Social Engineering as a Hacking Tool
You may have heard by now that LastPass suffered a pretty big breach, although thankfully [...]
Microsoft ‘Buddy Programs’
Outlook vs. Exchange Microsoft Exchange handles your emails. Rather, it handles them behind-the-scenes: you generally [...]
Games Suffering For Patches
I Can Finish it Later Kangaroos are famous for keeping their children, known as joeys, [...]
Pokemon Complexity Syndrome
Video games are more complex, and at the same time the developers expect to have [...]
Stop Putting Stuff into AI Apps, Especially If It Wasn’t Yours In The First Place
Lensa AI is an app that uses AI combined with data scraped from pictures posted [...]
What’s Up With Those Specific T-Shirts?
You’ve probably seen some variation of the shirt. You’re wondering how it’s so wildly specific. [...]
What is RFID?
Definitions RFID stands for Radio Frequency Identification, and it’s usually used in the context of [...]
Sony: DRM Overkill
In 2005, an organization had been covertly installing a program similar to a rootkit onto [...]
Public Risks to Your Machine
1) Public Wifi If you’ve been online in the past few years, you’ve likely seen [...]
Pre-Ordering: Mostly Disappointment
You’ve likely seen it hit the news: a game available for pre-order has disappointed it’s [...]