top-stories

Samsung Galaxy S7 leak

Meet Samsung’s new Galaxy S7 series. Photo: Evan Blass

Samsung has confirmed it will unveil the Galaxy S7 at an Unpacked event in Barcelona on February 21. The short video below teases “the next Galaxy,” which is expected to go on sale in the U.S. and Europe on March 11 with big internal improvements.

Surprise, surprise! Photo: Killian Bell/Cult of Android

Surprise, surprise! Photo: Killian Bell/Cult of Android

Four out of the five most popular gadgets on Facebook are Apple devices, according to the social network’s new Preferred Audience tool. Unsurprisingly, the iPhone tops the list with more than four times as much interest as fourth-placed Samsung Galaxy.

Galaxy S7 is just six weeks away. Photo: Killian Bell/Cult of Android

Galaxy S7 is just six weeks away. Photo: Killian Bell/Cult of Android

Samsung will launch the Galaxy S7 in Europe on March 11, according to yet another reliable source. The device is expected to bring Qualcomm’s latest Snapdragon 820 processor, a new camera with BRITECELL technology, and a pressure-sensitive display.

The One M10 could be the HTC smartphone you've been waiting for. Photo: HTC

The One M10 could be the HTC smartphone you’ve been waiting for. Photo: HTC

HTC’s next-generation One M10 will finally deliver the upgrades fans have been calling for, according to the latest reports. That includes a super-sharp Quad HD display, a fingerprint scanner, and an UltraPixel camera that doesn’t suck.

Google pays out cold cash to security researchers who hack its systems, then report the problems. Photo: tookapic/Pixabay CC

Google pays out cold cash to security researchers who hack its systems, then report the problems. Photo: tookapic/Pixabay CC

Google paid out more than $2 million in bounties to security researchers last year in an effort to keep its applications and services safe from hackers.

The payments came via the company’s Vulnerability Reward Program, which gives researchers a financial incentive to locate security holes in Google’s software, then report them to the company rather than exploit them.

Next Page »