50% of all search will be voice search by 2020
[fusion_builder_container hundred_percent=”no” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_color=”” video_preview_image=”” border_size=”” border_color=”” border_style=”solid” padding_top=”” padding_bottom=”” padding_left=”” padding_right=””][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ background_position=”left top” background_color=”” border_size=”” border_color=”” border_style=”solid” border_position=”all” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” center_content=”no” last=”no” min_height=”” […]
Meltdown and Spectre

What is Meltdown and Spectre We’re only at the start of 2018 and already we have two security risks to contend with. Meltdown and Spectre are two security vulnerabilities discovered in modern microprocessor chips that may allow attackers to exploit the chips common features and puts your personal data, including passwords, at risk. People are […]
Do you know where that USB device came from
STOP!! – Do you know where that USB stick or memory card came from? Was it delivered in the post? Did you simply find it on the ground and thought “What better way to establish who owns it than to plug it into my computer and see the owner’s details are on it”. Did you […]
Don’t ignore the elephant in the room
By now I’m sure you’ve heard of the impending apocalypse known as GDPR. Or at least that’s what some advisors would have you believe. In truth, a lot of it is interpretation. How much you change your business to achieve some semblance of compliance depends entirely on your unique set of circumstances. The important thing […]
BadRabbit Ransomware
Writing about ransomware is starting to feel like a full-time job and unfortunately only days after my latest ransomware piece, I find it necessary to warn you, once again about the latest threat. BadRabbit ransomware attacks started on October 24th and are currently ongoing. At the time of writing, attacks have so far taken place […]
Cyber Security – Top Tips
It seems that there is a new cybersecurity threat emerging, every other day with ransomware and other phishing scams being the most prevalent. In that past I have written in detail about ransomware and the steps you should take to minimise your likelihood of attack. I recommend reading my piece “Ransomware – The complete survival […]
Keep your Passwords Secure

We all have a multitude of passwords for a multitude of logins to a multitude of websites. What most don’t do, however, is make each and every password unique, strong, and random (series of letters and numbers that don’t relate to anything). While it’s very easy for me to tell you that every login password […]
Check if your email address has been compromised in a data breach
[fusion_builder_container hundred_percent=”no” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_color=”” video_preview_image=”” border_size=”” border_color=”” border_style=”solid” padding_top=”” padding_bottom=”” padding_left=”” padding_right=””][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ background_position=”left top” background_color=”” border_size=”” border_color=”” border_style=”solid” border_position=”all” spacing=”yes” background_image=”” background_repeat=”no-repeat” padding=”” margin_top=”0px” margin_bottom=”0px” class=”” id=”” animation_type=”” animation_speed=”0.3″ animation_direction=”left” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” center_content=”no” last=”no” min_height=”” […]
Popular Computer Optimisation Software CCleaner Hacked
Computer optimisation software is supposed to keep your computers running smoothly. Unfortunately it turns out that one of the most popular software tools out there, CCleaner from Avast Pitform is not doing “Exactly what it says on the tin”. Last week, It was discovered that CCleaner had become infected with Malware and may effect approx […]
Missed Call (Wangiri) Scam

This post was originally published in August 2017 at the height of the last wave of what is know as the “Wangiri Scam” or “Missed call scam”. Unfortunately it has become necessary to re-post this piece with reports of thousands of scam mobile phone calls are being received throughout the country. While the call prefixes […]
