Gone phishing – Why Android and iPhone users are susceptible to cyber phishing scams

We use our mobiles for everything. From arranging dinner dates to replying to work emails to ordering flowers and even catching up on our favourite...

5 Top Tips for Choosing a Mobile Device Management (MDM) Solution

Your mobility depends on mobile devices that serve as extensions of larger devices like desktop computers and laptops. With this cohesion across...

What is the Role of an Infrastructure Management Service (IMS)?

IT infrastructure management service (IMS) is about administering and managing technology, information and data in a proactive way. Its scope ranges...

The Top 5 Challenges Faced by UK Businesses

If like many UK businesses, you’re an SME running on stretched resources and time, chances are you’re more focused on making a profit than you are on...

Tech 5 - Samsung's latest iPhone rival, summer-school hackathons and the demise of the fax machine

Take note of the Samsung Note 9

With an enormous 6.4-inch screen and an S Pen full of wizardry, committed Android users might just be tempted by...

How statistics-based attacks work

Statistics-based attacks are characterized by excessive packet arrival rate. The objective of the attacker is to send unfulfillable requests to a...