Please don’t scan random QR codes
The Past and Present of Random Links Before the age of built in antivirus and [...]
Nomad Bridge Hack – Decentralized Currency Is Not Always Safer Than Plain Money
The Base Of Cryptocurrency Cryptocurrencies generally work off a blockchain which records its movements. This [...]
Can a PDF Attachment Really Compromise my Network?
Yes! Basic Email and Anti-Phishing Safety It’s a message that bears repeating – you shouldn’t [...]
Space Items We Won’t Get Back
Hubble Why launch a telescope into space when the ones on the Earth aren’t limited [...]
Tone Tags – the Result of Constant Bad-Faith Readings
The internet’s a tough, cynical place. You may have heard of Poe’s Law, which states [...]
Don’t Make Shared Email Accounts
A shared email box has plenty of utility, but it has to be set up [...]
The Panopticon Comes for Your Playlist
Artists can see what playlists you add their songs to on Spotify. That hasn’t really [...]
How IT-Secure is Your Business?
Take our quiz (via Google Forms) here: https://forms.gle/Yz36chVPMshp6bT57 And when you’re done, download or view [...]
Does Digital Content Have to Be Made Scarce?
NFTs The ever-unpopular NFT is a fantastic example of artificial scarcity, and how creating it [...]
“NPC Interactions” and the Death Of Social Cues
What is An NPC? NPCs, or non-playable characters, are side characters in video games. When [...]