I'll be hacked for Christmas

Wednesday, 25 July 2007, 8:04 PM EST

As thousands of XBoxes, iPods, talking Monsters Inc. dolls and other tech gifts make their way under Christmas trees this season, a few dedicated hobbyists are tearing these products apart in hopes of making improvements that manufacturers either didn't think of or didn't deem cost-effective.

To help others who'd like to make the gift of technology a little more personal, these hackers are publishing their findings online alongside step-by-step instructions for duplicating their modifications.

At Wired.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //