Category: GDPR

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

Police Crack Encrypted Network To Reach Crime Gangs

An international law enforcement operation has led to the cracking of the EncroChat Android phone network and the arrest of criminal gangs. The Network The France-based EncroChat network, which was discovered by the French National Gendarmerie in 2017, is an encrypted network for Android handsets with their GPS, camera and microphone functions disabled.  The handsets, which have reportedly…
Read more

New Edge Browser To All Windows 10 Users

The new, improved version of Microsoft’s Edge browser has been launched in an update to all Windows 10 users in a move that will give Google’s Chrome some competition. Available To Millions of Users In being made available via update to Windows 10 versions 1803, 1809,1903 and 1909, the new version of Edge (Edge replaced…
Read more

Facial Recognition Backlash

The recent killing of George Floyd by U.S. police appears to have been the catalyst for a backlash by tech companies such as Amazon and Microsoft who are banning the police from using facial recognition software until more regulations are in place. Problems Whilst facial recognition technology has benefits in terms of its possible impact…
Read more

NatWest’s Extra Layer of Behavioural Biometrics Security

In partnership with Visa, NatWest has added an invisible layer of behavioural biometrics as part of an authentication process that will enable compliance with a new EU regulation. Which Regulation? The Strong Customer Authentication (SCA) regulation, which is part of the EU’s Payment Services Directive 2 (PSD2) comes into force in 2021. The SCA regulation is intended to…
Read more

Facial Recognition, Photo Identity and Privacy Protection

With phone cameras, surveillance cameras with facial recognition seemingly everywhere and the world entering a new phase of social change, many people are looking at how they can take simple steps to retain and protect their privacy rights. Faces As enshrined in data protection laws, such as GDPR, and with biometrics now being used widely,…
Read more

New Tool Allows You To Bulk-Delete/Hide Old Facebook Posts

Facebook has announced the introduction of the ‘Manage Activity’ tool that allows users to archive or bulk-delete old Facebook posts based on a variety of filters. Change With most people being able to register with and become a user of Facebook over the last 14 years it is likely that over time, users posts on…
Read more

Google Store Takes Down App That Removes Chinese Software

Google has removed an app from its Play Store that was designed to help users to detect and delete apps that were made in China. More Than 1 Million Downloads The Remove China Apps, which is reported to have been downloaded by more than a million people on its first day has now been removed…
Read more

Beware Fake Contact Tracer Messages

Just as you thought that cybercriminals had exploited every aspect of the pandemic with phishing, vishing, smishing and more, there are now warnings to beware of fake contact tracer messages. Contact Tracing in the UK Here in the UK, NHS contact tracers are now contacting those persons who are believed to have been in close contact…
Read more

A Look at Cookies

Cookies perform functions and provide information that helps website users, businesses, publishers, and advertisers. This article looks at what cookies are, what they do, and the legislation that affects how they are used. What Are Cookies? Cookies are text files sent by the website you are on and stored on your browser as a record…
Read more

eBay Port Scanning Causes Alarm

Reports that eBay has been running port scans against the computers of visitors to the platform have caused alarm over potential security issues. Port Scans Port scanning is something that many people associate with cyber-attacks and penetration (‘pen’) testing.  Port scanning scripts are used to determine which ports a system may be listening via, by sending…
Read more