IT & Security News

Windows Updates Can Take 8 Hours

Windows Updates Can Take 8 Hours

According to new research by a Microsoft program manager, it could take as long as 8 hours, connected to the Internet, for devices to fully download Microsoft updates. The Update Challenge – Time A blog post in Microsoft’s Tech Community by program manager David Guyer, highlighted how one important challenge for Microsoft is trying to…

European Oil Facilities Targeted By Cyber Attacks

European Oil Facilities Targeted By Cyber Attacks

In a worrying trend, oil facilities in Germany, Belgium and the Netherlands have all recently been targeted by cyber-attacks. Germany The attack on German oil, vehicle fuel and petroleum products company Oiltanking Deutschland GmbH & Co. KG happened just over a week ago. Some reports have suggested that the company’s systems were hit by ransomware,…

How to Avoid Being “Doxxed”

How to Avoid Being “Doxxed”

In this article, we look at what doxxing is, some examples of doxxing, and what can be done to protect ourselves and our businesses from being ‘Doxxed’. What Is Doxxing? Doxing is a 90s hacker term meaning for dropping (personal) dox where ‘dox’ is a slang term for documents. Doxxing is a malicious act where…

Study Shows No-One Is Immune From Phishing

Study Shows No-One Is Immune From Phishing

A new report from F-Secure has revealed that the most technically competent staff are just as likely (if not more likely) to fail a phishing test exercise. Phishing Phishing attacks typically involve sending emails that appear to come from a legitimate company/organisation (e.g., a bank) in order to gain an individual’s confidence, so that the…

Google Change Stance Over Legacy G Suite Account

Google Changes Stance Over Legacy G Suite Account

Google has offered new alternative options to free Legacy G Suite account holders who it had previously said would have to upgrade to a paid subscription by 1 July. What Is A Legacy G Suite Account? Google’s free edition of G Suite, known as Workspace, was first made available to businesses, organisations, and schools from…

Cryptocurrency for money laundering

30% Rise In Crypto-Laundering

A report by blockchain data platform ‘Chainalysis’ has shown a 30 per cent increase in cryptocurrency being used for money laundering in 2021 compared to the previous year. $8.6 Billion The 2022 Crypto Crime Report noted how cybercriminals laundered a massive $8.6 billion worth of cryptocurrency in 2021. The figure was arrived at by compiling…

UK Government ‘Help to Grow’ Scheme : Software And Free Business Advice

Tech News : UK Government ‘Help to Grow’ Scheme : Software And Free Business Advice

The UK government has just announced the launch of its ‘Help to Grow’ digital scheme which offers discounted software and free advice to small businesses. Applications Open Now The Help to Grow scheme is designed to support smaller businesses in adopting digital technologies to help them to grow. Applications for the scheme opened on 20…

Google Gives Upgrade Deadline For Legacy G Suite Accounts

Tech News : Google Gives Upgrade Deadline For Legacy G Suite Accounts

Google has announced in an email that users with legacy (old) free G Suite accounts have until 1 July to upgrade to paid subscriptions or lose access to most services. Ten Years Free Google has said that legacy G Suite users i.e., those who have been able to use their custom domain accounts for free…

What Is A 'Watering Hole' Attack?

Tech Insight : What Is A ‘Watering Hole’ Attack?

In this tech insight, we look at what a watering hole attack is, some examples of such attacks, and how businesses can defend against this threat. Poisoning The Water A watering hole attack is a targeted, ‘supply chain,’ cyber-attack strategy, similar to spear phishing. With this strategy, the attacker identifies a website that’s frequented by…

How To Stop Your Emails From Ending Up In Spam Filters

Featured Article: How To Stop Your Emails From Ending Up In Spam Filters

In this article, we look at how spam filers work and what can be done to ensure that our legitimate emails reach their target and aren’t wrongly filtered out as ‘spam’ . Why We Need Spam Filters Although we’re focusing on how to avoid spam filters, it’s worth noting how important they are to businesses.…

[grid_plus name="Tech News"]