Technology

3,567 Articles 30 Followers


Is Ethereum on the verge of an internal revolution? I think so.

26 Jan 2025 1 minute read 1 comment CryptoMax1387

The news that a split was brewing around the project began to resemble a kind of political confrontation that was beginning to flare up within the community. The co—founder of Lido Finance announces the creation of a "Second Fund" - this is already a...

To Enslave Or Be Enslaved By Technology

23 Jul 2024 3 minute read 2 comments Sapphire Crypto

As Old As Time Slavery has been in existence since the beginning of mankind. It’s a dynamic that naturally asserts itself against mankind and its inherent freedoms. To some extent, slavery has been done away with. However, it is still quite prevalent...

Historical Hacks: The RSA SecurID Breach

28 Aug 2024 4 minute read 2 comments Investigator515

That one time when two-factor authentication was targeted. If you aren’t a medium member, you can read with no paywall via substack When you’re at the incident response stage of assessing a cyber attack, it can often be a pretty dynamic situation. As...

What The Tech?! Barcodes

4 Aug 2024 6 minute read 0 comments Investigator515

Barcodes play a much bigger role in the world than most realise. If you aren’t a medium member, you can read with no paywall via substack When dealing with technology, we’ll typically see something that is a complex device or system. Something that v...

Three useful (non-crypto) apps you can use daily

12 May 2024 1 minute read 1 comment LeftFooted

I use all kinds of apps, both mobile and desktop, daily. There are apps I'm paying for, for various reasons, but these are three are totally free. And very useful. Canva Canva is a photo and video editing app that works better with desktop. The am...

Researchers Give Birth to the First GenAI Worm

4 Mar 2024 1 minute read 2 comments Matthew Rosenquist

It was bound to happen — researchers have created a 1st generation AI worm that can steal data, propagate malware, and spread via email. Ben Nassi from Cornell Tech, Stav Cohen from the Israel Institute of Technology, and Ron Bitton from Intuit crea...

What Is a Seed Phrase in Crypto?

8 Apr 2024 9 minute read 0 comments CryptoManiaks

The seed phrase for your cryptocurrency wallet is an essential backup in case your wallet is lost, stolen, or damaged and you need to regain access to your cash. Keep your seed word in a safe, offline location, such as a paper or metal copy. Keep it...

North Korea is Trying to Embed Agents into IT Positions of Western Countries

22 May 2024 1 minute read 0 comments Matthew Rosenquist

Attention IT departments, the FBI is warning US companies to be wary of inadvertently hiring North Koreans to remotely work in their IT departments, amid fears of data theft and hacking. We are seeing organized activities designed to mask the origin...

Historical Hacks: Ashley Madison

6 May 2024 6 minute read 3 comments Investigator515

Breached data can cause all kinds of long-term issues to user security. If you aren’t a medium member, you can read with no paywall via substack When you’re dealing with cybersecurity it’s often true to say that some of the more damaging incidents co...

For Licensed NFTs, Mints aren’t what you think they are.

5 Mar 2024 4 minute read 0 comments NonFungibleTalking

  This article like all others on this blog is a work of opinion. Hopefully well thought out opinion but opinion nevertheless In virtually every Licensed NFT platform I have researched, the edition/mint number shown on the platform isn’t the number...