Sydney Butler
Sydney Butler has a formal background in research psychology, with a particular focus on how technology affects us as individuals and society. He writes about technology broadly, but is an advocate for personal freedom and privacy. He has extensive experience as a digital literacy teacher and believes strongly in public education on topics such as cyber security, privacy, surveillance and freedom of speech. Contact at - contact@technadu.com
307 articles
Anime
Did Funimation Buy Crunchyroll?
We still remember a time when anime was an extremely niche pastime. Those of us who were fans 20 years ago had...
Hacking
What Is a Replay Attack and How Can You Prevent One?
A replay attack happens when a hacker records and replays secure communication between two legitimate sources. While this may sound like a...
Anime
Is Black Clover Worth Watching and Why?
In the world of Black Clover, almost every human being has some level of magical ability. When people come of age, they...
Anime
How Many Episodes/Seasons Does Black Clover Have in Total?
Although the juggernaut that is Naruto is still around in the form of Boruto, there are still plenty of other contenders in...
Gaming
How Do 120fps Games Work on PS5?
The next generation of gaming consoles is here, which we guess makes them the current generation of consoles. That pedantry aside, these...
Malware
What Is Beta Bot?
Beta Bot is the name of a, particularly nasty and dangerous trojan malware package. It's so scary that even the FBI felt...
Hacking
Understanding Clickjacking and How to Prevent It
The word clickjacking is a portmanteau of the words click and hijack. As the name suggests, clickjacking is the act of taking...
Malware
What Are Metamorphic and Polymorphic Viruses?
Metamorphic and polymorphic viruses are some of the most advanced and hard to kill viruses out there, but what are they? Just...
Cybercrime
What Are Advanced Persistent Threats? Should You Worry?
An advanced persistent threat might very well be the definition of a cybersecurity nightmare. This is when a hacker (or group of...