A 5-year-old girl was injured after the battery in another Samsung phone exploded in China. The Samsung Note 4 was reportedly charging next to the sleeping girl when it blew up in her Guizhou-based home. The Guizhou Metropolitan Daily reports that the child's hands, face, and ...more
What companies do you think have a unique and compelling take on social media? Wendy's is certainly confident, to say the least. But Lufthansa Airlines is taking a different approach than most — and it seems to be working — as they give passengers a look behind the scenes thro ...more
This most recent school shooting, one of the worst in history, has devastated our country. That such an act can be performed not by a begrudged child, but by one or more adults, is nearly unthinkable. And yet the idea of school shootings is far from new. In fact, the Victori ...more
Data breaches are all too common now, and the latest one you need to know about involves Timehop, a mobile app that makes it easy to reminisce over old photos. The breach, which took place on July 4, was revealed on Sunday, July 8. At the time, Timehop disclosed that 21 millio ...more
They say that behind every joke is a half-truth. If that adage itself contains a grain of verity, the Daily Show's satirical Glass piece should raise a few eyebrows amongst the Glass Explorer community. As with everything Comedy Central's comedic news show produces, yesterday ...more
The User Dashboard in OnTime is a great way to look at items across types and edit them. See how to view and search through data regardless of its type (Defect, Feature, Task, Incident) by taking advantage of the User Dashboard. For detailed instructions on using the dashboard ...more
Well, we have had a pretty basic story structure in the previous couple of blogs. However, for the third act there is considerable leeway on how this story can play out. You can turn a story like this into a tragedy or comedy. Remember the line from the film Stranger Than Fict ...more
West LA Seido Karate-do embeds its personal protection program into its on-going classes. Private instruction in this aspect of Seido can also be arranged with Kyoshi on an individual basis. Personal protection, i.e. self-defense, at Seido uses a model of escalating stages of ...more
If you live in New York City and are itching to sell your Yeezys, you're at risk of falling victim to thieves. A devious duo is searching Facebook to find people selling the popular sneakers and then robbing them at gunpoint when they meet up in person. Don't Miss: How to Nav ...more
If you've been reading, watching or listening to the news, you sure know about the Trayvon Martin case. If you visit this site often, you may also have noticed that I've not put up any news on this case. I have my reasons. And this post will describe why. Before continuing, I ...more
If you happened to be watching Brazil vs. Portugal, you might have noticed something weird in keeper Julio Cesar's back after he and Meirelles collided. It was some kind of steel rod support for his injured back. According to FIFA article 4, it's illegal for players to wear an ...more
Holy hell have you believers just been PWND! Seriously, you have. Why, you say? Well haven't you heard the news? Of course not, I'm pretty sure you don't, since you believe in KONY 2012. Oh yeah. Let me hold on to the suspense for just a minute. In my earlier blog post, I des ...more
Step 1. Have the victims of the prank just engaging in a normal everyday activity such as going out to eat at a restraunt or whatever. Step 2. Stage a police situation in view of the prank victim but dont make it a spectacle. (traffic stop) whatever Step 3. When you arrive t ...more
Not long ago in Rome during a Master’s Tennis Tournament something remarkable happened. In a tightly contested game, American Andy Roddick challenged a linesman’s call on a ball hit by his opponent. The remarkable thing about this incident was that Roddick argued against his o ...more
Police in Los Angeles have killed a motorist who was fleeing after a police chase on U.S. 10 in the San Fernando Valley. Eight cops fired more than 90 rounds at 19-year old Abdul Arian as he fled police after they rammed his car. The teenager was unarmed. According to an LAPD ...more
Just in the nick of time. The TSA has come under a lot of scrutiny lately as outrage grows around the country over goons in gloves touching the junk of everybody from toddlers to grandmas. Then there was a suspicious if not improbable al-Qaeda underwear bomber threat to get th ...more
Despite endorsing Obama in 2008, JFK’s daughter Caroline now considers Obama a “liar,” according to a family source in Edward Klein’s new book on Obama called “The Amateur.” Caroline’s past support for Obama, which was mirrored by the late Sen. Ted Kennedy, caused a riff in th ...more
Afghan officials and witnesses say a U.S. service member walked off his base and shot and killed at least 16 Afghan civilians in Kandahar province Sunday. The shooting is the latest in a string of incidents to further strain Washington and Kabul’s already tense relationship. A ...more
Water Purification Device Prompts TSA to Close Down Minneapolis Airport In another stupendous incident of comical over-reaction, the TSA ordered the evacuation of two airport terminals in Minneapolis after a water purification device was found in a woman’s luggage. Obama Mul ...more
