I Got Phished by an AI-Powered Email. Here's Exactly How It Worked
I consider myself reasonably security-aware. Then I clicked a link I absolutely should not have clicked. The email that got me was so good it scared me more than getting phished did.
Security best practices, threat intelligence, ethical hacking and data protection.
I consider myself reasonably security-aware. Then I clicked a link I absolutely should not have clicked. The email that got me was so good it scared me more than getting phished did.
After doing code reviews for five years, I've noticed the same security issues appearing in experienced developers' code over and over. These aren't junior mistakes — they're the sneaky ones that knowledge doesn't automatically prevent.
SMS 2FA is basically security theater at this point. Even authenticator apps have a critical weakness that most people don't know about. Here's what actually protects your accounts in 2026.
I gave myself five days to find every security vulnerability in the SaaS product I'd been building for two years. The results were humbling, educational, and a little terrifying.
With more of us working from home, home network security actually matters now. Here's a practical checklist for auditing your own network — no technical background required.
People still debate whether to use a password manager in 2026. That argument ended years ago. The only real question is which one — and I have a strong opinion about that.