Free VPN Tools May Be Linked To China

A new investigation by Metric Labs of the top free VPN (Virtual Private Network) apps in Apple’s App Store and Google Play has revealed that more than half are run by companies with Chinese ownership. What’s A VPN? A ‘Virtual Private Network’ (VPN) is generally used to keep internet activity private, evade censorship / maintain […]

Continue reading


Apple Offers Free Repairs For iPhone X and MacBook Problems

Apple Inc is reported to be offering free repairs / replacements for problems relating to screen touch issues on the iPhone X and data loss and storage drive failures in 13-inch MacBook Pro computers. iPhone X Problems The offer of free fixes in the iPhone X handset, which was only released last November and was […]

Continue reading


IBM Security Expert Says Prepare For Quantum

As businesses come to realise that they may be required to store some data for decades, encrypted data should be secure well beyond its useful life, and with this in mind, security architect for Benelux at IBM, Christiane Peters, is suggesting that businesses should start preparing now to implement post-quantum data protection. Post What? The […]

Continue reading


Blurring of Personal and Business Technology Cause For Concern

A report by CCS Insight showing how three-quarters of employees are forced to install work software on their personal mobile devices has highlighted how the increased blurring of personal and business technology is causing concern. Objections The report, which took into account the views of 672 employees across the US and Western Europe about digital […]

Continue reading


How Business Emails Are Vulnerable

Research by digital risk management and threat intelligence firm Digital Shadows has revealed that company credentials and emails that can be easily accessed on the web are making it easier for cyber-criminals to target businesses with attacks. What’s Are The Problems? According to the research, businesses may be suffering targeted attacks because several key problems […]

Continue reading


Chrome Extensions Get Security, Privacy and Performance Boost

Following the introduction last month of Google Chrome 69’s better password protection, Google has announced that Chrome 70 will bring trustworthy extensions by default. What Are Extensions? The Chrome extension system, introduced to the browser nearly a decade ago, has enabled the introduction of 180,000 different extensions which are small, bolt-on software programs that allow […]

Continue reading


Apple Making One-Quarter Of Its Revenue From Deal With Ad Giant Google

Figures from Goldman Sachs appear to show that, even though Apple may publicly take the moral high ground and criticise digital advertising businesses, it may actually be making $9 billion this year, one-quarter of its estimated total revenue, from a deal with digital advertising giant Google. Opposition and Irony Apple has been famously vocal about […]

Continue reading


Mobile Working Causes Absenteeism

Research by B2M Solutions has concluded that instead of saving costs, mobile working could be costing UK businesses £1.18 billion per year, as 40% of mobile workers attribute time taken off work to stress and anxiety caused mainly by reliability issues with mobile devices. The Research The B2M Solutions ‘Mobile Impact Survey’ gathered the opinions […]

Continue reading


New Chrome 69 Creates Better Passwords, Among Other Features

Chrome 69, the latest version of the Google browser which is now 10 years old, has a number of value-adding new features, including the ability to automatically generate strong passwords. Improved Password Manager This latest version of Chrome has an improved password manager that is perhaps more fitting of the browser that is favoured by […]

Continue reading


Find Out What ‘Deep Fakes’ Are and Why They’re A Threat

Deep fakes are digitally manipulated videos that have been created using deep learning technology to make the subject of the video (often a famous person) say anything the video maker wants them to say, even incorporating the style and facial expressions of another person. Example An example here is a video that demonstrates the technique, […]

Continue reading