blog

Social Engineering as a Hacking Tool

You may have heard by now that LastPass suffered a pretty big breach, although thankfully [...]

Microsoft ‘Buddy Programs’

Outlook vs. Exchange Microsoft Exchange handles your emails. Rather, it handles them behind-the-scenes: you generally [...]

Games Suffering For Patches

I Can Finish it Later Kangaroos are famous for keeping their children, known as joeys, [...]

Pokemon Complexity Syndrome

Video games are more complex, and at the same time the developers expect to have [...]

Stop Putting Stuff into AI Apps, Especially If It Wasn’t Yours In The First Place

Lensa AI is an app that uses AI combined with data scraped from pictures posted [...]

What’s Up With Those Specific T-Shirts?

You’ve probably seen some variation of the shirt. You’re wondering how it’s so wildly specific. [...]

What is RFID?

Definitions RFID stands for Radio Frequency Identification, and it’s usually used in the context of [...]

Sony: DRM Overkill

In 2005, an organization had been covertly installing a program similar to a rootkit onto [...]

Public Risks to Your Machine

1) Public Wifi If you’ve been online in the past few years, you’ve likely seen [...]

Pre-Ordering: Mostly Disappointment

You’ve likely seen it hit the news: a game available for pre-order has disappointed it’s [...]