Testimonials
Customer Service
IT Support
01234 300099

Ransomware Payouts Tripled Last Year

Condemnation For Facebook After Blocking News

The Ransomware Threat Report 2021 from Unit 42 shows that the average amount paid by ransomware victims tripled from 2019 to 2020. Ransomware Ransomware is a form of malware that encrypts the important files on a computer and the user (often a business/organisation) is given a ransom demand, the payment of which should mean that the encrypted files can…

Read More

Two ISPs Helped Secret Government Web Spying

Using the Investigatory Powers Act of 2016, it has been reported that a recent government test of tracking users’ web histories has been helped by two ISPs. The Investigatory Powers Act The Investigatory Powers Act 2016 (also known as the ‘Snooper’s Charter’) became law in the UK in November 2016. It was designed to extend the reach of state…

Read More

Featured Article: Google Killing 3rd Party Cookies

Laptop Repairs

As Google has announced an end to third-party cookies, we look at the issues that have led to the decision, and at what may replace these cookies. The Difference Between First and Third-Party Cookies A cookie is a piece of code (used for tracking) that takes the form of a small text file that is stored on the browser…

Read More

AI ‘LitterCam’ Target Motorists Who Throw Rubbish From Cars

Laptop Repairs

The first UK pilot scheme using CCTV to specifically target motorists who throw litter from their cars will shortly begin in Maidstone, Kent. LitterCam The Maidstone Borough Council is enlisting the help of LitterCam technology, which uses AI to remotely detect vehicle-based littering, and number plate recognition to identify cars involved in littering. LitterCam is a third party, private…

Read More

Google Alerts Used In Malware Scam

It has been reported that hackers have been able to spread malware using fake news stories via the Google Alerts service. Google Alerts Launched in 2003, Google Alerts is Google’s content change detection and notification service which sends emails to a user when it finds new results (e.g. web pages, newspaper articles, blogs) that match the search terms that…

Read More

Coronavirus Lockdown Increases ‘Romance Fraud’

UK Finance and Action Fraud have both reported increases in fraud related to romance scams over the lockdown period. What Is Romance Fraud? Romance fraud/romance scams refers to fraudsters adopting fake personas online in order to fool a victim into thinking they are in a serious romantic relationship with the aim of convincing the victim to send money (e.g….

Read More

Featured Article: Emotnet: A Million Bucks per Incident

In the light of a reported recent victory by Europol in trying to stop the particularly dangerous Emotet malware, we look at what it is, how it is spread, and how to try and guard against it. What Is Emotet? Emotet is a computer malware program, believed to be Russian in origin, that was originally developed in the form…

Read More

Amazon AI Cameras Prompt “Mobile Surveillance” Privacy Row

The fact that Amazon has started using AI-powered cameras in delivery vans that constantly record footage of drivers has led to accusations of mobile corporate surveillance. Cameras The Driveri combined video recording and AI cameras have been introduced to the cab of Amazon delivery vans to record drivers with the stated intention of helping to improve driving.  The system…

Read More

Grindr in Norway Fined £8.5M

The LGBTQ+ dating app Grindr in Norway was issued an £8.5m penalty for the alleged sharing of users’ sensitive personal data with third-party advertisers without obtaining appropriate consent.  Complaint The fine is the result of a legal complaint by the Norwegian Consumer Council (Forbrukerrådet) last year, where it expressed concern that users of the app may not have been…

Read More

Featured Article – What is Zero Trust?

With mobile computing, software-as-a-service (SaaS), and now remote working moving the focus of IT security away from the traditional perimeter, this article looks at what a Zero Trust approach is and how it can help. More Complex Demands The belief among many IT security experts is that a traditional perimeter-based security approach may no longer be enough to cope…

Read More