Tech Roundup 29th Jan 2016

Mike MingardTechnologyLeave a Comment

Jan 25: Microsoft is working hard on Edge browser – and wants your feedback

Jay says: ‘If you ask any group of people that use a computer their thoughts on Internet Explorer you are almost guaranteed a mixed bunch of answers full of controversial justifications and heated loyalty to their browser of choice. Your browser is often your most used software on your computer, it is your portal to the internet. Therefore, whatever you use must be right for you.

With Windows 10 Microsoft unveiled the child of Internet Explorer. First called “Project Spartan” it is now called “Microsoft Edge Browser”. It is clear that Microsoft want another shot at the browser world and are probably aiming to de-throne the leaders such as Google Chrome and Firefox.

But will it be good enough? There are constant update reports with new features being added all the time and tweaks being made to try and make it more user friendly. Now Microsoft is asking for feedback on all its efforts and hard work. So go ahead and download the new and improved browser by Microsoft and let them as well as us know what you think. Life’s too short to not give second chances.’

Jan 26: An alarming number of UK businesses were hit by security incidents last year

Jay says: ‘Security is something you hear a lot associated with computing and IT. It is becoming more and more important to pay attention to warnings and reports on security breaches and exploits because it could well be you next! Figures published by a Harvey Nash survey have revealed some interesting figures and the most common forms of attack. It turns out the most common way of breaching security is Phishing or Social Engineering, this is followed by common Malware which is the second most common form of attack. Both of these attack methods often require a user to open a file or click on a link which will capture their details or embed itself into the system. The easiest way to avoid breaches by these methods is by enforcing policies such as not opening executables that aren’t registered with the IT support team and disallowing certain email attachments.

Some security breaches are more difficult to avoid such as DoS (Denial of Service) attacks which aim to bring down or disrupt networks and websites. Some well-known names such as Amazon have been subject to these attacks and most businesses that get hit do report a temporary drop in revenue.

So what’s the best way to stay protected? Make sure your network is correctly configured and has safeguards in place for hack attacks such as DoS attacks. Ensure that all users of a network have up to date antivirus software and are aware of the dangers in opening unrecognised programs and attachments. As soon as one computer in a network is breached, the network is compromised.’

Jan 27: BBC news-DdoS; when a website crashes due to excessive levels of traffic; cyber-attacks to rise in 2016

Jay says: ‘DdoS, or Distributed Denial of Service is when a website gets bombarded with traffic and causes it to crash.’

Jan 28: The death of Flash could come quicker than we thought

Jay says: ‘This year has been an interesting one for Flash. Many are certain that the death of Flash is coming, but the question is how soon? Some reports are suggesting we could see the disappearance of Flash in as little as two years. This may sound like a long time, however Flash was a giant of the internet and a lot of applications and interactive experiences have been built using Flash. There are going to be some difficult questions asked on the topic of whether to re-develop applications to use newer supported technologies or let them die along with Flash.

How long Flash will last almost completely depends on how long our browsers will support it. One thing is for sure, Flash is not as big as it once was.’

Jan 28: The death of Flash could come quicker than we thought

Paul says: 'More and more devices will be connectable to the internet; even the humble light bulb can be controlled from your smartphone from anywhere in the world. But what happens to all this collectible data and who is controlling who?'