Testimonials
Customer Service
IT Support
01234 300099

Blog

Security Stop-Press : Beware Malicious WhatsApp Lookalike Apps

Kaspersky has warned users about the dangers of malicious WhatsApp knockoff apps YoWhatsApp and WhatsApp Plus. Although both appear to offer the same functionalities as the real WhatsApp, they are reported to be able to download the Triada Trojan to smartphones, and steal legitimate WhatsApp’s access keys, thereby giving attackers access to the user’s real WhatsApp account. The advice…

Read More

Tech Tip – Save Time In Gmail By Using ‘Smart Compose’

If you regularly use Gmail, switching-on ‘Smart Compose’ in your Gmail settings can enable time-saving predictive writing suggestions to appear as you compose an email. Here’s how to switch it on: – In Gmail, top right, click on the cog icon – Settings > See All Settings. – Scroll down and ensure ‘Smart Compose’ is toggled on. – While…

Read More

Tech News : 60-Sec AI Scan Now Predicts Your Heart Disease

A new AI-based 60-second retina scanning tool can predict a person’s risk of heart disease by looking at the veins and arteries in their eye.  Level Of Risk Revealed By Looking At Blood Vessels  The test findings of the new ‘Quartz’ tool, published in the British Journal of Ophthalmology, show that the AI software takes only 60 seconds to…

Read More

Tech News : Universal Charging Cable Gets EU Vote

Following a provisional agreement in June, the European Parliament has voted in favour of a law to ensure that all devices have a single universal charger.  Why?  Back in June, the EU Parliament highlighted the following reasons why having a single universal charger is necessary:  – Consumers currently face the inconvenience and costs of needing a different charging device…

Read More

Featured Article : Forget Hacking, What About Tracking?

In this article, we look at the many different ways we are being tracked online, plus which measures users can take to avoid being tracked.  Why Are We Being Tracked?  Internet tracking is used for a number of reasons, including:  – Improving user browser experiences on websites.  – For analytics to improve business performance and inform/feed-into marketing content strategies,…

Read More

Tech Insight : What Are ‘BEC Campaigns’?

What Are 'BEC Campaigns'?

In this insight, we look at what BEC campaigns are, their characteristics, together with what businesses can do to protect themselves from the threat of BEC campaigns.  What Is A BEC Campaign?  A business email compromise (BEC) campaign is a kind of text-based, impersonation, social engineering scam where, in most cases, the victim is forwarded an email threat that…

Read More

Security Stop-Press : Google Chrome’s Reported Security Issues

New research by Atlas VPN claims that Google’s Chrome browser has had 303 discovered vulnerabilities this year, and that an unusually high number of cumulative vulnerabilities have been spotted in the browser. The advice is to make sure that your browser is up to date, care is taken if choosing plugins, and to look out for potential phishing emails.

Read More

Tech Tip – Annotating, Signing, And Saving PDFs In Firefox

The release of Firefox 104 in August gave users the ability to annotate PDFs, e.g. sign PDFs directly in the browser, and save them. Here’s how: – Open a PDF in Firefox, i.e. drag it into the Firefox Window, or right click on the file and select ‘Open with’ and choose Firefox. – In the top right corner of…

Read More

Security Stop-Press : Biggest Cyber Hack In History – Australia’s ‘Optus’

A cyber-attack on Australian telecommunications provider, Optus, may have affected 10 million people, the equivalent of 40% of the country’s population! Customer data reported as stolen in the attack includes names, dates of birth, home addresses, phone, and email contacts, and even the passport and driving licence numbers of around 2.8 million people! Following the attack, a ransom request…

Read More