The biggest impersonated brands used in social engineering schemes You’re no stranger to phishing attacks, a common method by hackers and malicious parties to steal information. They’ve existed since the earliest days of the internet when things like email were first possible and the potential for...

Scams, security threats, and jpegs In March of 2021, a major auction purchase hit internet headlines and kickstarted the wave of digital gold-digging, or the arrival of the NFT market. NFT stands for “non-fungible token,” and I guarantee you’ve heard about it in some capacity if...

The invasion of Ukraine and Russian aggression will aggression on multiple fronts At the time of writing this, it’s a day after Russia’s declaration of war and invasion of Ukrainian territories. I will spare you my interpretations and analytics of the situation, there are far better...

Component costs for PC systems and similar on the rise Since 2020, you may have noticed a trend in the technology sector: rising prices. When it comes to parts requiring specific components like chipsets and semiconductors, there’s a notable jump of low-to-mid tier hardware rocketing into...

Disruptions in concentration could be a sign of ADHD You’ve landed yourself a remote position and look forward to its flexibility. But though the environment is initially less stressful, you notice something. Managing tasks and staying focused prove difficult. You look at a screen for a...