lock phone

Sharing Files That Self-Destruct

In this insight, we take a look at some of the many options…
September 15, 2022/by jon hyde
router

UK Broadband And Mobile Carriers Face Tough New Security Rules

The UK government’s Department for Digital, Culture, Media…
September 9, 2022/by jon hyde
code

The True Cost Of Using Pirated Software

In this article, we look at how the risks to businesses posed…
August 31, 2022/by jon hyde
laptop worker

Protect Yourself From Job Phishing Scams

In this article, we look at what ‘job phishing’ is, how…
August 25, 2022/by jon hyde

Tech Tip – How To Use Notepad To Test Your Antivirus

Here’s a simple tip using Notepad to check if your antivirus…
August 25, 2022/by jon hyde
matrix

Major NHS Supplier Hit By Ransomware Attack

Advanced, an IT supplier to the NHS, has been hit by a ransomware…
August 18, 2022/by jon hyde
lock

Pros and Cons of Weakening Encryption

With the Online Safety Bill threatening to undermine end-to-end…
August 12, 2022/by jon hyde
Alexa

How To Fake Someone’s Voice

Following recent security concerns about Amazon’s plans to…
July 14, 2022/by jon hyde
windows logo

New Windows Feature Displays Which Apps Have Been Listening-In

The new Privacy Auditing feature in Windows 11 allows users…
July 7, 2022/by jon hyde
photo

How Can You Protect Yourself From ‘Identity Theft’?

With identity theft and the resulting identity fraud becoming…
July 7, 2022/by jon hyde
hacker

Russia Cautions Cyber Attacks May Start Military Confrontation

The growing number of cyber-attacks since the start of Russia’s…
June 16, 2022/by jon hyde
laptop

New Spy-Spotting App From MI5

The UK government’s MI5-run ‘Centre for the Protection of…
May 26, 2022/by jon hyde