Non-fungible tokens revealed (similar to Certificate of Authentication), clipboard stealer malware (programmed to steal crypto), 5G cellular explained (deployment timing for key carriers)