Archive for February 2022
Featured Article : Firms Prepare For The Quantum Apocalypse
In this article, we look at what the ‘quantum apocalypse’ is, and what businesses are doing to prepare for this threat. What Is The Quantum Apocalypse? The so-called ‘quantum apocalypse’ refers to the unspecified point in the future where someone (e.g., threat actors or a foreign power) has a functioning quantum computer that can break…
Read MoreTech News : Damage Caused While Wearing VR Headsets Results in 31% Increase Insurance Claims
Insurer Aviva has highlighted how accidental damage caused by VR headset-wearing gamers caused a 31% jump in home contents claims in 2021. Average of £650 Aviva reports that the average VR-related claim for accidental damage in 2021 was about £650, for example for TVs that have been broken in the real world after gamers, immersed…
Read MoreTech Insight : Why Solid Black Bars May Be Best For Redacted Text
In this insight, we look at how to best to avoid redacted text from being ‘unredacted’ by certain software tools, and we look at what researchers advise based on recent experiments. The Problem For businesses and organisations, the increased need for data sharing and/or making some data public can mean that certain (sensitive) parts of…
Read MoreTech News : Ex School IT Technician Jailed For Cyber Attack
A sacked school IT Technician who took revenge by deleting data and sabotaging his old school’s network (and by wiping the computers of everyone who was logged in) has been jailed. Revenge Hack As reported on Leicestershire Live, a court was told that Adam Georgeson, 29, who was dismissed from his job as an IT…
Read MoreSecurity Stop-Press : Warning That MS Teams Is Being used To Spread Malware
Security firm Avanan has warned that Microsoft Teams users are being targeted by hackers who are attaching .exe files to Teams chats. These files put a Trojan on the end-user’s computer which is used to install malware, eventually leading to the user’s computer being taken over. The security advice is to use protection that downloads all files…
Read MoreTech News : European Oil Facilities Targeted By Cyber Attacks
In a worrying trend, oil facilities in Germany, Belgium and the Netherlands have all recently been targeted by cyber-attacks. Germany The attack on German oil, vehicle fuel and petroleum products company Oiltanking Deutschland GmbH & Co. KG happened just over a week ago. Some reports have suggested that the company’s systems were hit by ransomware,…
Read MoreTech News : Windows Updates Can Take 8 Hours
According to new research by a Microsoft program manager, it could take as long as 8 hours, connected to the Internet, for devices to fully download Microsoft updates. The Update Challenge – Time A blog post in Microsoft’s Tech Community by program manager David Guyer, highlighted how one important challenge for Microsoft is trying to…
Read MoreFeatured Article : What Are Disposable Emails?
In this article, we look at what disposable email addresses are, their benefits and disadvantages, and we look at a few examples of disposable email address services. What Are Disposable Email Addresses? Disposable / temporary email addresses (DEA), also known as ‘burner’ email addresses, are (mostly free) services that allow the user to set up…
Read MoreTech Insight : Some Unmissable Chrome Extensions
In this tech insight, we look at what Chrome extensions are and how to access them, then we look at 10 examples of popular and useful Chrome extensions. What Are Chrome Extensions? Extensions for Google’s Chrome browser are software programs, built using technologies like HTML, CSS, and JavaScript that give Chrome more functionality and enable…
Read MoreSecurity Stop-Press : Phish Kits That Can Beat Multi-Factor Authentication
Enterprise security company, Proofpoint, has warned that cyber criminals have found a way to beat multi-factor authentication by using phish kits. The kits leverage transparent reverse proxy, enabling them to man-in-the-middle (MitM) a browser session, steal the multi-factor authentication tokens, and bypass this trusted layer of security.
Read More