Alleged Kidnapping Search Results

News: A US Release of Grab's 'Panic Button' Feature Could Mean Safer Rides

Ride-hailing services are everywhere nowadays and with new companies developing all the time, it is one of the most convenient ways for people to get around. Companies like Uber make it easy for passengers to call a car to pick them up and drive them to their desired location. These services have been especially helpful for commuters as well as those who might need a ride home after a night at the bar. However, ride-hailing services require driving with a total stranger, which means the safet...

News: Post-TIFF Micro-Blurbs

Every year the fine folks at Row Three do a post-TIFF mega-wrap up, collecting the micro-blurbs of a bunch of attendees into a giant meta-analysis of what everyone liked, loved, hated, etc. etc.. We'll link to that post when it goes up on the weekend, but in the mean time, here's my contribution:

News: Apple's Really Testing Our Patience with Rumored iPhone 8 Delay

At this point, I'm ready to give Apple CEO Tim Cook a piece of my mind. The hype surrounding the iPhone 8 is crazy, and rumors are circulating constantly. So many different things have been said about its release date that no one can even keep track anymore. If Cook could throw us all a bone and give us a hint, it would quiet the speculation. Unfortunately, it doesn't look like that'll happen anytime soon, but — in the meantime — a new report allegedly has the inside scoop. Recent rumors surr...

How To: Find Out If the FBI Is Keeping Tabs on Your Apple Device (UPDATED)

It's no secret that there's a lot of surveillance going on these days. It's easier than ever to end up in a database, and even former government agents are speaking out about the atrocious amount of spying being done against our own citizens. They've targeted our laptops, cars, IP addresses, and now they're coming for our iPhones. AntiSec hackers managed to get their hands on a list of over 12 million Apple UDIDs (Universal Device IDs) from an FBI computer, and they published 1,000,001 of the...

How To: Draw an anime Orochimaru from Naruto

This Naruto character is a very sinister and evil one: Orochimaru. At one point in time, he was considered a prodigy and was one of Konohagakure's Sannin. The Sannin is a group of three students of Hiruzen Sarutobi. The three members were a part of Team Sarutobi and they were Jiraiya, Tsunade, and Orochimaru. If you want to learn how to draw this dismal Orochimaru anime/manga character, it's really quite simple. DragoArt has this video tutorial on how to draw Orochimaru from Naruto. Get more ...

How To: The Good Samaritan's Guide to Returning Lost Smartphones

Sometimes, doing the right thing is way more difficult than it should be, like trying to return a lost smartphone. Despite having the best intentions, it's often hard to track down the rightful owner, especially if the device is armed with a passcode. On the other hand, there are plenty of people who see an unattended iPhone or Samsung Galaxy S3 as a chance for profit. In 2011 alone, the number of lost and stolen cell phones in America was worth over 30 billion dollars. That's right, billion....

News: Another Reason to Wash Your Sheets—Deadly Hospital Fungus Linked to Moldy Linens

Six people have died from fungal infections in Pittsburgh hospitals since 2014—that fact is indisputable. The rest of the situation is much vaguer. A lawsuit has been filed against the hospitals on behalf of some of the deceased patients, alleging that moldy hospital linens are to blame. While the lawyers argue over who's at fault, let's look at how this could have happened.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 8 (More Windows Registry Forensics)

Welcome back, my fledgling hackers! Let's continue to expand our knowledge of digital forensics, to provide you the skills necessary to be a digital forensic analyst or investigator, as well make you a better hacker overall. In your attempts to enter a system or network undetected, it is key to understand what a skilled forensic investigator can learn about you, the alleged hacker.