Browsing: Lifestyle

In just under a month from now, Bethesda will release Doom: The Dark Ages, which is a prequel to Doom reboot that launched in 2016. To celebrate the highly-anticipated release to the popular game franchise, Microsoft has announced a pair of themed Xbox controllers as well as a devilishly delightful wrap for your Xbox Series X console. As far as themed accessories go, these look pretty sweet. If I hadn’t picked up Microsoft’s translucent 20th Anniversary Special Edition controller a few years ago, I’d be all over this one. Pictured above is the standard wireless Xbox controller themed after Doom: The Dark Ages, and it looks like it’s been to Hell and back. Check out those blood splatters. It also pays homage to the game with matte green armor, special characters from the Sentinel alphabet for the ABXY buttons, and the Mark of the Slayer on the lower-right grip. “Crowned with 3D silver helmet spikes at the top and silver-plated sheathing on the two sides, this controller was forged for a demon-slaying super wea

Read more

A recent report of a highly sophisticated phishing attack exploiting Google services targeting a lead developer at Ethereum Foundation, Nick Johnson, proves that internet users need to take more precautions to protect themselves from social engineering tactics like phishing. The attack’s sophistication lies in hackers’ ability to make every element look highly legitimate. In this attack, hackers circumvented the DomainKeys Identified Mail (DKIM) signature checks, which are designed to verify if an email is actually from the acclaimed domain. Due to this bypass, Google will not warn you about an impending cyberattack. In Nick’s case, the phishing came from no-reply@accounts.google.com, an email with a legitimate domain. The phishing link, however, has “sites.google.com” in its URL. How could this be possible? Hackers created an imitation support portal page with sites.google.com, originally designed to help Google account owners create basic websites. A link to the support page is then embedded in the phishing

Read more