Where Are We At With VR These Days?

In this insight, we look at where Virtual Reality (VR) is now, plus what predictions there are for its future.  Potted History  Virtual Reality (VR) is a simulated and fully immersive experience that obscures the natural world, which is used for entertainment, education and business. The very first VR headset / head-mounted display (HMD) dates…

Read More
Recording Calls On Your Mobile

In this article, we look at the legal issues around recording calls on your mobile, and the different methods for doing so.  Is It Legal To Record Phone Calls On Your Mobile?  In the UK, as an individual mobile phone user, generally speaking, secretly recording a conversation is not a criminal offence and is not…

Read More
What Are 'Toxic' Backlinks?

In this tech insight, we look at what ‘toxic’ backlinks are, how to identify them, and how to remove them.  Backlinks Backlinks (incoming links) are believed to be one of Google’s top three ranking factors. Trustworthy backlinks from websites with a high authority score are a factor which contribute to higher search engine rankings. However,…

Read More

In this insight, we look at how Stephen Wilhite invented the GIF file, and how his invention has endured while the Internet has undergone vast changes.  Who Was Stephen Wilhite?  Stephen Wilhite is regarded as one of the inventors who changed the face of the Internet. White worked at CompuServe in the 1980s. Founded in…

Read More

In this article, we take a brief look at what agile working is, plus how technology contributes to it.  Agile   Agile working refers to the idea of connecting processes, people, technology, time, and place to create a dynamic workforce. By giving workers the freedom and maximum flexibility to work where and when they want, thereby minimising…

Read More
Why Solid Black Bars May Be Best For Redacted Text

In this insight, we look at how to best to avoid redacted text from being ‘unredacted’ by certain software tools, and we look at what researchers advise based on recent experiments.  The Problem  For businesses and organisations, the increased need for data sharing and/or making some data public can mean that certain (sensitive) parts of…

Read More
How to Avoid Being “Doxxed”

In this article, we look at what doxxing is, some examples of doxxing, and what can be done to protect ourselves and our businesses from being ‘Doxxed’. What Is Doxxing? Doxing is a 90s hacker term meaning for dropping (personal) dox where ‘dox’ is a slang term for documents. Doxxing is a malicious act where…

Read More
What Is A 'Watering Hole' Attack?

In this tech insight, we look at what a watering hole attack is, some examples of such attacks, and how businesses can defend against this threat. Poisoning The Water A watering hole attack is a targeted, ‘supply chain,’ cyber-attack strategy, similar to spear phishing. With this strategy, the attacker identifies a website that’s frequented by…

Read More

In this article, we take a look at some of the ways users can assess how good their VPN really is. What Is A VPN? A ‘Virtual Private Network’ (VPN) is used to keep internet activity private, evade censorship / maintain net neutrality and use public Wi-Fi securely (e.g., avoid threats such as ‘man-in-the-middle’ attacks).…

Read More