Editor profile

Nathan Ord

image
Nathan Ord is a tech nerd through and through.  Following any technology, from home and business applications to VR, anything is up his alley.  Starting out as the family repair guy and local "tech expert" for those around him, he helped out wherever he could.  Nathan came aboard HotHardware in 2020 and continuously enjoys what he does.  In his free time, he enjoys volunteering, playing video games, and just relaxing with friends. 
Opinions and content posted by HotHardware contributors are their own.

Recent posts

From 2021 to 2022, the LAPSUS$ hacking group went on a PWNing spree, popping boxes at companies such as NVIDIA, Samsung, Microsoft, and Rockstar. Since then, though, the teens behind the group have been arrested, likely partly due to the group's overall poor operational security. Regardless, it has been over a year... Read more...
XLoader, an infostealer and botnet malware-as-a-service solution, has been around since 2015, taking on many forms that have been tracked by researchers such as those at SentinelOne. Most recently, though, the security company has found that XLoader has returned as a new malware strain masquerading as an app called... Read more...
It is generally known that Internet of Things (IoT) devices are not the most secure things in the world. Researchers from Italy and the United Kingdom have proven this once more after discovering four vulnerabilities in Amazon Italy’s best-selling smart light bulb, the TP-Link Tapo L530E. The first and most severe... Read more...
Just under a year ago, EVGA cut ties with NVIDIA and initiated its exit from the graphics card market together, ending an approximately 24-year run in the market. In that time, the company had some GPU gems, especially those made in collaboration with Vince “Kingpin” Lucido. As a memento of that, Lucido sent out some... Read more...
This month, researchers at Zimperium’s zLab reported on a means by which thousands of Android malware samples were evading detection and analysis. It is claimed that over three thousand samples use this technique, which involves tampering with the field that establishes what compression method is used for the... Read more...
Twenty-eight years ago, Microsoft was faced with the rapid expansion and commercialization of the Internet. Then-CEO Bill Gates saw this change coming and sent out an internal memo calling this phenomenon “The Internet Tidal Wave.” Now, Microsoft CEO Satya Nadella believes that artificial intelligence might be on the... Read more...
Cybersecurity incidents are constantly on the rise, with many threat actors launching targeted or widespread opportunistic attacks. In what effectively amounts to cyberterrorism, these acts are not limited to large companies and organizations as one might think, but extend to things like high-profile sporting events... Read more...
Minecraft players and server operators are facing new security risks following the discovery of a vulnerability in certain mods and subsequent mod packs that allows remote code execution if exploited. Patches are rolling out and vulnerability management is actively happening, but players could still be at risk if... Read more...
Earlier this week, SpaceX had anticipated launching two rockets back-to-back just 44 minutes apart, which would set the record for the fastest time between launches. However, the SpaceX Falcon Heavy that was second in line had some delays that pushed its launch back into the evening. Despite this setback, the events... Read more...
In recent days and weeks, Call of Duty has seen an uptick in population since the online servers were fixed up, allowing players to return to their old haunts and have some fun. However, with this uptick in activity, cheaters and hackers are looking to ruin the fun and nostalgia for CoD players. As it turns out, they... Read more...
Radio communications are the backbone of much of day-to-day life, but by and large, we routinely take it for granted. This is also aided by the fact that there is much secrecy surrounding this technology, but that did not deter Dutch researchers who discovered vulnerabilities and an intentional backdoor in the... Read more...
Whether mowing the lawn or grilling and chilling at a backyard barbeque, music almost always enhances the experience. You can only do that with stellar speakers or excellent earbuds, which thanksfully, are currently discounted on Amazon. Starting off, we have the Bose SoundLink Revolve+ ii, a portable speaker... Read more...
Earlier this month, researchers from Palo Alto’s Unit 42 discovered a peer-to-peer worm dubbed P2PInfect targeting Redis installations, an open-source database application used in cloud environments. While only 934 of the publicly communicating 307,000 unique Redis systems may be vulnerable, the worm may knock on the... Read more...
Kevin Mitnick, who was once the most wanted computer hacker in the world turned security consultant, has died at the age of 59. Per his obituary, he passed away peacefully after a 14-month battle with pancreatic cancer. In the mid to late 1990s, Kevin Mitnick went on what was called a “countrywide hacking spree” by... Read more...
Tech support scammers have been around for quite some time, continually innovating and perfecting their game to rake in more money. The problem has become so big that even YouTubers like Kitboga are making a living trolling these people. However, that has not been enough to stop these problematic people, as the FBI... Read more...
Gmail users around the world have been getting pop-up notifications in the past few days prompting them to up their security with Enhanced Safe Browsing. This feature, which is enabled across all Google products with a simple toggle, enables real-time security scanning and will help protect you against phishing and... Read more...
Recently, a plugin utilized by over a million WordPress site owners was discovered to have a bug in a prior release that logged passwords in plaintext. While the problem has since been fixed in an update, credentials may still be floating around in logs, so be sure to take a look. The All-In-One Security (AIOS)... Read more...
Summer may be in full swing, but we're only a few weeks away from the back to school season. If you did not grab everything you needed for next semester's classes on Amazon Prime Day, there are still some leftover deals for iPads and iPad accessories running. However, you should grab these fast as they may not last... Read more...
In April 2019, Valve launched the Valve Index, a premium spec and priced VR headset which some could call the gold standard for VR. However, we are now four years on with no sign of an official update or price change for the headset. Subsequently, competitors like Apple and Meta are pulling up the slack left by Valve... Read more...
Over the years, Clop ransomware has hit a number of different targets across a wide variety of industries, from oil and gas to banking institutions. However, the latest organization to be entangled in the Clop trouble is Shutterfly, a photography and personalized items manufacturer based out of San Jose... Read more...
The general rule of thumb is to not plug in USB drives you find on the ground, and beyond that, certainly don’t run anything on them as it could be malware. However, that rule is being skirted by some people, as researchers have discovered an alarming uptick in the use of infected USB drives to steal data. Earlier... Read more...
Microsoft’s traditional Patch Tuesday has arrived, bringing with it a slew of security fixes for 130 vulnerabilities and two published advisories. This update comes at the perfect time, as threat actors have been exploiting some of these vulnerabilities for espionage against defense and government organizations in... Read more...
First ... Prev 11 12 13 14 15 Next