If all things go well, you'll only have to take your road test once. That's the goal: to ace your test on the first try and then start driving on your own. Granted, it's a nerve-racking experience, but keep in mind that the California Department of Motor Vehicles wants you to ...more
Airgeddon is a multi-Bash network auditor capable of Wi-Fi jamming. This capability lets you target and disconnect devices from a wireless network, all without joining it. It runs on Kali, and we'll cover installing, configuring, and using its jamming functionalities on a smal ...more
Unlike the suave 007 that Daniel Craig portrayed, I am not a spy, nor am I that charming, but I do occasionally enjoy taking a stealthy video. Maybe I'm a jerk, but I often catch people doing ridiculous things and just think, "Aren't you embarrassed?" Capturing these incident ...more
So the new iPhones have arrived. Like last year, Apple released three iPhones in three different sizes that vary in price and specs. There's the base model iPhone 11, and then there are the real deal, premium models, the iPhone 11 Pro and Pro Max. The iPhone 11 Pro and 11 Pro ...more
Apple has four iPhone models for the remaining months of 2020, but the most impressive ones are the iPhone 12 Pro and iPhone 12 Pro Max. While the iPhone 12 and iPhone 12 mini are great smartphones, the "Pro" models offer more advanced features, especially for photographers an ...more
The easiest way around a security policy is to find users who don't follow it. The Have I Been Pwned database identifies accounts with information breached by major third parties like Yahoo and LinkedIn. With Maltego, hackers can locate breached accounts created using company ...more
In October of 2017, Mathy Vanhoef released "Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2." This paper demonstrates a way to decrypt traffic on practically any WPA2 network, the most commonly used form of wireless security (seeing as all other forms of Wi-Fi encrypti ...more
In America, football has become religion. And that religion has blossomed into an unstoppable juggernaut, which has rocked the very foundations of both television and business. In an era where fragmentation has savaged traditional network television, the NFL's Nielsen ratings ...more
Let's say that the screen on your iPhone is showing signs of discoloration, which makes the display annoying to use. You'll need a replacement display or a new iPhone as soon as possible. If you have one of the newer iPhone models, the cost to fix it might be more than your wa ...more
If you don't want to be found on Twitter, there are several ways to do that without making your account private. For instance, you can choose an obscure username, omit your real name, or pick a random avatar. But there are lesser-known features deep in your settings that can a ...more
Surprising? No. Exciting? Absolutely. After a grand introduction by at the Apple event on September 10, 2019, the iPhone 11 is finally here. We may have known nearly everything about this new iOS device ahead of time, thanks to the usual surge of reliable leaks and rumors. Th ...more
You're walking down the street, minding your own business. Then you see it—a large, bright fireball in the near distance. A tremendous heat wave speeds towards you at one thousand miles an hour, and before you can think, before you can even blink, the extremely heated wind pus ...more
Traditional subdomain enumeration techniques create a lot of noise on the target server and may alert intrusion detection systems to an attacker's intentions. For a stealthier approach, there's a tool with the capability of finding hundreds of subdomains related to the target ...more
Cuphead may have taken the indie gaming scene by storm, but its "introduction" to the iOS App Store is what everyone in the smartphone world is talking about. There is no official Cuphead game available for iPhone, and that's what is so surprising — a fake version was approved ...more
It's easy to have your password stolen. Important people like executives, government workers, journalists, and activists face sophisticated phishing attacks to compromise their online accounts, often targeting Google account credentials. To reduce this risk, Google created the ...more
It turns out that coming up groundbreaking technology and raising billions may actually be the easy part for Magic Leap, as a new report has revealed yet another legal entanglement at the Florida-based company. In an article posted late on March 2, Business Insider claims to ...more
The iPhone doesn't stop at last year's excellent iPhone 12 lineup. Apple's been developing its iPhone 13 models for a while now, and there are a lot of rumors already with eight or nine months still to go until a release. This year, we're expecting four new models with similar ...more
When we got our first look at US Army soldiers testing Microsoft's modified HoloLens 2 last year, it still looked very much like the commercial edition, with some additional sensors attached. Today, the prototype Integrated Visual Augmentation System (IVAS), produced under an ...more
Legionnaires' disease is named after 1976 outbreak in Philadelphia that sickened 221 people and killed 34. More often striking adults over the age of 50, the Centers for Disease Control and Prevention (CDC) recently reported two cases where newborns contracted the often fatal ...more
