blog

Please don’t scan random QR codes

The Past and Present of Random Links Before the age of built in antivirus and [...]

Nomad Bridge Hack – Decentralized Currency Is Not Always Safer Than Plain Money

The Base Of Cryptocurrency Cryptocurrencies generally work off a blockchain which records its movements. This [...]

Can a PDF Attachment Really Compromise my Network?

Yes! Basic Email and Anti-Phishing Safety It’s a message that bears repeating – you shouldn’t [...]

Space Items We Won’t Get Back

Hubble Why launch a telescope into space when the ones on the Earth aren’t limited [...]

Tone Tags – the Result of Constant Bad-Faith Readings

The internet’s a tough, cynical place. You may have heard of Poe’s Law, which states [...]

Don’t Make Shared Email Accounts

A shared email box has plenty of utility, but it has to be set up [...]

The Panopticon Comes for Your Playlist

Artists can see what playlists you add their songs to on Spotify. That hasn’t really [...]

How IT-Secure is Your Business?

Take our quiz (via Google Forms) here: https://forms.gle/Yz36chVPMshp6bT57 And when you’re done, download or view [...]

Does Digital Content Have to Be Made Scarce?

NFTs The ever-unpopular NFT is a fantastic example of artificial scarcity, and how creating it [...]

“NPC Interactions” and the Death Of Social Cues

What is An NPC? NPCs, or non-playable characters, are side characters in video games. When [...]