Third Intel Computer Chips Exploit

In August, researchers found the third significant security flaw from Intel computer chips exploit this year which is known as the Foreshadow. The US government’s body for cyber security has identified the Foreshadow exploit to have vulnerabilities that could have been exploited to gain access to sensitive information. This is a similar vulnerability to the
-> Continue reading Third Intel Computer Chips Exploit

Protect your data!

In recent news, documents have been found for sale on the dark web containing sensitive information relating to the U.S. Air Force. These documents were featured for as low as $100 to $200 and were found by Information Security Analysts while trawling through the dark web searching for criminal activity. These analysts posed as potential
-> Continue reading Protect your data!

Smart Locks

Tapplock is a popular, Bluetooth-based, fingerprint activated padlock. The speciality of this padlock comes down to the fingerprint recognition technology which allows users to unlock the padlock with their fingerprint or use a mobile application remotely. As an added benefit, you can even allocate trusted individuals who can also use the mobile application to unlock
-> Continue reading Smart Locks

Wi-Fi EasyMesh

Mesh networks make use of multiple Wi-Fi enabled routing devices to extend a Wi-Fi network across a much larger area, for example it is common for users who live in large houses to lose Wi-Fi signal due to the lack of range provided by a single Wi-Fi hotspot alone. The benefits of using a mesh
-> Continue reading Wi-Fi EasyMesh

Is Virtual Reality Secure?

Virtual Reality (VR) is a technology that has become increasingly popular in the last few years, allowing users to become immersed in a virtual world of their choice from the comfort of their home. But is it secure? VR Technology requires users to have a VR Headset and Controllers which vary in levels of sophistication,
-> Continue reading Is Virtual Reality Secure?

Smart Watch-out!

In our previous blog, we spoke about the positives and negatives of using a smartwatch for your daily activities. Smartwatch security is a topic overlooked by most, and why? What potential does a smartwatch really hold? Let’s consider the core functionality a smartwatch. That is: to make calls, track health, send messages and access the internet.
-> Continue reading Smart Watch-out!

The Rise of Ransomware

Ransomware is being used widely by hackers to make money by holding your data hostage. As this threat evolves, can you be certain that the data you store is protected and are you able to recover it if you are attacked? This blog will cover ways to reduce the impact of ransomware by implementing practical
-> Continue reading The Rise of Ransomware

Online Education For Children

As parents – or relatives, teachers and other adults responsible for children’s safety – we want our children to be healthy, happy and to develop well both physically and mentally. Above all, it’s also instinctive that we want kids to be safe. Until relatively recently, most homes had a family computer, where parents could safely
-> Continue reading Online Education For Children

UK Government Urged To Act Over Limited Computer GCSE Options

A recent report from the Royal Society found that over half of secondary schools in the UK did not offer computer science as a GCSE between 2015-16, it continued to urge the UK government to increase spending on computer education ‘tenfold’ to ensure that young people currently in education could “unlock the full potential of
-> Continue reading UK Government Urged To Act Over Limited Computer GCSE Options