Latest news

Industry news provide by Qubic Group plc

With the help of IoT, Australian milk producers are able to bring fresh dairy to China within 36 hours. Companies are using the capabilities of IoT for the purposes of tracking and temperature monitoring. In other words, IoT is helping companies speed up the process and improve the quality of milk products. Telstra is just one example of companies that are doing this, and the company has also made an effort towards connecting vineyards and

Read More

The Forrester Wave: Web Analytics, Q4 2017 has just been published by Forrester. Inside, the following web analytics providers were compared: – Cooladata – IBM – Mixpanel – Webtrekk – Google – Adobe – AT Internet In case you’re following the choices other businesses are making, you already know they have extended well beyond the traditional web analytics to include IoT, social media, ads, apps, and more. Companies are modernising their web analytics technology alongside

Read More

Scammers are getting smarter from day to day, and according to Microsoft, they are testing new phone-call prompts to trick unsuspecting users into calling a bogus help hotline. Their goal is to have their victims pay for support they don’t really need, as the supposed issues on their computer are non-existent. For example, a fake blue screen of death is one such trick used by these fraudsters. Recently, a large number of these fake customer

Read More

Air-gapped computers are considered to be high-value, and thus, interesting targets for hacking. Even though they may not have a network connection, there are ways a hacker could potentially steal data from them. Here are the top four methods, each representing a cybersecurity risk: Electromagnetic This is the earliest attack vector. Ranging from USB port and cable leakage, and all the way to eavesdropping on the EM radiation from the memory bus, this method was

Read More

Under a new entity called Hitachi Vantara, the company is adopting an “as-a-service” subscription model. In this way, they are aiming to become a large part of the data analytics, AI, and IoT space. Even though the company only generates 20% of its revenue through subscription-based services as of right now, Bobby Soni, chief solutions and services officer, is convinced that this will change in the upcoming three years. According to him, businesses would rather

Read More

General Data Protection Regulation (or GDRP for short) is just around the corner. From the 25 May 2018 and beyond, all companies doing business within Europe will be bound by this new set of regulations. So, what is the objective of GDPR? Simply put, GDPR will allow citizens to have more control over their personal data collected by organisations, such as their name, address, and credit card data. In essence, the new regulation dictates that

Read More

Another cybersecurity threat has been discovered in the Google Play store: a group of apps containing malware. Thankfully, Google has already removed them from the marketplace. Combing through the Android marketplace, researchers at ESET discovered eight malicious apps containing the ill-reputed Trojan Dropper. This particular malware is known to compromise your phone’s cybersecurity by downloading banking trojans and installing spyware. The hackers were able to trick victims into downloading these malicious apps, which paraded as

Read More

Microsoft is preparing to release a preview version of Skype Professional, a variant of Skype aimed at small online businesses. However, this preview will be restricted to the US only. In technical terms, using it will require you to open a new Skype account. Although the account will be free, it’s still uncertain whether Microsoft is going to require that you also be a paid subscriber to Microsoft Office 365. The new features will allow

Read More

From now on, Android developers won’t be able to publish their apps if they fail to explain why they’re using the accessibility features designed to help make things easier for the disabled. Accessibility services is an Android API that runs in the background and helps the disabled by carrying out certain tasks such as: Overlaying content Switching between apps Filling out forms Although there are many legitimate reasons why an app would use this feature,

Read More

Royce Curtin, head of intelligence at Barclays Bank, recently emphasised some interesting statistics: 90% of cyberattacks begin with someone clicking on an email. It’s impossible to fix cybersecurity without fixing this aspect first. To quote his Curtin, people are the weak link. The referenced statistics were first presented in Trend Micro’s white paper entitled Spear-Phishing Email: Most Favored APT Attack Bait. Spear-phishing, in particular, is aimed at high-ranking targets who otherwise wouldn’t find the time

Read More