Category: Blog Post

Researchers from SMU’s (Southern Methodist University) Darwin Deason Institute for Cyber-security have found that the sound waves produced when we type on a computer keyboard can be picked up by a smartphone and a skilled hacker could decipher which keys were struck. Why? The research was carried out to test whether the ‘always-on’ sensors in devices […]

Read more

The UK’s data protection watchdog (the Information Commissioner’s Office  i.e. the ICO) has said that it will be investigating the use of facial recognition cameras at King’s Cross by Property Development Company Argent. What Happened? Following reports in the Financial Times newspaper, the ICO says that it is launching an investigation into the use of live […]

Read more

If you’ve been looking for a good gallery app for Android, Google has created an offline and compact, lite version of Google Photos that is uncluttered and easy to use. The Gallery Go app works offline, so it doesn’t sync to a Google account (like Google Photos), but it only has two tabs at the […]

Read more

Research by Kaspersky Labs has discovered that cyber-criminals are now hijacking and using the confirmation emails from registration, subscription and feedback forms of legitimate company websites to distribute phishing links and spam content. How? Kaspersky has reported that scammers are exploiting the fact that many websites require users to register their details in order to […]

Read more