IT & Security News
Ex School IT Technician Jailed For Cyber Attack
A sacked school IT Technician who took revenge by deleting data and sabotaging his old school’s network (and by wiping the computers of everyone who was logged in) has been jailed. Revenge Hack As reported on Leicestershire Live, a court was told that Adam Georgeson, 29, who was dismissed from his job as an IT…
How Microsoft Will Block Macros To Stop Malware
Microsoft recently announced that it will be blocking Visual Basic for Applications (VBA) macros by default as a way to stop the spread of malware. Since these macros are important automation tools for Microsoft Office apps, how is this going to work? What Are Visual Basic for Applications (VBA) Macros? Visual Basic for Applications (VBA)…
What Is The Online Safety Bill?
Following recent announcements of a toughening-up of the (draft) Online Safety Bill, we look at what the bill is, and what its implications are. What Is The Online Safety Bill For? The UK government’s Online Safety Bill is (draft) legislation that’s designed to place a ‘duty of care’ on internet companies which host user-generated content in…
Protected: £23 Million For AI And Data Science Scholarships
There is no excerpt because this is a protected post.
‘Adult’ Websites Will Be Legally Required To Verify Age
Under the the draft Online Safety Bill legislation, adult websites (i.e. pornographic) site operators will be legally required to verify the age of website visitors or face tough penalties. Online Safety Bill For those who run commercial porn sites, the bill, which expected to be introduced to parliament in the next few months, looks likely…
Some Unmissable Chrome Extensions
In this tech insight, we look at what Chrome extensions are and how to access them, then we look at 10 examples of popular and useful Chrome extensions. What Are Chrome Extensions? Extensions for Google’s Chrome browser are software programs, built using technologies like HTML, CSS, and JavaScript that give Chrome more functionality and enable…
What Are Disposable Emails?
In this article, we look at what disposable email addresses are, their benefits and disadvantages, and we look at a few examples of disposable email address services. What Are Disposable Email Addresses? Disposable / temporary email addresses (DEA), also known as ‘burner’ email addresses, are (mostly free) services that allow the user to set up…
Windows Updates Can Take 8 Hours
According to new research by a Microsoft program manager, it could take as long as 8 hours, connected to the Internet, for devices to fully download Microsoft updates. The Update Challenge – Time A blog post in Microsoft’s Tech Community by program manager David Guyer, highlighted how one important challenge for Microsoft is trying to…
European Oil Facilities Targeted By Cyber Attacks
In a worrying trend, oil facilities in Germany, Belgium and the Netherlands have all recently been targeted by cyber-attacks. Germany The attack on German oil, vehicle fuel and petroleum products company Oiltanking Deutschland GmbH & Co. KG happened just over a week ago. Some reports have suggested that the company’s systems were hit by ransomware,…
How to Avoid Being “Doxxed”
In this article, we look at what doxxing is, some examples of doxxing, and what can be done to protect ourselves and our businesses from being ‘Doxxed’. What Is Doxxing? Doxing is a 90s hacker term meaning for dropping (personal) dox where ‘dox’ is a slang term for documents. Doxxing is a malicious act where…
[grid_plus name="Tech News"]