If we told you that a C preprocessor hack dated back to 1968, you’d be within your rights to remind us that C didn’t exist in 1968. However, assemblers with preprocessors did, and where there is a ...
Cellphone cameras are almost universal awful, but that shouldn’t stop you having some fun with them (and we don’t mean the kind of “fun” found on the Tokyo subway). This splendid hack takes the lens ...
A now-fixed exploit in the macOS version of Microsoft Office may have allowed attackers to hack a Mac user just by getting them to open a document. The exploit was developed by Jamf security engineer ...
Cyber-criminals spreading malware families are shifting to shortcut (LNK) files to deliver malware, HP Wolf Security’s latest report suggests. According to the new research, shortcuts are gradually ...
Microsoft's Security Intelligence team has warned that it has been tracking a "massive" phishing campaign that attempts to install a remote access tool onto PCs by tricking users into opening email ...
Our good friends at TUAW tipped us off to an interesting macro hack for the iPhone by Colin Devroe. Self-confessed über-geek and photo enthusiast, Devroe had an old digital camera that was lying ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results