IT & Security News

insight

Tech Insight : How (Simple) 2FA is Being Beaten

In this article, we take a look at how two-factor authentication, introduced to help add an extra layer of security to logins, has its own vulnerabilities. What Is 2FA? Two-factor authentication (2FA) combines a username and password with another factor (e.g. sending an SMS or email with a code) to enable a person to login…

legal-bot

Legal Tech Advances

In this article, we take a brief look at the many different ways that technology is increasingly being used by legal professionals and by those seeking legal services, and how advancement such as AI are making a valuable contribution. DoNotPay DoNotPay (https://donotpay.com/), described as “the world’s first robot lawyer”, is an app/chatbot program that helps users…

delivery

Delivery Scams Top The ‘Smishing’ List

Data, published by trade association UK Finance for security provider Proofpoint, shows that parcel and package delivery scams are now the most common form of ‘smishing’ attempts. What Is Smishing? Smishing is where an attacker sends a text/SMS message purporting to be from a reputable company, in this case, the Royal Mail or a parcel…

biometrics-could

Biometric Data Could Assist the Taliban

Human Rights groups fear that the Taliban could soon be able to use collected biometric data to identify contractors and locals working with the US military. What Biometric Data? It has been reported that, over time, while on operations in Afghanistan, the US military collected biometric data such as fingerprints and retina scans using a…

featured

Apps & Zaps – Ideas For Automating Your Business

In this article, we look at how Zapier and other alternatives can be used to link apps together and create automated workflows that can carry out daily/weekly marketing tasks for you in the background while you get on with running your business. Zapier Zapier (https://zapier.com/) is a tool that can automate repetitive tasks between two…

insight

Tech Insight – What Is Web Accessibility?

In this article, we take a brief look at what Web accessibility is, and how it can benefit Web users and the businesses and organisations that make it a priority. What Is It? Web accessibility mean that websites, tools, and technologies are designed and made so that all people, regardless of their barriers, including those…

crypto-hackers

Crypto Hackers Return Most Of The $610 Million Crypto Cash

On 12 August, the Poly Network DeFi platform announced that, following the theft of $610 Million in digital coins, the hacker thieves had returned $342 million. However, it’s been reported that more recently, almost all of the stolen crypto has now been returned. The Hack The original theft, which had taken place just two days…

vofafone

Vodafone Introducing Roaming Charges From January

Vodafone has become the second big operator to announce the re-introduction of roaming charges in Europe for new and upgrading customers from January 2022. New, Upgrading, or Changing After 11 August 2021 New customers of the network, those upgrading, and those changing their call plans after 11 August will qualify for the new daily charges…

insight

Tech Insight: What Is Zero Trust?

With mobile computing, software-as-a-service (SaaS), and now remote working moving the focus of IT security away from the traditional perimeter, this article takes a brief look at what a ‘Zero Trust’ approach is and how it can help. More Complex Security Demands The belief among many IT security experts is that a traditional perimeter-based security…

featured-article

Have Computers Reached Their Limit?

Many tech commentators have noted how the stagnation in computing has led to ‘Moore’s Law’ being challenged, but has the shrinking of transistors within computer chips really hit a wall and what could be next for Moore’s Law? What Is Moore’s Law? Moore’s Law, named after Intel co-founder Gordon Moore, is based on his observation…

[grid_plus name="Tech News"]