blog

Is It True Macs Don’t Get Viruses? Short Answer: No!

Absolutely not. Here’s why! Apple devices are slightly harder to weasel into from outside, but [...]

Only Confidence

Theranos At this point, you’ve probably heard of Theranos, a company whose wondrous technology could [...]

Social Engineering as a Hacking Tool

You may have heard by now that LastPass suffered a pretty big breach, although thankfully [...]

Microsoft ‘Buddy Programs’

Outlook vs. Exchange Microsoft Exchange handles your emails. Rather, it handles them behind-the-scenes: you generally [...]

Games Suffering For Patches

I Can Finish it Later Kangaroos are famous for keeping their children, known as joeys, [...]

Pokemon Complexity Syndrome

Video games are more complex, and at the same time the developers expect to have [...]

Stop Putting Stuff into AI Apps, Especially If It Wasn’t Yours In The First Place

Lensa AI is an app that uses AI combined with data scraped from pictures posted [...]

What’s Up With Those Specific T-Shirts?

You’ve probably seen some variation of the shirt. You’re wondering how it’s so wildly specific. [...]

What is RFID?

Definitions RFID stands for Radio Frequency Identification, and it’s usually used in the context of [...]

Sony: DRM Overkill

In 2005, an organization had been covertly installing a program similar to a rootkit onto [...]