Nathan Ord

Nathan Ord is a tech nerd through and through. Following any technology, from home and business applications to VR, anything is up his alley. Starting out as the family repair guy and local "tech expert" for those around him, he helped out wherever he could. Nathan came aboard HotHardware in 2020 and continuously enjoys what he does. In his free time, he enjoys volunteering, playing video games, and just relaxing with friends.
Opinions and content posted by HotHardware contributors are their own.
Recent posts
Valve seems to have many moving pieces right now, between the upcoming launch of Counter-Strike 2, Steam Deck updates, and a 20th birthday celebration adding to the chaos. However, more subtly, in the background, updates are being pushed to Steam VR and the Steam Client that bring new VR-related features, UI elements...
Read more...
As it turns out, hotels, and by extension, the hospitality industry, are not the most secure organizations around despite handling personal information and credit card details. This is evident in the recent MGM Hotel breach or even further back with the 2022 social engineering of Marriott. Now, an infostealer campaign...
Read more...
Earlier this year, Valve announced the follow-up game to the ever-popular FPS game Counter-Strike: Global Offensive, Counter-Strike 2. Since then, we have seen numerous people get into beta testing the game as it rolls toward an official launch, which has not yet been confirmed. However, a teaser recently posted by...
Read more...
Trend Micro has been tracking a threat-actor group since early 2021, dubbed Earth Lusca, which is purportedly based out of China. Since that initial discovery, researchers have found the group has utilized increasingly sophisticated infrastructure, tools, techniques, and procedures to advance its goals in...
Read more...
If it doesn’t come directly from the Google Play Store, do not download or install whatever application it is. This simple rule could protect you from malware such as that from the Transparent Tribe, a suspected Pakistani threat actor who is hiding remote access tool (RAT) features inside another application that...
Read more...
Misconfigured cloud storage seems to be a recurring problem for Microsoft, who just last year had customer information leak through an exposed Azure Blob Storage server. Now, the Redmond-based company has had 38TB of private internal data leaked thanks to a bucket of open-source AI training data linked on...
Read more...
Late last year, the DJI Mini 3 arrived at a relatively low price and weight, which made it a great option for consumers shopping for a high-quality, compact drone that wouldn't break the bank. While there isn’t yet an official follow-up to the Mini 3, it seems that DJI has one in the works with the DJI Mini 4 Pro...
Read more...
Mini PC has gotten increasingly more powerful, popular, and affordable in recent years, and have gotten to the point that some of the lowest cost models offer plenty of performance and connectivity for daily computing tasks. And thanks to Amazon, many of the hottest mini PCs are up to 33% off.
Leading off the...
Read more...
Losing a pet can be one of the hardest things to go through, but with the help of modern technology, that may be a problem of the past. Creator and inventor Sahas Chitlange has created FindMyCat, an open-source pet tracking solution, not terribly unlike Apple’s AirTags, designed specifically for your favorite feline...
Read more...
While Windows is nearly ubiquitous, great for convenience and it offers a familiar end-user experience, some things are more easily done on Linux. Given this odd juxtaposition of popularity versus utility, threat actors targeting Linux are finding a target-rich environment that can still fly under the radar for the...
Read more...
Using wireless signals to discover what is on the other side of a wall is not necessarily a new concept but one that has improved in recent years with advancements in math and machine learning. This has been showcased most recently by a team of researchers out of the University of California Santa Barbara who were...
Read more...
As it turns out, it does not take a team of highly specialized criminals led by one Danny Ocean to disrupt a massive casino network these days. It only realistically takes a team of hackers to bring things to a grinding halt and potentially get away with personal data or money in the era of the digital heist.
From...
Read more...
This month, the Associated Press is warning that the personal information of AP Stylebook customers was compromised in a data security incident over the summer. What tipped the AP off was a series of phishing emails being sent to AP Stylebook customers asking them to provide updated credit card information.
The AP...
Read more...
This week, Wyze security camera owners reported that they could no longer see their own cameras, and in their place, saw live feeds from strange cameras that were not theirs. While Wyze has reportedly fixed the problem, it certainly begs the question: How much privacy and security are users willing to sacrifice when...
Read more...
As we await the next generation of iPhone, Apple is engaged with other issues at the current moment, such as two new vulnerabilities discovered in iOS, iPadOS, watchOS, and MacOS. As such, Apple device owners should update their devices as soon as possible with the released security patch to prevent the infection...
Read more...
Valve has been busy with hardware projects over the last few years, from the Valve Index to the Steam Deck. Therefore, it comes as no surprise to find that the Bellevue, Washington-based company is cooking something up after a Korean radio certification was discovered, but it is wholly unclear what that new project...
Read more...
Toward the end of August, Toyota was forced to shutter several manufacturing plants due to insufficient disk space on a system, causing a snowball effect of locked-up systems. While the issue was fixed after two days, it goes to show how it’s not just cyberattacks that can bring operations to a grinding halt.
In a...
Read more...
Lenovo Yoga Book 9i - $1,999.99 The Lenovo Yoga Book 9i is an innovative, relatively powerful 2-in-1 laptop with a highly versatile, and high quality, dual OLED display configuration. Gorgeous Displays Impressive Screen Real Estate Easy And Fun To Use Includes Keyboard, Mouse, And Pen High Quality...
Read more...
Late last year, password manager LastPass disclosed that hackers had stolen proprietary source code, customer information, and password vaults. Since the initial breach, hackers have been able to get into some of these password vaults, leading to multiple six-figure cryptocurrency thefts.
Taylor Monahan, founder...
Read more...
Australian crypto-casino Stake, which has seen a rise in popularity for sponsoring or being used by streamers on Twitch and Kick, has reportedly been hacked. The threat actor responsible for the attack has seemingly gotten off with roughly $40 million in Ethereum, which was taken to several external crypto wallets;...
Read more...
Recently, researchers from the University of Wisconsin–Madison assessed the security of text input fields for web browsers. This research discovered that some sites store passwords in plaintext in the HTML source code of the site, which browser extensions could abuse to steal the credentials.
The research...
Read more...
On September 12th, Apple is hosting its Wonderlust event, wherein the Cupertino-based company is expected to launch the iPhone 15 family and a new line of Apple Watches. However, some fans of the company might be in for a sour Apple experience if rumors are anything to go by, but much is still up in the air, so that...
Read more...