Driving is anything but problem-free. Speed traps, accidents, and other hazards can appear at any time, requiring motorists to be attentive, quick, and prepared for anything. If you see something dangerous on your route that you want to warn others about, there's an easy way t ...more
Location services provider Mapbox is expanding the reach of its augmented reality development capabilities to include apps for automobiles as well as smartphone navigation. On Thursday, Mapbox announced a trio of new features for its Vision SDK, which will soon be available t ...more
It always looks different when it's not about you. The Internet is our world's Alterego. Those many bits don't really make sense unless we want them to be valuable, to mean something. Our rush to the future is too fast to keep up with. Denying technology is ignorance, isolat ...more
Do you love a good mystery? Were you a huge fan of "The X Files" or any other freaky movie or TV show? If you are daring and not afraid of the unexplained, Paranormal Investigator may be the job for you. Check out this video to see if you qualify and exactly how you can get in ...more
An outbreak of anthrax from contaminated meat in Tanzania sickened dozens of people and moves the danger of this deadly bacteria back into focus. Naturally occurring in animals and the soil, Bacillus anthracis is a rugged bacteria that has a protective outer shell, called a s ...more
In the aftermath of the unindicted police killings of Michael Brown and Eric Garner, we've been told that the system worked as intended. When our legal system's outcome is at conflict with what a majority of Americans believe is just, it's clear that some changes are needed. B ...more
I write this post as an afterthought on the recent mass burnings of the Quran by U.S troops. Let me lay down the facts first to clear any misunderstandings: After finding out that prisoners in Afghanistan were using the Quran to pass on information among each other - troops h ...more
This installment from Axosoft's own series of video tutorials on the OnTime Project Management Suite focuses on how you can see the history of your defects, features, tasks, and incidents, as well as project wiki pages. For more information, as well as to get started using the ...more
Charlie Miller and Chris Valasek conducted an experiment earlier this month that ended up with a Jeep in a ditch, although the driver didn't drive it there. The two remotely hijacked the car, controlling it through a laptop and a cell phone. FCA says vehicles from the 2013 and ...more
TV newscasters love to run stories about out of control parents fighting at youth sporting events. Here is an example of a story from a TV station in Arkansas last week: www.todaysthv.com/video/default.aspx?aid=66869 There are no shortage of video cameras at a youth sports ...more
Worklogs are the time sheets of OnTime. They help track the time your developers spend working on bugs and features, or the time that tech support staff work on incidents. There are several ways to interact with worklogs and this installment from Axosoft's own series of video ...more
Oh, Waze—you know, that Google-owned traffic navigation app that tempts drivers into stopping at local food joints like Dunkin' Donuts and Taco Bell? Well, now you can even order a large iced coffee through the app before you even arrive at a fast food hotspot. Starting today ...more
Image via Tiger Mom Says. Amy Chua didn't realize what she unleashed when the Wall Street Journal published a string of excerpts from her book, Battle Hymn of the Tiger Mother, and titled it "Why Chinese Mothers Are Superior". The article sparked a lot of interest and anger, ...more
In this Love Birds tutorial, the counselor, Roger Gil tells how to apologize to a woman. He says that we can apologize to women to reestablish some level of connection that has been damaged due to some incidents. He says that guys should not feel that apologizing is like surre ...more
PureChat 2008 ships with an OnTime plug-in that allows you to quickly turn live web chat conversations into defects, feature requests, incidents or tasks in OnTime -- with just a few mouse clicks! This installment from Axosoft's own series of video tutorials on the OnTime Pro ...more
So you’ve got your bottle of bubbly chilling and you’re ready to celebrate. But before you get the party started, you have to face that dreaded moment…Here’s how to pop the cork without any catastrophes (or injuries for that matter)!“It’s actually quite simple, “ says Charles ...more
Multiple airport screeners have been arrested for allegedly taking handsome bribes to look the other way while loads of illegal drugs slipped through security at Los Angeles International Airport, federal officials announced today. Two current and two former officials at the ...more
Residents of an Afghan village near where an American soldier is alleged to have killed 16 civilians are convinced that the slayings were in retaliation for a roadside bomb attack on U.S. forces in the same area a few days earlier. In accounts to The Associated Press and to A ...more
In case you haven't figured out already, our government is always on the move to figure out new ways to extend their control. The CISPA, for one, is one of the best examples, along with "re-education" programs, and racial divide (Trayvon). What I've noticed in the past few mon ...more