Category: Security

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

Google Announces New ‘Teachable Machine 2.0’ No-Code Machine Learning Model Generator

Two years on from its first incarnation, Google has announced the introduction of its ‘Teachable Machine 2.0’, a no-code custom machine learning model generating platform that can be used by anyone and requires no coding experience. First Version Back in 2017, Google introduced its first version of Teachable Machine which enabled anyone to teach their computer…
Read more

Scale of Police Computer Misuse Uncovered

A Freedom of Information (FoI) request made by think tank Parliament Street has revealed that 237 serving officers and members of staff have been disciplined for computer misuse in the last two financial years. Sackings and Resignations The FOI request, which was responded to by 23 forces also revealed that 6 employees resigned and 11…
Read more

‘Moore’s Law’ and Business Innovation Challenged By Slow-Down In Rate of Processing Power Growth

Many tech commentators have noted a stagnation or slow-down period in computing-related to ‘Moore’s Law’ being challenged, but has the shrinking of transistors within computer chips really hit a wall and what could drive innovation further? What Is Moore’s Law? Moore’s Law, named after Intel co-founder Gordon Moore, is based on his observation from 1965…
Read more

BBC Puts News On ‘Dark Web Browser’ To Avoid Censorship

The BBC has announced that it is making its International news website available via the ‘Tor’ browser (usually associated with the ‘dark web’), in order to get around censorship in other countries. Blocking by Some Countries The BBC is concerned that countries including China, Iran and Vietnam have tried to block access to its website…
Read more

Office 365 Voicemail Phishing Scam Warning

Security company McAfee has reported observing a phishing scam which uses a fake voicemail message to lure victims into entering their Office 365 email credentials into a phishing page. How The Attack Works According to McAfee’s blog, the first step in the phishing scam is the victim being sent an email informing them that they…
Read more

ICO Warns Police on Facial Recognition

In a recent blog post, Elizabeth Denham, the UK’s Information Commissioner, has said that the police need to slow down and justify their use of live facial recognition technology (LFR) in order to maintain the right balance in reducing our privacy in order to keep us safe. Serious Concerns Raised The ICO cited how the…
Read more

Businesses Not Prepared For IR35 Tax Reforms

A poll by recruitment firm Hays appears to show a lack of awareness about preparedness for next year’s new IR35 tax reforms for medium-to-larger private sector organisations. What Is IR35? The IR35 tax reform legislation, set to be introduced in April 2020 is designed to stop tax avoidance from ‘disguised employment’, which occurs when self-employed…
Read more

“Stalkerware” Partner-Spying Software Use Rises By 35% In One Year

Kaspersky researchers have reported a 35 per cent rise in the number of people who have encountered the use of so-called ‘stalkerware’ or ‘spouseware’ software in the first 8 months of this year. What is Stalkerware? Stalkerware (or ‘spouseware’) is surveillance software that can be purchased online and loaded onto a person’s mobile device. From…
Read more

Tough Questions About Libra Cryptocurrency

Facebook’s CEO, Mark Zuckerberg faced a grilling from the US Congress last week over his company’s ‘Libra’ cryptocurrency plans. Libra ‘Libra’ is Facebook’s new cryptocurrency and global payment system that’s due to be launched in 2020.  Unlike other cryptocurrencies, Libra is backed by a reserve of cash and other liquid assets.  The idea of Libra…
Read more

Google Leadership Accused Of Developing Internal Surveillance Tool

Some Google employees have accused the company’s leadership of developing a browser-based file extension for all of Google’s in-house computers that could flag-up signs of workers trying to organise meetings and protests. Google Employees The story came to light in a memo written by a Google employee that is reported to have been seen and…
Read more