Hacking Washing Machines (39C3) [video]
Almost everyone has a household appliance at home, whether it's a washing machine, dishwasher, or dryer. Despite their
Outside, Dungeon, Town: Integrating the Three Places in Videogames (2024)
Videogames, at least the kind I’m talking about (RPGs, adventure kinds of somewhat narrative videogames, Zelda games, Elden Ring,
MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide
A recently disclosed security vulnerability in MongoDB has come under active exploitation in the wild, with over 87,000 potentially
27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials
Cybersecurity researchers have disclosed details of what has been described as a "sustained and targeted" spear-phishing campaign that
Incremental Backups of Gmail Takeouts
In an earlier writeup I discussed how to create reproducible bundles of git repositories such that a file-based backup strategy
Demystifying user journeys: Revolutionizing troubleshooting with auto tracking
Introduction
Troubleshooting critical issues by deciphering a user’s journey on the Grab app is an extremely challenging task. With