Security Stop Press : Most Zero-Day Exploitations Are Espionage

A recent analysis by Google’s Threat Analysis Group (TAG) and Google Cloud’s Mandiant has suggested that government-backed threat actors are more likely to be behind most exploitations of zero-day vulnerabilities than money-motivated cyber criminals.  In the report outlining the findings of the analysis, of the 58 zero-days in 2023 that...

Sustainability-in-Tech : 600% Data-Centre Electricity Increase In a Decade

In a speech shared on LinkedIn, National Grid Chief Executive, John Pettigrew, highlighted how demand for electricity from commercial data centres will increase six-fold, within just ten years.  Double The Demand On The Grid By 2050  Comparing today’s problem of grid network constraint to that of the 1950s, Mr Pettigrew...

Tech Tip – How To Quickly Access Symbols and Special Characters

Trying to find and insert particular symbols or special characters into something like a Word document can often be awkward and time-consuming, but Windows provides a quick-access character map for these symbols and characters to streamline this process. Here’s how to find it and use it:  > Search for Character...

Tech News : Glassdoor Site Shows Real Users’ Names

It’s been reported that Glassdoor (the website that allows current employees to anonymously review their employer) posted users’ real names to their profiles without their consent.  What Is Glassdoor?  By allowing users to register anonymously, Glassdoor is a website that allows current and former employees to anonymously review their companies...

Tech News : Your AI Twin Might Save Your Life

A new study published in The Lancet shows how an AI tool called Foresight (which fully analyses patient health records and makes digital twins of patients) could be used to predict the future of your health.  What Is Foresight?  The Foresight tool is described by the researchers as a â€œgenerative transformer...

An Apple Byte : Serious Apple Chip Vulnerability Discovered

US researchers have reported discovering a hardware chip vulnerability inside Apple M1, M2, and M3 silicon chips. The unpatchable ‘GoFetch’ is a microarchitecture vulnerability and side-channel attack that reportedly affects all kinds of encryption algorithms, even the 2,048-bit keys that are hardened to protect against attacks from quantum computers.  This serious vulnerability renders the security...

Security Stop Press : Microsoft’s RSA Key Policy Change

Microsoft is making a security-focused policy change that will see RSA keys with lengths shorter than 2048 bits deprecated. RSA keys are algorithms used for secure data encryption and decryption in digital communications, i.e. to encrypt data for secure communications over an enterprise network. However, with RSA encryption keys becoming...

Name(Required)