Category: Mobile

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

Digital Marketing : TikTok Or YouTube?

Digital Marketing : TikTok Or YouTube?

In this article, we compare the TikTok and YouTube platforms and take a look at some of the pros and cons of each.  Similarities  There are several important similarities between YouTube and TikTok. For example:  – Both are popular video-sharing social media platforms that encourage user-generated content.   – Both platforms also cater for content…
Read more

How To Protect Yourself From Job Phishing Scams

How To Protect Yourself From Job Phishing Scams

In this article, we look at what ‘job phishing’ is, how it works, and how you can protect yourself from this type of fraud.  What Is Job Phishing?  Job phishing refers to recruitment/employment scams where fraudsters pose as recruitment agents or reputable companies. The fraudsters post fake job descriptions and information about their businesses on…
Read more

Featured Article : The True Cost Of Using Pirated Software

The True Cost Of Using Pirated Software

In this article, we look at how the risks to businesses posed by pirated software can far outweigh the benefits of using it, and how you can protect your business from the true costs of pirated software.  Benefits  On the surface, there appears to be some clear benefits to using pirated software such as acquiring…
Read more

Spotting Fake Reviews And Dubious Ratings On Amazon

Spotting Fake Reviews And Dubious Ratings On Amazon

Following Amazon suing the admins of more than 10,000 Facebook groups over an alleged co-ordinated fake reviews campaign, we look at how to spot fake reviews and dubious ratings on Amazon.  Why Use Fake Reviews?  On the site of one of the world’s largest retailers and the top online marketplace, large numbers of positive reviews…
Read more

How Easy Is It To Clone Someone’s Voice?

Following recent security concerns about Amazon’s plans to enable Alexa to mimic voices, we look at how easy it is to do, what the benefits are, and what risks it poses.  Alexa The Mimic  Recently, Amazon announced that it was working on technology to enable its Alexa digital assistant to take on the voice of…
Read more

New Windows Feature Displays Which Apps Have Been Listening-In

New Windows Feature Displays Which Apps Have Been Listening-In

The new Privacy Auditing feature in Windows 11 allows users to see a list of which apps have accessed their microphone or camera recently, plus details of any other suspicious activity.  See Which Apps Have Accessed Your Microphone and Camera  David Weston, Microsoft’s VP for Enterprise and OS Security, highlighted the new privacy feature in…
Read more

Google Offers Job Interview 'Warmup' Tool

Google Offers Job Interview ‘Warmup’ Tool

The new AI-based interview Warmup tool from Google uses questions from a series of industry experts to help users prepare for job interviews.  Tech Jobs And Skills Gap  Googe says that this news Interview Warmup tool was developed as part of its own Google Career Certificates programme which offers professional-level online training. The programme was…
Read more

WhatsApp Rolls-Out Emojis and Sharing Of Files Over 2GB

WhatsApp Rolls-Out Emojis and Sharing Of Files Over 2GB

Following last month’s announcement, Meta’s WhatsApp is rolling-out emojis and the ability to share files within WhatsApp up to 2GB in size.  Communities  The new features are being added as part of WhatsApp’s “vision for Communities” where the idea is to “help people have the next best thing to an in-person conversation when they want to talk to…
Read more

Apple, Google and Microsoft In Password Collaboration

Apple, Google and Microsoft In Password Collaboration

Apple, Google and Microsoft have announced that they are joining forces to support a common passwordless sign-in standard that will allow websites and apps to offer consistent, secure and easy sign-ins across devices and platforms.   The Problem With Password-Only   Relying on password-only authentication is known to present many risks and challenges such as managing multiple…
Read more

More Control To Remove Personal Data From Google Searches

More Control To Remove Personal Data From Google Searches

Google has announced that it is changing its policies to allow more types of personally identifiable information removal requests.  Personal Information Showing Up In Google Search  Google acknowledges that personally identifiable information of some users can and does show up in Google search queries. This can make users concerned, e.g. about how it could be…
Read more