Avoiding scam apps

2020-06-30T16:48:37+00:00June 30th, 2020|Categories: IT Security|Tags: , , , , |

Avoiding scam apps Apple and Google take very different approaches to managing their respective app stores. Apple has a (notoriously) lengthy approval process, which means that the apps in its store are, effectively, highly curated and therefore very likely to be both safe and functional. Google, by contrast, generally lets developers upload whatever they [...]

Everything SMEs need to know about POS systems

2019-01-02T17:16:35+00:00January 2nd, 2019|Categories: Cloud Services, Technology Trends|Tags: , , , , , , |

Everything SMEs need to know about POS systems As consumers increasingly pay by swiping their cards or by Android or Apple Pay, the days of taking cash only are long gone for the vast majority of businesses. Even people who do crafts at home and sell them at craft fayres are starting to invest [...]

Chinese criminals aim to exploit Android devices

2018-05-02T11:29:25+00:00May 2nd, 2018|Categories: IT Security|Tags: , , , , , |

Chinese criminals aim to exploit Android devices Overall, the world has a lot of reasons to be grateful to Android. It has effectively brought capable smart devices within the budgets of people who either can’t afford or just don’t want to pay for iOS gadgets. It also has a lot of appeal to people [...]

Beware the boot bug

2018-04-09T13:56:13+00:00November 2nd, 2017|Categories: IT Support|Tags: , , , , |

Beware the boot bug For years, Mac users have pointed to the vast quantities of malware targeted at PCs as evidence of why Macs are worth their price premium and, it has to be admitted that they have long had a point. While some might point to the fact that Windows PC are [...]