Security Stop-Press : Apache Log4j Security Vulnerabilities

The Apache Foundation has released an emergency update for a critical zero-day vulnerability in Log4j. This is a widely used logging tool included in almost every Java application. The problem that the update has been issued to address is that a bug in the Log4j library could allow an attacker to execute arbitrary code on a system […]
Tech Tip – A Fast Way To Open Items From Your Taskbar

If you’d like super-fast and easy way to open the items/programs that are pinned to your Taskbar in Windows 10, here’s how: – Look at the Taskbar and note which number order (left to right) the item/program is that you’d like to open. – Use the keyboard shortcut Windows key + [Number key], with the […]
Security Stop-Press : News of More Covid Scams

The NHS Counter Fraud Authority has warned of a recent spike in scams around the Covid Passes such as fake websites claiming to sell the passes. There is also news that the fear of the Omicron variant is already being exploited by phone scammers who are contacting people around the UK about fake test kits […]
Tech News : World’s First “Living Robots” Can Now Reproduce

US-based scientists have reported creating “living robots” that can now re-produce. Next Step From Last Year Last year, a team of US scientists reported creating ‘living robots’ which were actually bundles of stem cells from African clawed frogs. The researchers discovered that they could ‘program’ these cells to accomplish certain tasks, hence the robot comparison. […]
Featured Article : A Business Continuity Plan : The Essentials

In this article, we take a look at what a Business Continuity Plan is, what it should contain, and why it’s such an important document. Preparing Accepting that the unexpected and disasters will happen (and that you can plan how to maintain business continuity while you deal with them) is an important step in safeguarding […]
Tech Insight : Email Security

In this tech insight, we take a look at the many threats to email security that businesses face and what businesses can do to mitigate them, together with what help is available to help tackle those threats effectively. Email Accounts For Most Security Breaches Prioritising email security is important because most cyber-security breaches involve email, […]
Tech News : Twitter Bans Sharing ‘Private’ Images & Video Without Consent

In a change to its Private Information Policy, Twitter has banned the sharing of personal media, such as images or videos without the subject’s consent. Why? Twitter says that as part of its ongoing work to align its safety policies with human rights standards, it needs to take action to tackle the possible misuse of media and […]
Tech Tip – Using Google To Search Within A Website

If you’d like to quickly search within a whole website (e.g. a competitor’s website for specific term or subject) here’s a quick way to do so using Google. – Go to Google. – In the search field, type “site:” followed by the URL of the site and your search terms. For example: site:bbc.co.uk Christmas – […]
Security Stop-Press : GoDaddy “Security Incident” Could Affect 1.2 Million

In this week’s security update, GoDaddy has reported a hack/data-breach on its managed WordPress hosting service which could mean that the details of 1.2 million users may have been exposed. Reports indicate that an intruder gained access on Nov 17 by using a stolen password. GoDaddy says that it has blocked the unauthorised third-party from its system, […]
Tech Insight : How To Know If Someone Has Read Your Email?

In this tech insight, we take a look at the better-known ways of being able to tell if someone has read your email. The Usual Suspects The main ways to tell if a person has read your email include: – Request a read receipt when you compose the email. The read receipt is then sent to you […]