In this article, we look at how the risks to businesses posed by pirated software can far outweigh the benefits of using it, and how you can protect your business from the true costs of pirated software.Â
Read MoreCyber Security
Climate Change Affecting Data Centres
A Google data centre going offline in July due to a cooling related failure is just one of a slew of challenges posed by climate change that the big tech companies are facing. Heatwave Knocks London Data Centre Offline The heatwave in July caused outages due to cooling problems at […]
Read MoreHow To Fake Someone’s Voice
Following recent security concerns about Amazon’s plans to enable Alexa to mimic voices, we look at how easy it is to do, what the benefits are, and what risks it poses. Alexa The Mimic Recently, Amazon announced that it was working on technology to enable its Alexa digital assistant to […]
Read MoreHow Good Are Chatbots Now?
Following the recent story about how a Google Bot was reported to have said things that a sentient being may say, we take a brief look at how good chatbots are now. What Happened? Google engineer, Blake Lemoine, recently reported that The Language Model for Dialogue Applications (LaMDA ) AI […]
Read MoreRussia Cautions Cyber Attacks May Start Military Confrontation
The growing number of cyber-attacks since the start of Russia’s war against Ukraine have led The Russian Foreign Ministry to warn that more western cyber-attacks on its infrastructure could lead to a direct military confrontation.
Read MoreApple, Google and Microsoft In Password Collaboration
Apple, Google and Microsoft have announced that they are joining forces to support a common passwordless sign-in standard that will allow websites and apps to offer consistent, secure and easy sign-ins across devices and platforms. Â
Read MoreTracking What Happens To Attachments After They’re Sent
In this article, we look at how there are several risks and challenges associated with sending email attachments, how businesses can track emails, and about a new product that could allow greater visibility and control of what happens to email attachments after they’ve been sent. What Happens When Emails With […]
Read MoreMore Control To Remove Personal Data From Google Searches
Google has announced that it is changing its policies to allow more types of personally identifiable information removal requests. Personal Information Showing Up In Google Search Google acknowledges that personally identifiable information of some users can and does show up in Google search queries. This can make users concerned, e.g. […]
Read MorePegasus Spyware Discovered In Downing Street
The University of Toronto’s Citizen Lab has reported finding evidence that Pegasus spyware was being used to listen-in on UK government networks for 10 Downing Street and the Foreign and Commonwealth Offices (FCO) in 2020 and 2021. Pegasus Pegasus spyware is sold by Israeli-based NSO Group to governments to carry […]
Read More1000+ ‘Deepfakes’ On LinkedIn
Researchers from the Stanford Internet Observatory have reported finding more than one thousand ‘virtual’ employees on the LinkedIn platform.Â
Read More