Category: Tech News

Providing IT support and solution to small and medium businesses. Servicing Edinburgh, Livingston, Fife and surrounding areas. Responsive, Flexible, Professional and friendly local support.

Apple iPad Battery Gas Leak – Shop Evacuated

The leaking of vapours from a damaged iPad battery led to an Amsterdam shop being evacuated and 3 staff being treated for breathing problems caused by the released gas. Fire Brigade Called Although the fire brigade was called and attended, there were no reports of any actual flames / fire coming from the affected iPad.…
Read more

Superdrug Customers Informed of Hack

Superdrug is reported to have advised online customers to change their passwords after it was targeted by hackers who claim to have stolen the details of approximately 20,000 Superdrug customers. Hundreds Compromised – Could Be More To date, Superdrug has confirmed that 386 customer accounts are known to have been compromised, but that it is…
Read more

Facebook Uses Scoring System To Manage Misinformation

It has been reported that Facebook allocates a trustworthiness score to some members to help it manage misinformation issues such as some members continually flagging / reporting stories as fake if they don’t agree with the content. Score? It is not publicly known exactly how the score is arrived at, but it has been reported…
Read more

New Australian Law Gets The Thumbs-Down From Tech Firms

In Australia, a new draft Bill proposing ways for tech firms, software developers and others to assist security agencies and police has been given the thumbs-down by a major industry group over its ambiguity, and the potential security risks it could create. What Bill? The new “Telecommunications and Other Legislation Amendment (Assistance and Access) Bill…
Read more

Superfast Broadband Boosts Business and Jobs

Among the findings of a recent government report about superfast broadband in the UK are claims that superfast broadband rollout so far has led to job creation and a £12.28 benefit for firms for every £1 invested by central and local authorities. Measurable Benefits The Evaluation of the Economic Impact and Public Value of the…
Read more

ech Tip – Display System Drives First In File Explorer

In Windows now, by default, your File Explorer opens the Quick Access screen when launched. If you’d rather go back to the old way of displaying your system drives first, here’s how: – Right-click the Quick access link on the left. – Choose Options- – Choose ‘This PC’ from the top drop-down menu.

Google Location Tracking, Even When Switched Off?

An Associated Press report has accused Google of recording the locations of its users via their mobile devices, even when they have requested not to be tracked by turning their “Location History” off. Discovered The apparent tracking without permission was discovered as part of research, when a Princeton privacy researcher noticed in his account that…
Read more

Social Mapper Can Trace Your Face

Trustwave’s SpiderLabs has created a new penetration testing tool that uses facial recognition to trace your face through all your social media profiles, link your name to it, and identify which organisation you work for. Why? According to its (ethical) creators, Trustwave’s SpiderLabs, Social Mapper has been designed to help penetration testers (those tasked with…
Read more

Microsoft To Launch App-Testing Sandbox ‘InPrivate Desktop’ Feature

It has been reported that Microsoft is to launch InPrivate Desktop for a future version of Windows 10, a kind of throwaway sandbox that gives Admins a secure way to operate one-time tests of any untrusted apps / software. Like A Virtual Machine Although the new feature is still a bit hush-hush, and has actually…
Read more

IBM Makes Test Version of New Stealth AI Malware ‘DeepLocker’

IBM has announced that it has created its own stealth, ultra-evasive AI malware called ‘DeepLocker’ that can evade all traditional cyber-security protection, hide in normal applications, and only strike when it is sure it has reached its intended target. Why? Cyber-criminals are becoming ever-more sophisticated in their methods, and the resources available to them have…
Read more