Don’t Starve is a survival game, now available on Android

Just to be clear, this game called “Don’t Starve” doesn’t make any pretensions of having great graphics or leveraging on your phone’s technology. But we still think Android gamers will still love this. The game is purely about survival, and it’s totally addicting in a way that most of you haven’t seen in other survival games before.


Don’t Starve: Pocket Edition was developed by Klei Entertainment, and now launched on Android a year after it was introduced for iOS devices. You play the role of a German scientist named Wilson who is then transported to a strange and mysterious wilderness world where, of course, you have to survive – as the land features some weird creatures and dangers at every turn.

[embedded content]

The game will give you a full crafting system to help you survive, but you will have to take advantage of what is available in the environment. You also need to leverage what you can get from the inhabitants of the land so you can finally get home.


The game can be downloaded for USD$4.99. Don’t be discouraged by the pricing, it just goes to show you that there is quality in this game, enough that the developers think you should pay for it. Check the download link below.

DOWNLOAD: Google Play Store

Samsung said to be rushing things and decisions

We’re still not done with the Galaxy Note 7. Samsung still hasn’t discovered the cause of those “exploding” batteries but its executives vowed to find out. It’s been a crazy two months for Samsung who was initially excited about the Note skipping a number and then the new model being the most advanced ever.

We thought it’s another Note device that would become a bestseller and impress us in benchmarks and durability tests but unfortunately, even before we get to them, the South Korean tech giant announced a recall and launched a replacement program. That appeared like a smart move but apparently, the U.S. Consumer Product Safety Commission said they should make it “official” by going to them first. Samsung did partner with the commission already together with some other airlines and organisations.

Samsung has been very busy dealing with this problem but looks like many of its decisions are bringing more harm than good. The problem didn’t stop and more complaints were reported and so the company was then prompted to announce another recall.

The company is quick to announce its plans and decisions maybe that’s why it’s experiencing all these problems. There’s also a speculation that the executives actually know the reason. Why else would they do the recall if they are somehow confident about the quality of their products? Samsung phones catching fire isn’t unheard of but the South Korean tech giant did a recall quickly.

Samsung announcing a recall is not a problem. It’s not yet done exchanging the “unsafe” phones. Some people are still adamant to get a new phone or they’re too afraid of similar cases happening.

Samsung is believed to have early findings of investigations but is not disclosing them. All we know is that batteries were defective so they changed the supplier. The same thing happened to several Note 7 owners in different parts of the world though. Much has been said about the Galaxy Note 7 but we know the case will not be over yet.


Watch Google Pixel go through Durability and Drop Tests

Moving on from the new LG V20 Zac Nelson subjected to a durability test last week, here is the new Google Pixel smartphone being featured in two videos. The first one is another series of Scratch, Burn, and Bend tests by Nelson while the other one is a Drop test by TechRax. Both videos are published on Youtube.

We’ve heard some initial reviews, impressions, and quick analysis of the new Google Pixel phone but JerryRigEverything’s Durability Tests are something to look forward to. Most of them can be painful to watch but they are generally useful for the consumers about to make an important decision.

In the first video below, the Google Pixel is noted as a device resulting from the combination of some of the best features of other smartphones like the fingerprint scanner of the LG V20, back glass panel of the Galaxy S7, and angled edges of the HTC 10.


As with any scratch test, the Google Pixel scratches at level 6 on the Mohs Scale of Hardness using a special pick. This is again normal for most premium smartphones. The 8MP camera is covered by the glass display so it doesn’t scratch.

You will see no button at the bottom so there’s nothing to check. What’s interesting though is the earpiece which is actually just cloth. This is obviously less durable compared to plastic or metal speaker grill found on other mobile devices.

At the back panel, we see a glass back panel that seems to be softer so it is easier to scratch. There’s no primer or plastic layer on the blue aluminum cover–it really is aluminum and yes, really blue. It can scratch easily with keys but you can rub them off completely. Zac actually said the new Google Pixel can hold up better than the iPhone 7.

The fingerprint scanner is found at the back. It’s not protruding so there won’t be deep accidental scratches. It’s scratched by the tester but still works.

[embedded content]


It took eleven seconds before a part of the screen turned white. It’s not black but white and it’s actually permanent unlike the LG V20 that completely disappeared.


The Google Pixel is said to be one of the most durable phones this year. It’s impressive because pressing from the back of the phone, there’s no screen bulging out. Bending from the screen, there is zero flex.

[embedded content]


A series of Drop Tests was done by YouTuber TechRax by performing a 5-foot drop on the side and face. Unfortunately, the test didn’t last very long because a small crack appeared on the glass screen when dropped on the side. And finally when dropped face front, the screen was badly damaged. That shows the phone isn’t too ready for accidental drops especially from five feet.

If you plan on getting one, just watch out for the scratches at the back panel and that cloth earpiece. We’re guessing cloth was used to improve call quality but we have yet to test that one out so we’ll see. And oh, avoid dropping the phone from a height of five feet face front because you know what will happen.

