Monthly Archives: August 2015

You are browsing the site archives by month.

Stick 6,000mAh of Battery Power in Your Pocket For $10

Stick 6,000mAh of Battery Power in Your Pocket For $10

This 6,000mAh battery pack features a svelte design and a second USB port, which is a rarity at this size. Obviously, there are bigger battery packs out there, but this looks like a great option if you want something pocket sized. [Lumsing 6000mAh Ultra Slim Portable Power Bank, $10 with code EQVL973P]

Commerce Content is independent of Editorial and Advertising, and if you buy something through our posts, we may get a small share of the sale. Click here to learn more. We want your feedback.

Send deal submissions to Deals@Gawker and all other inquiries to Shane@Gawker.

The q-Jays earbuds are reborn, but are they worth $320?

When spending big on audiophile headphones, folks may look at over-ear models like Masters & Dynamic's MH40 or open cans from the likes of Ultrasone. But earbuds? I doubt those are topping many people's sonic bucket lists. With that in mind, it…

Ride Review: The 2015 Yamaha R1 Is Superhero Power Made Easy

Every once in a while, a motorcycle comes along that changes things. A bike that doesn’t need to have its worth justified or qualified – a bike that’s just plain good. The 2015 Yamaha R1 is one of those bikes.

Read more…

Malware infecting jailbroken iPhones stole 225,000 Apple account logins

A newly discovered malware family that preys on jailbroken iPhones has collected login credentials for more than 225,000 Apple accounts, making it one of the largest Apple account compromises to be caused by malware.

KeyRaider, as the malware family has been dubbed, is distributed through a third-party repository of Cydia, which markets itself as an alternative to Apple’s official App Store. Malicious code surreptitiously included with Cydia apps is creating problems for people in China and at least 17 other countries, including France, Russia, Japan, and the UK. Not only has it pilfered account data for 225,941 Apple accounts, it has also disabled some infected phones until users pay a ransom, and it has made unauthorized charges against some victims’ accounts.

Researchers with Palo Alto Networks worked with members of the Chinese iPhone community Weiphone after members found the unauthorized charges. In a blog post published Sunday, the Palo Alto Networks researchers wrote:

Read 2 remaining paragraphs | Comments

Think twice before jailbreaking your iPhone.

Think twice before jailbreaking your iPhone. A recent rash of malware has helped hackers steal over 250,000 Apple accounts, the largest theft of its kind. The malware only affects jailbroken devices, but if you get pwned, hackers can not only peek your password but also make App Store purchases without your permission. [Gizmodo]…

Back to School Guide 2015: Picks for the deep-pocketed

It's that dreaded time of year when lazy summer days with their open invitation to sandals, surf and shirtlessness begin to give way to the crispness of fall, hoodies and the back-to-school doldrums. Ah, but there's hope on the horizon: You can alway…

XKCD Cracks The Formula to Successful Car Model Names

XKCD is one of those things you can always count on to be out there, doing the hard research we all demand. And this time it’s especially useful, since XKCD seems to have used math and statistics and other black, black magic to determine what car names would be most successful. And boy, are they good.

Read more…

Moleskine Unveils New Notebooks Designed for Productivity and Organization

Moleskine Unveils New Notebooks Designed for Productivity and Organization

Moleskine’s notebooks are some of your favorites, and today the company is taking the wraps off of “Moleskine Pro,” a reboot of the original with some added features designed for productivity. The new notebooks feature detachable to-do lists, adhesive tabs for organization, numbered pages and a table of contents, and more.…

The new notebooks are part notebook and part planner, and have pages and sections designed to be used for things like meeting notes, brainstorming suggestions, meeting minutes and people in attendance, next actions, and so on. The new notebooks also have numbered pages, and a table of contents that can be filled out as the notebook is filled out, which makes it easy to flip through to find something you need without having to remember by feel how thick the notebook was when you wrote something down you want to find again.

Additionally, the Pro line included adhesive stick notes you can use as section tabs, just to keep everything neatly organized, extra large workbooks for larger projects, drawings and sketches, or anything that needs more space, and even a portfolio notebook with an accordion file, if that’s how you like to roll—with space to carry handouts or other documents. There’s even a notebook “tool belt” that you can attach to the cover of a notebook that—after much demand—can hold small accessories, pens, and other things.

Of course, if you prefer the empty freedom of the original Moleskine notebooks, they’re available too—but the new line is geared right for office workers and creative pros who need to take tons of notes, but also want to stay organized. The new notebooks, for what it’s worth, also fit nicely with the Bullet Journal productivity method. Hit the link below to check them out.…


What Safety Feature Have Car Engineers Not Thought Up Yet?

Though you’re probably (hopefully) not reminded of it all too often, the safety features in cars today are incredibly important and very often unappreciated. But are they so unappreciated that we don’t know what we’re missing?

Read more…

China and Russia cross-referencing OPM data, other hacks to out US spies

The identities of a group of American technical experts who have provided assistance to covert operations by the US government overseas have been compromised as the result of cross-referencing of data from the Office of Personnel Management (OPM) and other recent data breaches, according a Los Angeles Times report. The Times‘ Brian Bennet and W. J. Hennigan cited allegations from two US officials speaking under the condition of anonymity that Chinese and Russian intelligence agencies have worked with both private software companies and criminal hacking rings to obtain and analyze data.

William Evanina, the Office of the Director of National Intelligence’s National Counterintelligence Executive, confirmed in an interview with the LA Times that data from breaches had “absolutely” been used to unmask US covert agents. Performing data analytics on breach data could tell foreign intelligence agencies “who is an intelligence officer, who travels where, when, who’s got financial difficulties, who’s got medical issues” and help create a “common picture” of US intelligence operations, he said.

According to the report, the OPM hack and other major data breaches were being merged and analyzed by China in an effort to both ferret out US covert operations—to provide background information for targeted cyber-attacks—and to provide intelligence on individuals who could be targeted for blackmail. And Russia’s Federal Security Service (FSB) is also using recent data breaches and ties to cybercriminals to target US government employees for cyber-attacks, the unnamed officials claimed.

Read 3 remaining paragraphs | Comments