New Privacy Features For Android 12
Google has announced the release of the first beta of Android 12 which has a range of new features including some security measures which Google hopes can match those of Apple. Design Change Announced recently at a developer conference, and on Google’s blog, the addition of the new features to Android 12 mark the “biggest…
Read MoreGuarding Against The Rise In Router and VoIP Attacks
After a recent high profile media story highlighted how poor router security led to a police raid of the home of an innocent family, we take a look at how Wi-Fi piggybacking attacks against home and domestic targets, and VoIP hacking of businesses worldwide are growing threats. What Happened? It has been reported that in…
Read MoreTech Insight: What Is Patching or Patch Management?
In this article, we take a brief look at the importance of patch management in maintaining security. Patches and Patch Management Patches are the software fixes for known security vulnerabilities in software such as operating systems, third-party applications, cloud-platforms, and embedded systems. Patch management is the ongoing process of distributing and applying those important security…
Read MoreLife After Cookies
With Google recently committing to phasing out third-party cookies as Firefox and Safari have already done, we take a brief look at the possible alternatives and replacements for using cookies to track and understand user behaviour. Cookies Cookies are pieces of code/small text files used for tracking and stored on the browser of someone who…
Read MoreClubhouse For Android Launched In The UK
Drop-in audio conversation social network app ‘Clubhouse’ has launched its Android (beta) version for download in the UK. Clubhouse Android Launched In English-Speaking Countries San Francisco-based Clubhouse announced on May 9 that, starting in the U.S., and quickly following in other English-speaking countries, it was rolling out of the beta Android version of its popular…
Read MoreAI Keystroke Spy Tools
With AI recently in the spotlight in Europe over the need to regulate over some ‘unacceptable use’, some experts are warning of the threat of AI keystroke reading spy tools. Possibilities Companies like TypingDNA developing AI biometric verification (back in 2017) based on recognising the individual characteristics of how a person types, suggest that it…
Read MoreTech Insight – Business Intelligence
In this article we look at ‘business intelligence’, how it can be obtained, and why it’s important. Business Intelligence Business Intelligence refers to how a company/organisation can use its historical data to improving strategic decision-making and thereby provide a (hopefully sustainable) competitive advantage. What Data? In day-to-day operations, businesses and organisations generate, receive, gather, and…
Read More10 Programming Languages And Examples Of Their Uses
In this article, we take a brief look at ten popular programming languages and what they’re used for. Recent History What we would recognise as the first computer programming languages date back to the 1940s, were very specialised and were based on mathematical notation. The 1950s saw the development of the first compiled programming language…
Read MoreGoogle Users To Be Auto-Enrolled In Two-step Verification
In a recent blog post, Google has announced that the automatic enrolment of Google account users in Two Step Verification ‘2SV’ is coming soon. Passwords – Single Biggest Threat To Online Security In the blog post on ‘On World Password Day’ (May 6), Google’s Director of Product Management, Identity and User Security, Mark Risher, shared…
Read MoreOld Router Risks Could Affect Millions
An investigation by consumer watchdog ‘Which?’ has highlighted how millions of people around the UK are using old routers with security flaws. The Investigation The Which? investigation surveyed 6,000 UK adults and, with the help of Red Maple Technologies, looked at the security aspects of 13 models of (commonly used) old routers from companies such…
Read More