Category: Hardware

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

Google Or Samsung Android Cameras Could Be Spying On You

Researchers at Checkmarx say they have discovered vulnerabilities in Google and Samsung smartphone apps that could allow hackers to remotely spy on users using their phone’s camera and speakers. Study The proof-of-concept (PoC) study results, highlighted on the Checkmarx blog reveal how the Checkmarx Security Research Team cracked into the apps that control android phone…
Read more

5G Mobile Network is 450% Faster Than 4G in Tests

Tests by Ookla, the developer of Speedtest.net, are reported to have shown that the new 5G mobile network is 450% faster than 4G. Speed According to the Speedtest.net website, the results of the testing of 5G in 29 UK cities during Q3 of 2019 generally show download speeds as being 450-475% faster than those on…
Read more

Uber Loses London Licence

A decision by Transport for London (TfL) means that ride-hailing service Uber has lost its licence to carry passengers in London over safety and security failures. Why? According to TfL, it had identified a pattern of failures by Uber, including breaches that had risked the safety of passengers and drivers, plus some uninsured journeys. Prior…
Read more

Some Of The Tech ‘Promises’ Made By The Main Political Parties

With the UK’s General Election due to take place on 12 December, many issues have been covered in the media.  One key area of interest for businesses is technology and for those of you who may not have time to plough through the manifestos of the main parties, here’s a quick look at some of…
Read more

Despite Patches, Researchers Warn That Intel Chips Are Still Vulnerable

The New York Times has reported that despite Intel issuing patches for security flaws (that were discovered last year) in its processors, security researchers are alleging that the processors still have some serious vulnerabilities. What Flaws? In January 2018, it was discovered that nearly all computer processors made in the last 20 years contained two…
Read more

‘Moore’s Law’ and Business Innovation Challenged By Slow-Down In Rate of Processing Power Growth

Many tech commentators have noted a stagnation or slow-down period in computing-related to ‘Moore’s Law’ being challenged, but has the shrinking of transistors within computer chips really hit a wall and what could drive innovation further? What Is Moore’s Law? Moore’s Law, named after Intel co-founder Gordon Moore, is based on his observation from 1965…
Read more

ICO Warns Police on Facial Recognition

In a recent blog post, Elizabeth Denham, the UK’s Information Commissioner, has said that the police need to slow down and justify their use of live facial recognition technology (LFR) in order to maintain the right balance in reducing our privacy in order to keep us safe. Serious Concerns Raised The ICO cited how the…
Read more

Amazon Echo and Google Home ‘Smart Spies’

Berlin-based Security Research Labs (SRL) discovered possible hacking flaws in Amazon Echo (Alexa) and Google Home speakers and installed their own voice applications to demonstrate hacks on both device platforms that turned the assistants into ‘Smart Spies’. What Happened? Research by SRL led to the discovery of two possible hacking scenarios that apply to both…
Read more

Any Thumbprint Unlocks a Galaxy A10

Samsung’s so-called “revolutionary” fingerprint authentication system for the Galaxy A10 phone appears to be offering less than satisfactory results as it is discovered that any thumbprint can unlock one. Biometric ‘Fail’ South Korean phone giant Samsung has received some unwanted bad publicity for its new Galaxy A10 phone after an article appeared in the Sun…
Read more

Food Writer Loses £5,000 in Phone ‘Simjacking’

Well known food writer, Jack Monroe, has reported falling victim to criminals who were able to steal £5,000 from her bank and payment accounts in a “Simjacking” attack. What Is Simjacking? Simjacking, simswapping or ‘phone hijacking’ involves criminals being able to port a person’s mobile phone number over onto on another SIM card. This is…
Read more