Wednesday, April 14, 2021
Cybersecurity graphic

Compromised Emails Are One Of Your Greatest Security Threats

A compromised e-mail account is one of the greatest security threats you face online. It can lead to robbery, a complete takeover of your social media accounts, theft of your games and in-app purchases, among other things!
Using LUKS to encrypt a USB drive in Linux

Encrypt Your USB Drive And Protect Your Data

Identity thieves and other kinds of cybercriminals can dig up personal information such as passwords, emails, and communications to help them gather details required to take out credit in their victims'...
iPhone 6 on a wooden table

Dangerous, Fake Lightning Cables Entering Mass Production

We live in a time where security testing is becoming more open and public, and with that comes some unusual activities -- such as the mass production of fake iPhone Lightning...
The bottom of a 5 volt, 0.6 amp laptop cooling fan/blower.

Blowers Vs Axial Fans: Which Is Better For Your Project?

Blowers, otherwise known as centrifugal fans or squirrel cage fans are devices that draw air through enclosures. Common applications for blowers include: Laptops. All-in-one PCs (example: iMac). Rack servers. Forcing air...
Raspberry Pi 3A+ single-board computer

Raspberry Pi 4 Released With Up To 4GB Of RAM And 4K Video

The Raspberry Pi Foundation has released their new Raspberry Pi 4 line of single board computers (starting with the Model B). They did some not-so-surprising things for the Raspberry Pi 4,...
Keylogger rendition (security threat)

Android Triada Hack, WhatsApp, And Other Crucial Security News

Another month, more security vulnerabilities and hacking incidents! This article won't cover them all, but it does cover a few major security-related incidents and vulnerabilities you need to be aware of. WhatsApp...
Network switch in a data center

Why Blockchain: As Quickly As Possible

As is the case with most technologies, blockchain has its use cases. The first step to identifying blockchain's use cases and why you should use blockchain, or why blockchain may not...
Network switch in a data center

Intel Launches Xeon Server Processors With Up To 56 Cores

Intel has launched their latest Cascade Lake Xeon processors at the Data-Centric Innovation Day in San Francisco. These second-generation Xeon Scalable processors come in many varieties (53) and offer up to...