We hope you all had a great Christmas and New Year. The start to 2016 has certainly been a busy one for us! We announced late last year that due to our continued growth we would be moving to a new head office in the heart … |More
Two French researchers have created a rig consisting of a USRP (Universal Software Radio Peripheral) radio, an antenna, an amplifier as well as a laptop running the GNU Radio software to test if they can control Siri, Cortana and Google Now remotely. Unfortunately the straightforward answer is yes, although there … |More
The story about Hillary Rodham Clinton’s use of a private email server for purposes that are far beyond the personal level has gone viral. When Mrs Clinton served as US Secretary of State she should have thought her actions through better… Using private, potentially less secure, email when dealing with … |More
One of the most trusted tech giants Apple has recently experienced a cyber attack that affected Apple Store apps used on both iPhones and iPads in China.
Hackers created a genuine looking fake version of Apple’s software for building iOS and MAC apps, Xcode. App developers were a main target … |More
The Android application “Adult Player” contains ransomware. Have you come across it? If you don’t have a straight answer, then probably not. The functionality of the app is more than just viewing a few naughty pictures and videos. You can also become one of the “models” too, although it does … |More
Ofcom’s 2015 Market Report is out and it’s official – The UK Has a Strongly Embedded Smartphone Culture – So What Are the Security Implications?
According to Ofcom, the UK’s communications regulator, PCs and laptops lag behind smartphones when it comes to Internet browsing. Smartphones have become an inseparable part of our personal and business lives. Instant access to an email, conference calls on-the-go, facetiming your kids while commuting home from work, amongst other activities, … |More