Blog

Amazon Echo: Child Labour Concerns

2019-08-14T12:07:29+00:00By |

Reports of a 2018 investigation by China Labour Watch (CLW) into the Amazon Echo manufacture at the Hengyang Foxconn factory show that the recruiting of young interns from vocational schools could mean that the Amazon devices are made with the help of child labour. Schools Providing Workers For Night Shifts The report of the investigation by New York-based non-profit group CLW claims that a number of interns from schools and colleges were brought in to work night shifts and if they were unwilling to work overtime or night shifts, the factory would arrange for teachers to pressure those workers. The [...]

Tech Tip – Crono App

2019-08-14T12:06:03+00:00By |

If you’d like to get better integration between your PC and phone, the Crono app enables you to get all your notifications straight from Chrome. If you spend a lot of time using Chrome on your computer, the Crono app lets you see all your notifications and calendar events without looking at your phone i.e. you get mobile notifications on your browser and you can respond to those notifications through your browser. The app, which requires a Chrome extension to work also allows clipboard sharing between your browser and device with a single click, and if you can’t find your [...]

One-Third of Major VPNs Owned By Chinese

2019-08-09T08:55:48+00:00By |

A recent survey by VPNpro has revealed that almost one-third of the most popular VPN services are secretly owned by Chinese companies that may be subject to weak privacy laws. VPN A ‘Virtual Private Network’ (VPN) is used to keep internet activity private, evade censorship / maintain net neutrality and use public Wi-Fi securely e.g. avoid threats such as 'man-in-the-middle' attacks.  A VPN achieves this by diverting a user’s traffic via a remote server in order to replace their IP address while offering the user a secure, encrypted connection (like a secure tunnel) between the user’s device and the VPN [...]

Opting Out of People Reviewing Your Alexa Recordings

2019-08-09T08:54:23+00:00By |

Amazon has now added an opt-out option for manual review of voice recordings and their associated transcripts taken through Alexa but it has not stopped the practice of taking voice recordings to help develop new Alexa features. Opt-Out Toggle The opt-out toggle can be found in the ‘Manage How Your Data Improves Alexa’ section of your privacy settings, which you will have to sign-in to Amazon to be able to see.  This section contains a “Help Improve Amazon Services and Develop New Features” section with a toggle switch to the right-hand side of it and moving the toggle from the [...]

Goodbye Skype for Business, Hello Teams

2019-08-09T08:53:06+00:00By |

Microsoft has announced that Skype for Business Online will be giving way to ‘Teams’, with support for Skype for Business ending on 31 July 2021, and all new Microsoft 365 customers due to get Microsoft Teams by default from 1 September 2019. What Is Teams? Introduced back in November 2016, ‘Teams’ is a platform designed to help collaborative working and combines features such as workplace chat, meetings, notes, and attachments. Described by Microsoft as a “complete chat and online meetings solution”, it normally integrates with the company's Office 365 subscription office productivity suite, and Teams is widely considered to be [...]

Google Plugs Incognito Mode Detection Loophole With Chrome 76

2019-08-09T08:51:43+00:00By |

Google has announced that with the introduction of Chrome 76 (at the end of July), it has plugged a loophole that enabled websites to tell when you were browsing in Incognito mode. Incognito Incognito mode in Chrome (private browsing) is really designed to protect privacy for those using shared or borrowed devices, and exclude certain activities from being recorded in their browsing histories. Also, less commonly, private browsing can be very important for people suffering political oppression or domestic abuse for example, where there may be important safety reasons for concealing web activity. Loophole Plugged The loophole that is being [...]

A.I. Powered Bar-staff. Who’s Next?

2019-08-09T08:50:41+00:00By |

In what’s been called the world’s first ‘A.I. Bar’ (developed by British data science product company DataSparQ) ordering a drink at a busy bar has been made easier, faster and fairer by using facial recognition technology to place customers in an “intelligently virtual” queue. Solving Old Problems Information and statistics (DataSparQ) show that pub-goers in Britain spend more than two months over a lifetime queuing for drinks and that people pushing in at bar queues is the biggest gripe.  Who to serve next as efficiently as possible without causing an argument, and how to spot underage customers at busy times [...]

Tech Tip – Bouncer App

2019-08-09T08:49:09+00:00By |

If you’re concerned about privacy on your phone, and if you’d like to stop power-hungry apps from abusing their permissions by running processor-heavy tasks in the background the ‘Bouncer’ app enables you to grant permissions for applications temporarily. With the Bouncer app, you can grant permissions for apps for a temporary period and once permission is granted, the Bouncer app will automatically remove that permission either when you exit the app in question or when a certain amount of time has passed. The Bouncer app is available (Beta) on the Google Play Store.

Free Ransomware Killers Save £88M in Ransoms

2019-08-01T16:51:28+00:00By |

Free downloadable ransomware tools launched by Europol in association with several cybersecurity firms as part of the ‘No More Ransom’ initiative are estimated to have saved businesses £87.6 million. Who / What Is Europol? Europol is the European Union Agency for Law Enforcement Cooperation. No More Ransom ‘No More Ransom’ is the name given to the initiative launched July 29th 2016 by Europol’s European Cybercrime Centre.  This is the National High-Tech Crime Unit of the Netherlands’ police and McAfee that works to help victims of ransomware to retrieve their encrypted data without having to pay ransoms to criminals.  The idea is [...]

Vulnerability in Contactless Card Allows Bypassing of £30 Limit

2019-08-01T16:50:22+00:00By |

Researchers from security company Positive Technologies have reported found a vulnerability in Visa contactless cards that could lead to your bank account being drained if your card fell into the wrong hands. Device The researchers developed a ‘skimming’ device which was able to intercept communications between a contactless card and payment terminal, thereby allowing the £30 spending limit per transaction to be bypassed without requiring the entry of a PIN number. The device was found to work with cards from five different UK banks. It has been reported that the hack would also work on cards and terminals outside the [...]