Category: Mobile

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

Google To Kill Dodgy Tech Support Ads

A rise in the number of adverts appearing in Google placed by scammers offering fake tech support has led Google to announce the rollout of a new advert verification programme. Can’t Tell The Good From The Bad Google’s Director of Global Product Policy, David Graff, made the announcement on the Google blog. Mr Graff said…
Read more

‘Five Eyes’ Demand Back Door Access To Encrypted Services … Or Else

The frustration of the so-called ‘Five Eyes’ governments in not being allowed access to end-to-end encrypted apps such as WhatsApp has boiled-over into the threat of enforcement via legislative (or other) measures. Who Are The ‘Five Eyes’? The so-called ‘Five Eyes’ refers to the intelligence alliance of the governments of the UK, US, Canada, Australia,…
Read more

Apple’s Autonomous Car Involved in Crash

Apple’s new autonomous vehicle, part of its ‘Project Titan’, has joined an expanding list of self-driving car prangs. What Autonomous Vehicle? Apple is reported to have been working on vehicle projects since 2015 under the name of ‘Project Titan’. Ever since the early reports, there has been much speculation about when an iCar will come…
Read more

Google Search Results Biased Says Trump

President Donald Trump has criticised Google for what he sees as hiding “fair media” coverage of him in its search engine results in a way that amounts to left-wing political bias and negativity. Tweeting Again The US President’s latest swipe at a tech giant accused Google of prioritising negative news stories from the “national left-wing…
Read more

Uber Moves Into Bikes & Scooters

Ride-hailing service Uber, which has until recently been associated with cars, has announced a shift in focus towards bikes and scooters in order to drive growth and keep people using the platform. The Challenges Uber has faced a number of challenges in recent times, some of which have been of its own making. These challenges…
Read more

Apple iPad Battery Gas Leak – Shop Evacuated

The leaking of vapours from a damaged iPad battery led to an Amsterdam shop being evacuated and 3 staff being treated for breathing problems caused by the released gas. Fire Brigade Called Although the fire brigade was called and attended, there were no reports of any actual flames / fire coming from the affected iPad.…
Read more

Facebook Uses Scoring System To Manage Misinformation

It has been reported that Facebook allocates a trustworthiness score to some members to help it manage misinformation issues such as some members continually flagging / reporting stories as fake if they don’t agree with the content. Score? It is not publicly known exactly how the score is arrived at, but it has been reported…
Read more

Google Location Tracking, Even When Switched Off?

An Associated Press report has accused Google of recording the locations of its users via their mobile devices, even when they have requested not to be tracked by turning their “Location History” off. Discovered The apparent tracking without permission was discovered as part of research, when a Princeton privacy researcher noticed in his account that…
Read more

Social Mapper Can Trace Your Face

Trustwave’s SpiderLabs has created a new penetration testing tool that uses facial recognition to trace your face through all your social media profiles, link your name to it, and identify which organisation you work for. Why? According to its (ethical) creators, Trustwave’s SpiderLabs, Social Mapper has been designed to help penetration testers (those tasked with…
Read more

IBM Makes Test Version of New Stealth AI Malware ‘DeepLocker’

IBM has announced that it has created its own stealth, ultra-evasive AI malware called ‘DeepLocker’ that can evade all traditional cyber-security protection, hide in normal applications, and only strike when it is sure it has reached its intended target. Why? Cyber-criminals are becoming ever-more sophisticated in their methods, and the resources available to them have…
Read more