Testimonials
Customer Service
IT Support
01234 300099

Blog

Security Stop Press : Bill Ackman Imposter Scam Warning

Billionaire hedge-fund manager, Bill Ackman’s Pershing Square Capital Management company has warned of the risks posed by recent Facebook ads impersonating Mr Ackman as part of an imposter fraud scam. Mr Ackman’s company says it has already discovered 90 different versions of the advert which lures people into clicking on the ad by using Mr Ackman’s photo and identity…

Read More

Sustainability-in-Tech : First For Energy-Saving Magnetic Levitation Train

Italian firm IronLev has claimed to have completed the first-ever magnetic levitation (maglev) test on an existing train track.  Energy Saving Potential  The use of maglev technology for trains is particularly valuable because, if scaled up, it has the potential to reduce costs and energy usage as the industry seeks more efficient systems. This is because, unlike traditional trains…

Read More

Tech Tip – Optimise Power Plans For Your Battery Life

Windows allows users to customise or switch between different power plans based on their current needs, balancing performance with energy consumption. This is especially useful for laptop users who may need to maximise battery life or require full performance during intensive tasks. Here’s how works: – Right-click on the battery icon in the taskbar and select Power Options, or…

Read More

Featured Article : TikTok Termination?

A recent US congressional vote means that TikTok and its parent company’s alleged ties with the Chinese Communist Party must be severed within six months or the popular TikTok app must be sold, thereby banning it in the US.  The Vote   The unanimous Energy and Commerce Committee vote (50-0) in favour of forcing TikTok’s parent company ByteDance to…

Read More

Tech Insight : DMARC Diligence (Part 2) : The Forgotten Domains : A Hidden Vulnerability

In this second article of the “DMARC Diligence” series, we shift our focus towards securing non-sending or “forgotten” domains and outline a strategy for their protection through DMARC implementation.  Recap Of Part 1  You may remember that in part one of this DMARC Due Diligence series of articles we laid the groundwork by exploring the essentials of the email…

Read More

Tech News : New Quantum Attack-Proof PCs

At its Annual Partner Conference 2024, HP announced the world’s first business PCs to protect firmware against quantum computer attacks.  This Issue  As highlighted by Global Risk Institute research, 27 per cent of experts think there is a 50 per cent likelihood of a cryptographically relevant quantum computer (CRQC) by 2033. HP says that “when that day comes, the security…

Read More

Tech News : Bitcoin Value Hits New High

With the famously volatile Bitcoin cryptocurrency briefly hitting a new all-time high value of $69,000 recently, we look at the reasons why this happened and what could happen next.  Why?  This latest surge in the value of Bitcoin has been attributed to US finance giants like Grayscale, BlackRock, and Fidelity investing billions of dollars into Bitcoin, thereby driving up…

Read More

An Apple Byte : Apple Fine and Sideloading

In two recent blows to Apple, it’s just been fined £1.5bn for breaking EU competition laws over music streaming, while its latest iPhone update means allowing developers to offer their own ‘app stores’.  The Fine  Following a complaint by Swedish music streaming service Spotify, Apple has been fined £1.5bn by the European Commission for abusing its market position by…

Read More

Security Stop Press : Wireless Chargers Phone Hack & Fry Threat

Researchers from the University of Florida have reported how VoltSchemer, a set of attacks that exploit two commonly found features in commercial-off-the-shelf wireless chargers (COTS), can give attackers control over a phone then enable man-in-the middle attacks. VoltSchemer attacks work by exploiting voltage noises from the power supply (electromagnetic interference) to manipulate wireless chargers without the need for any…

Read More

Sustainability-in-Tech : How Cheese Helped Extract Gold From E-Waste

ETH Zurich researchers have reported discovering an effective method for recovering gold from e-waste with the help of byproducts from the cheesemaking process.  Protein Fibre Sponge  The group of researchers, led by ETH Professor Mezzenga, have reported using a sponge made from a protein matrix (a cheesemaking byproduct) to extract gold from e-waste.  The protein matrix/protein fibre sponge was…

Read More