Editor profile

Nathan Wasson

Nathan grew up with computer hardware news and reviews in the family business and eventually joined the business himself in 2014. He initially joined to make video reviews and help with the podcast, but was soon asked if he would write, and he's been writing about computers ever since. More recently, Nathan has developed a passion for internet privacy, security, and decentralization and likes writing about those topics the most. He spends much of his free time tinkering with Linux distributions, custom Android ROMs, privacy and security tools, and self-hosting solutions. He also started gaming on a PC at a young age and still can't give up Unreal Tournament 2004 and Supreme Commander 2. Beyond computers, Nathan is a car enthusiast and philosophy nerd.

You can follow Nathan on Mastodon and Twitter.

Opinions and content posted by HotHardware contributors are their own.

Recent posts

A new report by Microsoft details a vulnerability in the TikTok Android app that threat actors could have exploited to hijack user accounts with a single click. The vulnerability appears in the National Vulnerability Database with the... Read more...
We frequently write about Android malware smuggled onto the Google Play Store in the form of what appear to be legitimate apps. However, the Play Store isn’t the only Google-run app store with a malware problem. A new report by McAfee Labs... Read more...
Google unveiled the design of its upcoming Pixel Watch at Google I/O earlier this year, but left pricing and release date information sparse. The company simply stated that the smart watch is coming some time this fall. However, an... Read more...
Information obtained by GalaxyClub indicates that Samsung may already be testing Google’s third-generation Tensor chip. Since Google doesn’t have its own semiconductor fabrication plant, the company turned to Samsung to manufacture its... Read more...
The password manager LastPass has published a blog post notifying users of a recent data breach. According to the CEO, Karim Toubba, the breach affected parts of the company’s development environment but did not touch any databases... Read more...
A new report by cybersecurity firm Mandiant details an ongoing hacking campaign targeting Microsoft 365. The threat actor behind this campaign is an advanced persistent threat (APT) known as “Cozy Bear” or simply “APT29.” APT29 is thought... Read more...
Plex, a company that provides media streaming solutions, sent out emails early this morning informing users of a data breach. According to the notice, Plex launched an investigation yesterday after discovering suspicious activity on one of... Read more...
HyperX, originally Kingston’s gaming division, cut its teeth producing high speed memory modules meant for gaming PCs. However, the company eventually expanded into the wider gaming peripheral market, making headsets, mice, keyboards, and... Read more...
Over the weekend, a ransomware attack hit a French hospital, forcing the facility to turn away patients. The staff of the affected hospital, the Centre Hospitalier Sud Francilien (CHSF), has had to return to using pen and paper to keep... Read more...
Google began experimenting with an RSS reader integrated directly into the Chrome browser app for Android back in October of last year. Google also had plans to introduce this new feature to the iOS version of Chrome. Fast forward to now... Read more...
We wrote last week about research showing that Meta takes advantage of the in-app browser feature on mobile devices to inject JavaScript into web pages viewed in the Facebook, Instagram, and Messenger mobile apps. Now that same researcher... Read more...
Android 13 is currently rolling out to Pixel devices. Google is pushing privacy and security more strongly with this new version of Android, and this push extends to the clipboard as users often copy sensitive information. As a means to... Read more...
Threat intelligence firm Recorded Future has published a report concerning a long-term credential theft campaign targeting humanitarian, think tank, and government organizations. A hacking group known as RedAlpha is carrying out this... Read more...
An Android banking Trojan with an already extensive toolkit recently gained a ransomware module. While banking malware is an all too prevalent a threat for mobile devices, ransomware isn’t a technique commonly deployed against mobile... Read more...
Internal moves and discussions at Apple may indicate that the company is moving to grow its advertising business. Apple already generates around $4 billion in ad revenue every year. However, according to Bloomberg, Apple’s vice president... Read more...
Facebook’s collection and sale of user data for advertising purposes took a huge hit when Apple introduced its App Tracking Transparency (ATT) feature, with Facebook projecting that it will lose out on $10 billion in revenue this year... Read more...
Cloudflare says that it was hit by the same smishing (sms phishing) attack that recently resulted in a user data breach at Twilio. However, unlike Twilio, Cloudflare managed to prevent the attack from escalating to a data breach thanks to... Read more...
Microsoft has finally released a security update that addresses a zero-day vulnerability that went unpatched for more than two years. The vulnerability, known as DogWalk, appears in the national vulnerability index as CVE-2022-34713... Read more...
As the chip shortage continues and tensions between China and Tawian rise, industry leaders and US lawmakers are looking to expand US semiconductor manufacturing capacity. Taiwan is home to the world’s largest chip maker, TSMC, but the... Read more...
If we’ve learned anything from reporting on phishing attacks, it’s that no company, organization, or institution is immune from becoming the victim of one. Even the US Department of Defense recently fell victim to a $23.5 million phishing... Read more...
Amazon published a press release this morning announcing that it has entered into a merger agreement with iRobot, the company best known for its Roomba line of robot vacuum cleaners. So long as the deal receives shareholder and regulatory... Read more...
The US Government’s Cybersecurity and Infrastructure Security Agency (CISA) maintains a list of exploited vulnerabilities and releases notices urging organizations, particularly government agencies and contractors, to patch said... Read more...
First ... Prev 4 5 6 7 8 Next