IT & Security News
Email Security
In this tech insight, we take a look at the many threats to email security that businesses face and what businesses can do to mitigate them, together with what help is available to help tackle those threats effectively. Email Accounts For Most Security Breaches Prioritising email security is important because most cyber-security breaches involve email,…
A Business Continuity Plan : The Essentials
In this article, we take a look at what a Business Continuity Plan is, what it should contain, and why it’s such an important document. Preparing Accepting that the unexpected and disasters will happen (and that you can plan how to maintain business continuity while you deal with them) is an important step in safeguarding…
World’s First “Living Robots” Can Now Reproduce
US-based scientists have reported creating “living robots” that can now re-produce. Next Step From Last Year Last year, a team of US scientists reported creating ‘living robots’ which were actually bundles of stem cells from African clawed frogs. The researchers discovered that they could ‘program’ these cells to accomplish certain tasks, hence the robot comparison.…
Twitter Bans Sharing ‘Private’ Images & Video Without Consent
In a change to its Private Information Policy, Twitter has banned the sharing of personal media, such as images or videos without the subject’s consent. Why? Twitter says that as part of its ongoing work to align its safety policies with human rights standards, it needs to take action to tackle the possible misuse of media and…
Ethical Phones and Computers
In this article, we look at what ethical phones and computers are, what makes them ‘ethical’ and what contribution they could be making to helping the environment by tackling issues such as the growing e-waste mountain. Tackling E-Waste The world currently has a significant problem with electronic waste in terms of a “take, make, consume, dispose” attitude,…
Security Stop-Press : GoDaddy “Security Incident” Could Affect 1.2 Million
In this week’s security update, GoDaddy has reported a hack/data-breach on its managed WordPress hosting service which could mean that the details of 1.2 million users may have been exposed. Reports indicate that an intruder gained access on Nov 17 by using a stolen password. GoDaddy says that it has blocked the unauthorised third-party from its system,…
How To Know If Someone Has Read Your Email?
In this tech insight, we take a look at the better-known ways of being able to tell if someone has read your email. The Usual Suspects The main ways to tell if a person has read your email include: – Request a read receipt when you compose the email. The read receipt is then sent…
Digital Markets Act Could Protect Whistleblowers
The EU’s adoption of a proposal on the Digital Markets Act (DMA) on Tuesday not only offers the potential to help tackle the market dominance of big tech businesses but could also protect whistleblowers. What Is The Digital Markets Act? Currently at the proposal stage, the Digital Markets Act (DMA) from the European Commission is…
Self-Powered Mobile Masts Could Beat Remote Off-Grid Challenges
Vodafone’s announcement that it aims to deploy self-powered ‘Eco-Tower’ mobile masts across the UK could mean connections for remote areas as well as environmental benefits. Wind and Solar Powered The new masts will be self-powered, using wind turbine technology, combined with new solar and battery technologies developed through Vodafone working with renewable energy technology specialist Crossflow…
Hamster Crypto-Croaks
Max, a.k.a. “Mr Goxx”, the hamster that found Internet fame through outperforming many human cryptocurrency-traders, has died. Experiment With ‘Wheel’ Results The hamster’s life as a crypto trader was down to him being used as part of an experiment by an anonymous German lecturer and prototyping specialist duo who set out to demonstrate the randomness…
[grid_plus name="Tech News"]