Corsair's pricey DDR5 RAM now comes in very different packaging — and it's all about foiling RAM scammers
Memory

Corsair's pricey DDR5 RAM now comes in very different packaging — and it's all about foiling RAM scammers

Corsair introduces a sealed plastic clamshell for its premium RAM to combat return-related scams. This innovative packaging aims to enhance product security and ensure customer satisfaction, reflecting the company's commitment to quality and integrity in the tech market.


What is a RAM return scam and how does Corsair's new packaging prevent it?
A RAM return scam involves criminals buying genuine DDR5 RAM, replacing it with cheaper or fake modules like old DDR4, DDR2, or dummy lights, and returning the tampered product to retailers for a refund. Corsair's new sealed plastic clamshell with a tamper-evident belly label allows visual verification of the modules before purchase and reveals any tampering attempts, deterring such fraud.
Sources: [1], [2]
Which Corsair RAM kits use the new plastic clamshell packaging, and what about other kits?
The new sealed plastic clamshell packaging, made from recycled plastic with ESD protection, is used for Vengeance DDR5 series (non-RGB, RGB, and RS) in 2-module configurations, replacing the traditional yellow cardboard boxes since early January 2026. Other SKUs, like 4-module kits or lower-tier RAM, continue with cardboard boxes but are receiving added security labels.
Sources: [1], [2]

13 February 2026

TechRadar
Inside Raiders of the Lost Ark (Atari Style)
Games

Inside Raiders of the Lost Ark (Atari Style)

An Atari 2600 game based on Raiders of the Lost Ark has sparked an archaeological expedition by Dennis Debro and Halkun, who reverse-engineered the classic title. Their findings offer a captivating glimpse into early game coding and hardware intricacies.


What does it mean to reverse-engineer an Atari 2600 game like Raiders of the Lost Ark?
Reverse-engineering involves disassembling the original binary game code into human-readable assembly language, then adding detailed comments to explain how the game's logic, graphics, sound, and hardware interactions work on the Atari 2600's limited 6502 processor and 128 bytes of RAM.
Sources: [1], [2]
Who reverse-engineered Raiders of the Lost Ark for Atari 2600, and where can the source code be found?
Developer Halkun (also associated with Joshua N. Walker on GitHub) fully reverse-engineered the game, producing commented 6502 assembly source code available in the public repository at github.com/joshuanwalker/Raiders2600.
Sources: [1], [2]

13 February 2026

Hackaday
Security

Fintech lending giant Figure confirms data breach

A recent security breach revealed that hackers, identified as ShinyHunters, accessed a limited number of files by infiltrating an employee's account. The company is addressing the incident to enhance its cybersecurity measures and protect sensitive information.


Who are ShinyHunters?
ShinyHunters is a notorious black-hat criminal hacker and extortion group formed around 2019, known for data theft and extortion campaigns targeting enterprises, often using voice phishing (vishing), social engineering, and OAuth abuse in SaaS platforms like Salesforce to steal sensitive data from multiple victims.
Sources: [1]
How do ShinyHunters typically infiltrate company accounts?
ShinyHunters commonly uses voice phishing (vishing) by impersonating IT support to trick employees into providing credentials or authorizing malicious apps, such as modified Salesforce Data Loader tools via OAuth flows, or compromises employee accounts through smishing and insider access to exfiltrate data.
Sources: [1], [2]

13 February 2026

TechCrunch
An unhandled error has occurred. Reload 🗙