Drone manufacturer DJI has announced a new product in their line-up - the 'Spark' drone, which has a palm-sized body and will retail from $499. Tech Crunch reports:

cmc_3522.jpg

Read more here.
Views: 27 / Likes: 0 / Replies: 1
In news that is unlikely to surprise anyone, the launch of Red Dead Redemption 2 has been postponed until Spring 2018. However, by way of apology, Rockstar has released some screenshots - and they are beautiful.

red_dead_redemption_2_delay_screenshot_10.jpg

Read more here.
Views: 52 / Likes: 0 / Replies: 1
According to the latest findings from two security firms, the majority of victims of the WannaCry attack were Windows 7 users. BBC News reports:


Read more here.
Views: 96 / Likes: 0 / Replies: 1
The WannaCry virus has infected an estimated 300,000 computers across the globe since 12th May, and affected users have their data held to ransom. Thankfully it seems that a French team have now found a way to unlock affected computers, just in the nick of time.


Read more here.
Views: 159 / Likes: 0 / Replies: 2
AMD has announced a new addition to it's consumer CPU line-up - a 16-core, 32 thread Ryzen beast that goes by the name of ‘Threadripper’. This is extreme high-end stuff, and will debut on a new motherboard platform. Even if you're not a high-end user, this is still important news - the current CPU war between AMD and Intel will likely result in better tech at a cheaper price for everyone.


Read more here.
Views: 168 / Likes: 0 / Replies: 0
Microsoft has put 280 backwards compatible Xbox One/Xbox 360 games on sale today - Games Radar has more:


Read more here.
Views: 151 / Likes: 0 / Replies: 0
According to a leak today, Intel may be preparing to launch a new line of high-end processors in June based on the Kaby Lake X and Skylake X architectures. Apple Insider has more:


Read more here.
Views: 224 / Likes: 0 / Replies: 0
It has been revealed that HP laptops may have been logging all user keystrokes since December 2015, according to security firm Modzero.


The logged keystrokes are not sent to an external source, but represent a potential security flaw which could be taken advantage of. Read more at Silicon
Views: 254 / Likes: 1 / Replies: 2