How to speed up your computer or laptop
There are many ways to to make your computer run faster. Let’s take a look.
Nintendo warns of imitation websites and suspicious hardware
We look at a warning Nintendo has released, steering consumers away from imitation websites selling potentially dubious hardware.
How to troubleshoot hardware problems that look like malware problems
Malware and hardware problems can look surprisingly similar. So what do you do when your virus scan draws a blank?
Explosive technology and 3D printers: a history of deadly devices
We look at how successful hardware hacks can damage devices—and potentially even put lives at risk.
Assessing the security of a portable router: a look inside its hardware, part deux
In part two of our blog assessing the security of a portable router, we will acquire the tools and equipment to make a copy of the firmware on our target router so that we can assess whether there are any vulnerabilities.
How to build your own motion-activated security camera
Attention makers! Are you looking for a challenging project that not only gets your gears grinding but helps to keep you secure while traveling? Welcome to the build-your-own security camera tutorial.
Bloomberg blunder highlights supply chain risks
A potentially erroneous report from Bloomberg claimed that Chinese spies were able to infiltrate US hardware supplier Supermicro, and therefore, our technology supply chain. Learn how this unverified story could ultimately come true—and what, if anything, can be done to stop it.
Assessing the security of a portable router: a look inside its hardware
In this post, we acquire the necessary equipment to analyze the security of an inexpensive portable router, which we access through its diagnostic interface, and poke around inside.