I take a lot of notes. I take notes in meetings, on calls, while I’m podcasting, and when I’m thinking about column ideas. I ...
The future of note-taking is here.
ZiChatBot malware spread via 3 PyPI packages in July 2025 uses Zulip APIs as C2, enabling stealthy attacks across systems ...
Tom has been covering technology since 2019, having worked as part of the phones team at TechRadar and then as an editor at What to Watch. Since 2025 he’s been a freelance contributor for many more ...
Obsidian is good on its own, but these plugins made it even better for me.
Pick up a tool that does exactly one thing and then gets out of your way—no LLM involved. Is it just me or is every app ...
“I built Newslog. It bundles your newsletters, RSS feeds, and articles into a single daily digest with an index and summaries ...
Be honest with me. How many of your passwords are still some version of your pet’s name followed by a number? Studies have shown that roughly 80% of data breaches involve weak or reused passwords.
A special event celebrates Sir David's centenary and groundbreaking contributions to natural history broadcasting.
After the CopyFail vulnerability gave root access from any user on almost all distributions last week, this week we’ve got DirtyFrag. This chains the vulnerability in CopyFail (xfrm-ESP) and ...
With model devs pushing more aggressive rate limits, raising prices, or even abandoning subscriptions for usage-based pricing ...
Peer review, in its modern form, began to spread in the 18 th and 19 th centuries, becoming standard in the 20 th century.