IT & Security News

New Privacy Features For Android 12
Google has announced the release of the first beta of Android 12 which has a range of new features including some security measures which Google hopes can match those of Apple. Design Change Announced recently at a developer conference, and on Google’s blog, the addition of the new features to Android 12 mark the “biggest…

Guarding Against The Rise In Router and VoIP Attacks
After a recent high profile media story highlighted how poor router security led to a police raid of the home of an innocent family, we take a look at how Wi-Fi piggybacking attacks against home and domestic targets, and VoIP hacking of businesses worldwide are growing threats. What Happened? It has been reported that in…

Tech Insight: What Is Patching or Patch Management?
In this article, we take a brief look at the importance of patch management in maintaining security. Patches and Patch Management Patches are the software fixes for known security vulnerabilities in software such as operating systems, third-party applications, cloud-platforms, and embedded systems. Patch management is the ongoing process of distributing and applying those important security…

Life After Cookies
With Google recently committing to phasing out third-party cookies as Firefox and Safari have already done, we take a brief look at the possible alternatives and replacements for using cookies to track and understand user behaviour. Cookies Cookies are pieces of code/small text files used for tracking and stored on the browser of someone who…

AI Keystroke Spy Tools
With AI recently in the spotlight in Europe over the need to regulate over some ‘unacceptable use’, some experts are warning of the threat of AI keystroke reading spy tools. Possibilities Companies like TypingDNA developing AI biometric verification (back in 2017) based on recognising the individual characteristics of how a person types, suggest that it…

Tech Insight – Business Intelligence
In this article we look at ‘business intelligence’, how it can be obtained, and why it’s important. Business Intelligence Business Intelligence refers to how a company/organisation can use its historical data to improving strategic decision-making and thereby provide a (hopefully sustainable) competitive advantage. What Data? In day-to-day operations, businesses and organisations generate, receive, gather, and…

10 Programming Languages And Examples Of Their Uses
In this article, we take a brief look at ten popular programming languages and what they’re used for. Recent History What we would recognise as the first computer programming languages date back to the 1940s, were very specialised and were based on mathematical notation. The 1950s saw the development of the first compiled programming language…

Google Users To Be Auto-Enrolled In Two-step Verification
In a recent blog post, Google has announced that the automatic enrolment of Google account users in Two Step Verification ‘2SV’ is coming soon. Passwords – Single Biggest Threat To Online Security In the blog post on ‘On World Password Day’ (May 6), Google’s Director of Product Management, Identity and User Security, Mark Risher, shared…

Old Router Risks Could Affect Millions
An investigation by consumer watchdog ‘Which?’ has highlighted how millions of people around the UK are using old routers with security flaws. The Investigation The Which? investigation surveyed 6,000 UK adults and, with the help of Red Maple Technologies, looked at the security aspects of 13 models of (commonly used) old routers from companies such…
[grid_plus name="Tech News"]