How ‘Dark Mode’ Can Help

If you’ve heard about (or already use) ‘dark mode’ for apps and devices but don’t know much about it, here’s a look at why it has been introduced, whether it delivers real benefits, and how to turn on dark mode in different operating systems and apps. What Is Dark Mode? Dark mode/dark theme/night mode is […]

Continue reading


Featured Article – Email Security (Part 2)

Following on from last month’s featured article about email security (part 1), in part 2 we focus on many of the email security and threat predictions for this year and for the near, foreseeable future. Looking Forward In part 1 of this ‘Email Security’ snapshot, we looked at how most breaches involve email, the different […]

Continue reading


Apple’s Adapter Recall Over Shock Risk

Tech giant Apple has recalled two different types of plug adapter because of a possible risk of electric shock. Which Adapters? The affected plugs are the two-prong AC wall plug adapter that came with Macs and some iOS devices between 2003 and 2010, and the three prong plug that was included with Apple’s World Travel […]

Continue reading


Free VPN Tools May Be Linked To China

A new investigation by Metric Labs of the top free VPN (Virtual Private Network) apps in Apple’s App Store and Google Play has revealed that more than half are run by companies with Chinese ownership. What’s A VPN? A ‘Virtual Private Network’ (VPN) is generally used to keep internet activity private, evade censorship / maintain […]

Continue reading


Apple Offers Free Repairs For iPhone X and MacBook Problems

Apple Inc is reported to be offering free repairs / replacements for problems relating to screen touch issues on the iPhone X and data loss and storage drive failures in 13-inch MacBook Pro computers. iPhone X Problems The offer of free fixes in the iPhone X handset, which was only released last November and was […]

Continue reading


IBM Security Expert Says Prepare For Quantum

As businesses come to realise that they may be required to store some data for decades, encrypted data should be secure well beyond its useful life, and with this in mind, security architect for Benelux at IBM, Christiane Peters, is suggesting that businesses should start preparing now to implement post-quantum data protection. Post What? The […]

Continue reading


Blurring of Personal and Business Technology Cause For Concern

A report by CCS Insight showing how three-quarters of employees are forced to install work software on their personal mobile devices has highlighted how the increased blurring of personal and business technology is causing concern. Objections The report, which took into account the views of 672 employees across the US and Western Europe about digital […]

Continue reading


How Business Emails Are Vulnerable

Research by digital risk management and threat intelligence firm Digital Shadows has revealed that company credentials and emails that can be easily accessed on the web are making it easier for cyber-criminals to target businesses with attacks. What’s Are The Problems? According to the research, businesses may be suffering targeted attacks because several key problems […]

Continue reading


Chrome Extensions Get Security, Privacy and Performance Boost

Following the introduction last month of Google Chrome 69’s better password protection, Google has announced that Chrome 70 will bring trustworthy extensions by default. What Are Extensions? The Chrome extension system, introduced to the browser nearly a decade ago, has enabled the introduction of 180,000 different extensions which are small, bolt-on software programs that allow […]

Continue reading