IT & Security News

anti5g

‘Anti-5G’ Radiation-Emitting Jewellery Banned

A recent study has led to a warning from the Dutch authorities to anti-5G merchandise wearers that a list of ‘negative ion’ jewellery items should not be worn because they emit ionizing radiation. What Is Negative-Ion Jewellery? Negative ion jewellery describes jewellery items (e.g. bracelets and pendants) which have a small quantity of ion-generating minerals…

insight

What Is A Password Manager?

In this tech insight, we look at challenges to using passwords, what password managers are, and why they are still so important. The Limitations and Challenge of Passwords Passwords have long provided a practical way to log in to websites, platforms, apps and other access gateways yet using passwords comes with many limitations and challenges,…

featured

What’s All the Fuss About Julian Assange?

In this article, we take a look at some of the main details of the case of WikiLeaks and Julian Assange, and what can be learned from this ongoing battle between Assange and the US government, whose secrets his website shared. Who Is Julian Assange? Julian Assange is 50-year-old Australian editor, publisher and activist who…

teams-app

Teams App Blocked Emergency Call

It was recently discovered that a bug in the Pixel 3 phone meant that users who had the Teams app installed (even though they weren’t logged in) couldn’t call the US emergency 911 number. What Happened? A Reddit user reported that they had needed to call an ambulance for their grandmother who appeared to be…

a-peek-at

A Peek at Metaverse

Meta (Facebook) has released a social VR experience called ‘Horizon Worlds’, giving users the first real look at the ‘Metaverse’ described by Mark Zuckerberg in the company’s recent re-brand announcements. What Is Horizon Worlds? Horizon Worlds (which launched via invite-only in beta last year) is a free, virtual space app that has been built with…

insight

Email Security

In this tech insight, we take a look at the many threats to email security that businesses face and what businesses can do to mitigate them, together with what help is available to help tackle those threats effectively. Email Accounts For Most Security Breaches Prioritising email security is important because most cyber-security breaches involve email,…

featured

A Business Continuity Plan : The Essentials

In this article, we take a look at what a Business Continuity Plan is, what it should contain, and why it’s such an important document. Preparing Accepting that the unexpected and disasters will happen (and that you can plan how to maintain business continuity while you deal with them) is an important step in safeguarding…

worlds-first

World’s First “Living Robots” Can Now Reproduce

US-based scientists have reported creating “living robots” that can now re-produce. Next Step From Last Year Last year, a team of US scientists reported creating ‘living robots’ which were actually bundles of stem cells from African clawed frogs. The researchers discovered that they could ‘program’ these cells to accomplish certain tasks, hence the robot comparison.…

twitter

Twitter Bans Sharing ‘Private’ Images & Video Without Consent

In a change to its Private Information Policy, Twitter has banned the sharing of personal media, such as images or videos without the subject’s consent. Why? Twitter says that as part of its ongoing work to align its safety policies with human rights standards, it needs to take action to tackle the possible misuse of media and…

Ethical Phones and Computers

In this article, we look at what ethical phones and computers are, what makes them ‘ethical’ and what contribution they could be making to helping the environment by tackling issues such as the growing e-waste mountain. Tackling E-Waste The world currently has a significant problem with electronic waste in terms of a “take, make, consume, dispose” attitude,…

[grid_plus name="Tech News"]