• Quotes
  • Shortcuts
The Executive's Internet
Mon, Apr 13th
icon
GoogleAmazonWikipedia


spacerspacer

 

 TECHNOLOGY NEWS
Setup News Ticker
   TECHNOLOGY NEWS
Searching for 'Here There'. (Return)

CNET NewsApr 11, 2026
Apple TV: 26 of the Best Shows You're Probably Not Watching
There's TV, and then there's Apple TV.

EngadgetApr 11, 2026
Rockstar Games has confirmed it was hit by third-party data breach
An experienced hacking group has claimed to have infiltrated Rockstar Games' cloud servers, while the game publisher has confirmed that there was a "third-party data breach." ShinyHunters, a hacker group that's been linked to data breaches targeting Microsoft, Google, Ticketmaster and others, posted a message on its website with a final warning to Rockstar to "pay or leak." The hack was first spotted by Hackread and the Cybersec Guru.

ShinyHunters didn't detail what Rockstar data it gained access to, only adding that the company had until April 14 to reach out or that the group would leak the compromised info that would lead to "several annoying (digital) problems." Rockstar Games confirmed the breach to Kotaku, explaining that "a limited amount of non-material company information was accessed in connection with a third-party data breach," and that the incident had "no impact on our organization or our players."

Previously


Mac RumorsApr 10, 2026
MacRumors Giveaway: Win an iPhone 17 and Astropad Fresh Coat Anti-Reflective Screen Protector
For this week's giveaway, we've teamed up with Astropad to offer MacRumors readers a chance to win one of Apple's iPhone 17 models and a Fresh Coat anti-reflective screen protector from Astropad to use with it.


PC World Latest NewsOct 10, 2025
New malware waits until you watch porn, then secretly films via webcam

But now there's a real threat. A new malware called Stealerium apparently knows when you're viewing pornographic material in your browser and automatically takes snapshots of what you're viewing and webcam photos of you in that moment. The malware then sends those recordings to cybercriminals who use them for blackmail.

Security researchers at Proofpoint have analyzed the malware and warn of a new escalation level in these so-called "sextortion attacks."

How Stealerium gets onto your PC The Stealerium malware is spread via phishing emails that look deceptively genuine. The attackers disguise their emails as messages from reputable organizations (e.g., banks, streaming services, charities) and encourage recipients to open attachments or click on links.

These phishing emails take the usual scare tactics, generating a sense of urgency with subject lines "Payment Due," "Court Summons," and "Donation Invoice." When you open said emails, the hope is you're so alarmed that you've let down your guard, making it more likely that you'll download attachments and/or click malicious links and buttons.

What makes Stealerium even more worrying is that its source code has been freely available

  • CEOExpress
  • c/o CommunityScape | 200 Anderson Avenue
    Rochester, NY 14607
  • Contact
  • As an Amazon Associate
    CEOExpress earns from
    qualifying purchases.

©1999-2026 CEOExpress Company LLC