While the IFA 2015 expo officially starts today, we have (nudge, wink) already covered and previewed the handsets and tablets that were announced at the pre-expo events by Sony, Samsung, Huawei, Lenovo, ZTE, Asus, Acer and the rest. To those who thought this IFA expo would be boring without the…
10 MOST NOTORIOUS HACKERS OF ALL TIME
Source: National Cyber Security – Produced By Gregory Evans 1. Jonathan James Known as “comrade” by many online, 15-year-old Jonathan James was the first juvenile convicted and jailed in the United States for hacking. James hacked into companies like Bell South, as well as the Miami-Dade school system and the…
Infographic shows which mobile browsers are used the most in various countries
A company called Gadget Lab has produced a very interesting infographic that reveals which mobile browsers are used the most in various countries. For example, in the U.S. it might not be surprising to learn that Safari is responsible for 58.28% of the mobile internet traffic in the country, with…
Weekly poll: What feature is most important in your next phone?
We’ve seen the 2015 lineup from just about everyone now (hurry, Google), and there are some really nice phones out there waiting for us to trade money for them. From excellent mid-range models with an easy price tag, to the highest of the high end for those who want to…
Monsters from Asia: the Japan-exclusive J Butterfly HTV31, or one of HTC’s most decked-out phones ever
So far on our regular Monsters from Asia column we’ve steered away from mainstream manufacturers and have been instead focusing on truly exotic devices instead. To feature an HTC device, then, might sound like a betrayal, but the smartphone we’d like to highlight today is anything but a standard issue HTC…
Monsters from Asia: the Japan-exclusive J Butterfly HTV31, or one of HTC’s most decked-out phones ever
So far on our regular Monsters from Asia column we’ve steered away from mainstream manufacturers and have been instead focusing on truly exotic devices instead. To feature an HTC device, then, might sound like a betrayal, but the smartphone we’d like to highlight today is anything but a standard issue HTC…
IT Business Products : How to Get the Most into Your Dishwasher to Get the Most Out of It
While we all know at least one self-proclaimed dishwasher loading pro, after reading this, you can count yourself among their hallowed ranks. And pick up a few tricks to keep your dishwasher in tip-top shape for years to come. Know your water If you’ve ever had trouble rinsing off soap,…
Sales and customer service teams ‘most vulnerable to cyber attacks’
Source: National Cyber Security – Produced By Gregory Evans A report from McAfee found that the UK is one of the countries most vulnerable to risk across Europe, since one in ten UK organisations do not provide the necessary online protection training for their staff. With 82 million new suspect URLs found in…
Cyber criminals are most likely to go after your sales staff
Source: National Cyber Security – Produced By Gregory Evans UK sales staff are the most likely to suffer a cyber attack, according to a new report from Intel Security, cited by Computer Business Review. Their frequent online contact with non-staff members makes companies’ sales teams more vulnerable to online attacks…