How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘iFixit’
Most Recent
Read More
November 25, 2015

You Don’t Really Own Your Hardware: The War on Electronics Repair

The ways that companies like Apple try to extract more cash from their customer base are many. The notion of planned obsolescence is defined by the Oxford dictionary like so:

A policy of producing consumer goods that rapidly become obsolete and so require replacing, achieved by frequent changes in design, termination of the supply of spare parts, and the use of nondurable materials.

The dictionary definition obviously doesn’t cover it all, but suffice it to say that releasing a new model every year with improvements only sufficient to make older models not capable of running updates is one good example. But getting customers to buy new hardware is not the only way [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University