5G Explained

Whereas most carriers use low-band spectrum or LTE, which offers great coverage area and penetration, it is getting very crowded, and peak data speeds only top out at around 100Mbps. 5G, on the other hand, offers 3 different Spectrum bands, which are: Low-band spectrum or LTE.Mid-band spectrum.  This gives faster coverage and better latency than […]

Continue reading


70% Increase In DDoS Cyber Attacks On Black Friday Prompts Christmas Warning

Cyber security experts are warning companies with online shops to have adequate protection against DDoS attacks in place after a 70% increase in that kind of cyber-attack was recorded on Black Friday. What Is A DDoS Attack? A denial-of-service attack is a cyber-attack on that is intended to make a computer or network unavailable to […]

Continue reading


Mobile Networks Faster Than Wi-Fi

A report by OpenSignal has highlighted how the fact that smartphone users in 33 countries get faster average download speeds using a mobile network than Wi-Fi means that mobile operators and smartphone makers need to ensure that consumers’ smartphones aren’t simply pushed onto a Wi-Fi network, only to receive a worse experience than the mobile […]

Continue reading


Business Concerns Over ‘Secondary Data’

A study by data protection and management company ‘Cohesity’ has shown that most companies store up to 10 copies of their ‘secondary data’ in different locations and must use multiple products to manage it. The Problem With Secondary Data Secondary data (not production data) e.g. all the data that a company collects from other sources […]

Continue reading


Free VPN Tools May Be Linked To China

A new investigation by Metric Labs of the top free VPN (Virtual Private Network) apps in Apple’s App Store and Google Play has revealed that more than half are run by companies with Chinese ownership. What’s A VPN? A ‘Virtual Private Network’ (VPN) is generally used to keep internet activity private, evade censorship / maintain […]

Continue reading


Jail For Car Accident Data Thief

An employee at a vehicle accident repair centre who stole the data of customers and passed it to a company that made nuisance phone calls has been jailed for 6 months following an investigation by the Information Commissioner’s Office (ICO). Used Former Co-Worker’s Login To Company Computer The employee of Nationwide Accident Repair Services, Mustafa […]

Continue reading


Fatal Security Flaws Discovered in Solid State Drives (SSDs)

Researchers from Radboud University in the Netherlands have released a paper highlighting several security flaws that they’ve discovered in SSDs which mean that data from a flash disk can recovered in more than one way, even if it’s supposedly self-encrypted. What Is An SSD? An SSD is a solid-state storage device that uses integrated circuit […]

Continue reading


IBM Security Expert Says Prepare For Quantum

As businesses come to realise that they may be required to store some data for decades, encrypted data should be secure well beyond its useful life, and with this in mind, security architect for Benelux at IBM, Christiane Peters, is suggesting that businesses should start preparing now to implement post-quantum data protection. Post What? The […]

Continue reading


Adult Site Visits on Work Computer Lead to Network Infection

The extensive online porn-accessing habit of an employee of a US government department known as the US Geological Survey (USGS) is being blamed for a government computer network becoming infected with malware. 9,000 Pages In an investigation, highlighted in a paper (published online) by the US Office of the Inspector General, it was discovered that […]

Continue reading