VIA: JerryRigEverything, TechRax

Speed Test: Google Pixel XL versus Samsung Galaxy S7 edge

The Google Pixel XL, aside from its smaller sibling and the LG V20, is one of the latest premium flagships recently introduced in the market. Since the Note 7 is no longer a threat, the Google-branded phone is now being compared side-by-side with the S7 edge. The latter is the most recent flagship phone from Samsung before the Note 7 was launched.

This Speed Test done by SuperSaf TV is a detailed speed test between the Google Pixel XL and Samsung Galaxy S7 edge. This includes checking the fingerprint unlock, camera launch, browser, mobile apps, , gaming, and multitasking.

The Galaxy S7 edge used here is an Exynos version running Android 7.1 Nougat while the S7 edge is powered by Snapdragon 821 and Android 6.0 Marshmallow. Overall, the two smartphones are fast, showing very minimal difference. In some cases, the Pixel edged out the S7 edge but watching the video below, we can say the old Samsung device is slightly faster when it comes to loading apps.

The devices are neck-on-neck when launching the camera and opening basic to more intensive games. Opening a browser and YouTube is a bit faster on the Pixel phone. When it comes to opening games such as Angry Birds, Temple Run, Subway Surfers, and Dead Trigger 2–the Galaxy S7 edge is faster.

Looking at the benchmark tests, the two are higher in both single and multi core tests but the S7 edge still has the higher numbers. However, multi-tasking seems to be faster on the Pixel XL. We’re not sure if the speed is because of the RAM or the Qualcomm S821 or is it because the device is more recent.


'Root' Of More IoT-Based DDoS Attacks

Last Friday’s massive DDoS that exploited online cameras and DVRs was simple to pull off — and a new chapter in online attacks.

The distributed denial-of-service (DDoS) attack last Friday via an army of infected webcams, DVRs, and other systems, that crippled a large chunk of the Internet’s domain name system (DNS) served as a wake-up call after years of research and warning about vulnerable consumer and embedded devices.

It also led to a rare mea culpa by a consumer networked-device manufacturer: Hangzhou Xiongmai Technology Co Ltd, the Chinese maker of electronics for some of the surveillance cameras hijacked by the so-called Mirai botnet used in the attack against DNS provider Dyn, reportedly said it will recall some of its affected products. The firm plans to ratchet up authentication as well as patch devices manufactured prior to April 2015, according to a Reuters report.

Even so, a recall is far from the solution to cleaning up the botnet pollution, especially in the Internet of Things space, security experts say.

“The trouble with hardware that has been hijacked for Mirai is that the devices are ‘white label’ goods, produced by an unbranded manufacturer for third-party companies,” Sophos’ principal research scientist Chester Wisniewski said in a blog post today. “The Chinese company that made the hijacked devices, XiongMai, almost certainly has no way of knowing which companies have rebranded and sold its insecure cameras, and thus who the end users are. That makes it pretty much impossible to recall them.”

IoT devices—everything from home routers to webcams and smart fridges—are well-known easy security targets. Aside from the “white label” component issue, most of them come with default authentication and no security features. The bot-infected army of IoT devices pummeled Dyn and crippled major websites such as Okta, Pinterest, Reddit, and Twitter, last Friday and left websites either inaccessible or with slow-loading pages for some users.

But the attackers behind the DDoS, the origin of whom are still being investigated, did not have to do any sophisticated hacking to recruit their IoT devices. Finding vulnerable IoT devices wide open to the public Internet is easy.

Vikas Singla, co-founder and chief operating officer of stealth startup Securolytics, says his firm discovered that two basic factors contributed to the Mirai botnet’s formation. First off, they found that some IoT devices, including webcams, routers, and DVRs, literally broadcast their model numbers and software version information when you connect to them online. “IoT devices tell you what they are … servers don’t do that,” notes Singla.

Securolytics, which provides scans for healthcare and financial services industry of IoT vulnerabilities in their networks, also found that IoT devices used in the Mirai botnet use just one popular IoT default credential: “root.”

Mirai basically searches for telnet protocol availability, checks for default credentials, and when it finds a match, logs into those devices and uses them for DDoS’ing purposes. CCTV cameras are most often exploited by Mirai because many of these devices rely on default credentials. The botnet malware specifically controls the BusyBox software often found in IoT devices.

The Sept. 20 DDoS via Mirai on KrebsOnSecurity reached around 620 Gbps in size, which broke DDoS records in terms of power. The botnet malware’s author later dumped the Mirai source code online.

Meanwhile, Dyn has confirmed that the DDoS attack came in three waves last Friday, and used tens of millions of IP addresses across different locations. “We can confirm, with the help of analysis from Flashpoint and Akamai, that one source of the traffic for the attacks were devices infected by the Mirai botnet. We observed 10s of millions of discrete IP addresses associated with the Mirai botnet that were part of the attack,” Kyle York, Dyn’s chief strategy officer wrote in a post.

Dyn said the DDoS campaign began at around 7:10 am Eastern and concluded around 1:45 pm Eastern.

While all’s been quiet on the Mirai DDoS front since then, security experts say this was only the beginning for IoT-based botnet attacks.

“It’s going to continue to happen,” says Doug Morgan, chief data scientist at Securolytics.

Related Content:

Kelly Jackson Higgins is Executive Editor at She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise … View Full Bio

More Insights