Editor profile

Nathan Wasson

Nathan grew up with computer hardware news and reviews in the family business and eventually joined the business himself in 2014. He initially joined to make video reviews and help with the podcast, but was soon asked if he would write, and he's been writing about computers ever since. More recently, Nathan has developed a passion for internet privacy, security, and decentralization and likes writing about those topics the most. He spends much of his free time tinkering with Linux distributions, custom Android ROMs, privacy and security tools, and self-hosting solutions. He also started gaming on a PC at a young age and still can't give up Unreal Tournament 2004 and Supreme Commander 2. Beyond computers, Nathan is a car enthusiast and philosophy nerd.

You can follow Nathan on Mastodon and Twitter.

Opinions and content posted by HotHardware contributors are their own.

Recent posts

In the age of Windows 95, Microsoft introduced PowerToys, a set of tools for Windows power users to tweak to their heart's content. Among these tools was TweakUI, which exposed system utility settings that were previously accessible only by modifying the Windows Registry. However, after Windows XP, PowerToys went the... Read more...
A trojan known as UpdateAgent began infecting Mac computers back in September 2020, but this infection was relatively innocuous at the time, doing nothing other than collecting some basic system and device information and broadcasting its presence to the command-and-control (C2) server. However, Microsoft has been... Read more...
A team from Binarly, a firmware protection company, recently discovered several repeatable anomalies on twenty different enterprise machines in the course of a job for a midsize enterprise company. After looking further into these anomalies and digging all the way down into the disassembly code, the team found 23... Read more...
Having entered a new year, cybersecurity experts, researchers, and companies are reflecting on 2021 and assessing the state of cybersecurity so that we can better understand and prepare for threats going forward. Unfortunately, the outlook going forward into 2022 seems pretty disheartening as far as ransomware is... Read more...
Back in 2018, a team of security researchers from Akamai released a white paper detailing a malicious proxy system they dubbed UPnProxy that is now being leveraged in a new attack. The malicious proxy system draws its name from Universal Plug and Play (UPnP), which is a set of networking protocols that enables devices... Read more...
A security researcher who goes by the name “RyeLv” recently discovered an elevation of privilege vulnerability in Windows. Microsoft has publicly disclosed the vulnerability and registered it in the Common Vulnerabilities and Exposures (CVE) system with the name CVE-2022-21882. The National Institute of Standards and... Read more...
Many websites and applications employ various device fingerprinting methods to identify users and track their activity across websites and applications over time. The Electronic Frontier Foundation has a good explainer on this subject, as well as a tool to test how well your browser protects you from fingerprinting... Read more...
Prev 1 2 3 4