild with a remediation deadline of Feb 3, 2026. Add these Windows updates to your “Patch Now” schedule.
Microsoft Office
Microsoft addressed 16 vulnerabilities in Office products ], including five rated critical. The most urgent patches address remote code execution flaws exploitable via the Preview Pane in Outlook and (unfortunately) File Explorer. CVE-2026-20952 and CVE-2026-20953 are use-after-free vulnerabilities in Office that allow code execution without users fully opening malicious documents; simply previewing the file is sufficient. Organizations unable to deploy updates immediately should consider disabling the Preview Pane temporarily.
Word gets a critical patch for CVE-2026-20944, an out-of-bounds read vulnerability that could allow remote code execution when processing specially crafted documents. And for Excel this month, Microsoft addresses two critical (CVE-2026-20955 and CVE-2026-20957) and four important vulnerabilities. The remaining Excel patches address use-after-free, out-of-bounds read, and pointer dereference issues, plus a security feature bypass (CVE-2026-20949) that could allow attackers to circumvent Excel’s built-in protections.
SharePoint Server administrators should note five vulnerabilities, including two remote code execution flaws via SQL injection (CVE-2026-20947) and deserialization (CVE-2026-20963). These require authenticated access but merit attention in multi-tenant environments. Add these updates to your “Patch Now” schedule.
Microsoft Exchange and SQL Server
There were no updates for Exchange Server this month. SQL Server received a single patch: CVE-2026-20803, which addresses an elevation-of-privilege vulnerability (CVSS 7.2) caused by missing authentication for a critical function. The flaw affects SQL Server 2022 and 2025, allowing an authenticated attacker to elevate privileges over the network. Updates are available via both GDR and CU channels. Add this SQL Server update to your standard server release calendar.
Developer tools
The sole desktop-relevant fix is CVE-2026-21219, a remote code execution vulnerability in the Windows SDK’s Inbox COM Objects (Global Memory). This use-after-free flaw allows an attacker to execute code locally, earning a CVSS score of 7.0. Developers using the Windows SDK should update via the official SDK downloads page. Add this to your standard developer release schedule.
Adobe (and third-party updates)
There were no Adobe updates this month — and no third-party updates either. Since we added the Resolved Issues section this month, I’m hoping we can retire this section. Let’s see what happens in February.
Source:: Computer World
By Gareth Beavis Shoe maker Syntilay has unveiled its new PulsePodz shoes, which it claims couldn’t have been made without 3D printing and AI. These recovery slides feature nine individual pods on the base, designed with a lattice structure and different densities that create a cushion to target support where the foot needs it most. Syntilay says this […] The post I tried these shoes that can only exist thanks to 3D printing appeared first on Digital Trends.
Source:: Digital Trends
By Pranob Mehrotra Google is working on a new Pixel Watch feature that will send users an alert when they leave their phone behind.
The post This handy Apple Watch feature may soon make it to your Pixel Watch appeared first on Digital Trends.
Source:: Digital Trends
By Pranob Mehrotra Researchers have uncovered a Fast Pair security flaw that can be exploited to track your location through Bluetooth speakers or headphones.
The post Your Google Fast Pair headphones need an update to fix a flaw that could expose your location appeared first on Digital Trends.
Source:: Digital Trends
By Adarsh Verma Most gamers obsess over raw aim and lineup nerd spots while totally sleeping on the free…
The post Valorant Passive Abilities Pros Abuse in High-Elo Matches appeared first on Fossbytes.
Source:: Fossbytes
By Hisan Kidwai Republic Day is almost upon us, and so is the Republic Day sale on Flipkart. This…
The post Asus Republic Day Sale: ExpertBook Series Gets Up To ₹16,000 Discount appeared first on Fossbytes.
Source:: Fossbytes
Click Here to View the Upcoming Event Calendar