Featured Article: How Can You Protect Yourself From ‘Identity Theft’?
With identity theft, and the resulting identify fraud becoming more widespread, we look at how to spot the signs that you may be a victim, the effects on victims, and how to reduce the risk of having your identity stolen and used for fraud. What Are Identity Theft and Identity Fraud? Identity theft is when […]
Tech Insight : What Are Wi-Fi 5 And 6 … And What’s The Difference?
In this tech-insight we look at what Wi-Fi 5 And 6 are, and the improvements that Wi-Fi 6 offers. Wi-Fi Standards Wi-Fi 5 and Wi-Fi 6 are the names of the most recent Wi-Fi standards. Wi-Fi standards are sets of services and protocols that dictate how a Wi-Fi network (and other data transmission networks) acts. […]
Security Stop-Press : Warning Over Amazon’s Human Voice Mimicking Plans For Alexa
A Global Cybersecurity Advisor at ESET has warned that Amazon’s plans to enable the Alexa voice assistant to mimic human voices (dead or alive) could be used to launch deep fake audio attacks on some voice authentication security systems. The advice from some security experts is that, if Amazon goes ahead with voice mimicking for […]
Tech Tip – How To Colour Code Your Outlook Calendar
If you’d like to get more at-a-glance organisation and track all items related to a project or task in your Microsoft Outlook calendar, colour-coding can help. Here’s how to add it: – From the main calendar view, right click on an appointment, meeting, or event in your calendar, select ‘Categorize’ and select a colour category. […]
Tech News : Fewer Cookie Pop-Ups – But At What Cost?
A government Bill has laid out a new UK data protection regime (which diverges from EU regulations) and which the government says will ease the burden of compliance on businesses. Data Reform Bill The government says that the ‘Data Reform Bill’, announced in this year’s Queen’s Speech, and outlined as part of London Tech Week, […]
Tech News : Regulations Dictate More Action Needed On Fake Content
A Strengthened EU ‘Code of Practice on Disinformation’ will require big tech companies to take more action to ensure that purveyors of disinformation do not benefit from advertising revenues. Broader Range Of Commitments The strengthened ‘Code of Practice on Disinformation’ will aim to achieve the objectives of the European Commission’s Guidance presented in May 2021, […]
Tech-Insight : What Is ‘Data Gravity’?
In this insight, we look at what ‘data gravity’ is, what challenges it creates, and some ways in which businesses can tackle data gravity challenges. What Is Data Gravity? Working with (larger) datasets means the need to collect, store and manage the data and move it around to different applications. The data then accumulates (builds […]
Featured Article : Internet Explorer is Dead. Long Live The King?
Microsoft’s Internet Explorer browser has been retired after 27 years and here we take a brief look back over its history and why it fell behind competitors before being succeeded by Microsoft Edge. It Came From ‘Mosaic’ Microsoft first launched its Internet Explorer (IE) browser in 1995. The browser was built under license to Microsoft […]
Tech Tip – Sending WhatsApp ‘View Once’ Messages
If you want to add an extra layer of privacy to sending a photo or video in WhatsApp (e.g. a photo of a password), adding a “view once” designation before sending the message means that the photo or video will disappear as soon as the recipient has opened the message and exited the media viewer. […]
Security Stop-Press : Facebook Phishing Scam
Security company PIXM has warned of a Facebook scam, active since Q4 2021, which has ensnared nearly 10 million users. The credential harvesting scam uses a fake Facebook login page. When a user logs in, the threat actor gets their credentials and can then use an automated program to send out the link to the […]